Sei sulla pagina 1di 69

Networking Training

Course Outlines

Basics
Layered model (OSI & TCP/IP) models
Addressing (MAC & IP address)
Sub-netting
VLANs
Routing Protocols Overview
OSPF
QoS

Section.1
Basics

Network structure
Network: a collection of interconnected
devices that can communicate together to
deliver information.
4 common elements of communication
Message source, destination
The medium
Message
Protocols

Example

Computer network

Network Types
Define Local Area Networks (LANs)
- A network serving a home, building or campus
is considered a Local Area Network (LAN)

Network Types
Define Wide Area Networks (WANs)
- LANs separated by geographic distance are
connected by a network known as a Wide Area
Network (WAN)

Network Types
Define the Internet
The internet is defined as a
global mesh of interconnected networks

Terminology

LAN
WAN
MAN
ISP
MAC address
IP Address
Internet
Protocol
Physical & logical topology
Multiplexing

End device
Intermediary device
Switch
Router
Client/Server
DNS
DHCP
Loops
Collision
QoS

Section.2
Layered model

Layers with OSI and TCP/IP Model


Benefits:
Breaks down the network function, easy to
understand/ troubleshoot
Allows vendors to focus on specific layers
Creates standards for equipment
Changes in one layer do not affect other layers

Layers with TCP/IP and OSI Model


OSI mode
L7: Interface to network
(Web browser & Messenger)
L6: Encoding, extension, compression
& encryption
L5: Starts & ends sessions
L4: Segmentation, sequence numbers,
TCP/UDP & port number.
L3: Routing & IP address
L2: MAC address & FCS (error detection)
L1: Streaming & signaling

Example

Layers with TCP/IP and OSI Model


TCP/IP Mode

Section.3
Addressing

Layer 2 addressing
The Ethernet MAC Address

MAC address

MAC address

00-11-8B (hex) Alcatel-Lucent.


00-00-0C (hex) CISCO SYSTEMS, INC.
00-1B-4F (hex) Avaya Inc.
To check the assigned OUI for vendors,
http://standards.ieee.org/develop/regauth/ou
i/oui.txt

MAC address

Layer 2 addressing
Operation
Ethernet Unicast, Multicast and Broadcast

Layer 2 addressing
Operation

Layer 2 addressing
Operation

IP Addressing Structure

Classify and Define IPv4 Addresses


Three types of addresses in the network
type

Subnet Mask

Subnet Mask

Private addresses
The private address blocks are:
10.0.0.0 to 10.255.255.255 (10.0.0.0 /8)
172.16.0.0 to 172.31.255.255 (172.16.0.0 /12)
192.168.0.0 to 192.168.255.255 (192.168.0.0
/16)

Special Reserved IP addresses


Default Route :The default route is used as a "catch all" route when a
more specific route is not available. The use of this address also reserves
all addresses in the 0.0.0.0 - 0.255.255.255 (0.0.0.0 /8) address block.
Loopback: The loopback is a special address that hosts use to direct traffic
to themselves. The loopback address creates a shortcut method for TCP/IP
applications and services (127.0.0.0 to 127.255.255.255 (
Link-Local Addresses :(APIPA)IPv4 addresses in the address block
169.254.0.0 to 169.254.255.255, These addresses can be automatically
assigned to the local host by the operating system in environments where
no IP configuration is available. Link-local addresses do not provide
services outside of the local network. However, many client/server and
peer-to-peer applications will work properly with IPv4 link-local addresses.

Classify and Define IPv4 Addresses


Classful IP

Section.4
Subnetting

Subnetting Overview
To identify subnets, you will borrow bits from the host ID
portion of the IP address:
The number of subnets available depends on the number
of bits borrowed.
The available number of subnets = 2s, I which s is the
number of bits borrowed.
The number of hosts per subnet available depends upon
the number of host ID bits not borrowed.
The available number of hosts per subnet = 2h -2, in
which h is the number of host bits not borrowed.
One address is reserved as the network address.
One address is reserved as the broadcast address.

Possible Subnets and Hosts for a


Class C Network

Possible Subnets and Hosts for a


Class B Network

Possible Subnets and Hosts for a Class A


Network

Section.5
VLAN

VLAN Overview
Segmentation
Flexibility
Security

VLAN = Broadcast Domain = Logical Network (Subnet)

Network Traffic Types


Traffic types to consider
when designating VLANs:
Network management

IP telephony
Normal data
Scavenger class

Advantages of Voice VLANs


Phones segmented in
separate logical networks
Allows administrators
to create and
enforce QoS
Lets administrators
add and enforce
security policies

VLAN Operation

VLAN Membership Modes

802.1Q Trunking

802.1Q Frame

Different types VLANs

VLAN types

Data VLAN
Voice VLAN
Default VLAN
Management VLAN
Native VLAN

Section.6
Routing Protocols Overview

Routers

Routers have the following components:


CPU
Motherboard
RAM
ROM
Routers have network adapters to which IP addresses are assigned.
Routers may have the following two kinds of ports:
Console: For the attachment of a terminal used for management
Network: Different LAN or WAN media ports
Routers forward packets based upon a routing table.

Router role

Routing (Best path selection) ,Connects multiple networks


Connects devices outside their local LANs (Default GW)
Segmentation of broadcast domains
QOS, ACL & DHCP Server
Availability (primary & backup paths)
Mitigate the impact of worms, viruses, and other attacks
Voice enabled GW (Signaling)
Switching functions (SW modules)
May operate in the 7 layers

Router Functions
RouterX# show ip route
D 192.168.1.0/24 [90/25789217] via 10.1.1.1

R 192.168.2.0/24 [120/4] via 10.1.1.2


O 192.168.3.0/24 [110/229840] via 10.1.1.3

1.
2.

Lets other routers know about changes


Determines where to forward packets

Path Determination

Path Determination

Routing Tables

Routing Table Entries


Directly connected: Router attaches to this
network
Static routing: Entered manually by a system
administrator
Dynamic routing: Learned by exchange of routing
information
Default route: Statically or dynamically learned;
used when no explicit route to network is known

Routing Metrics

Static vs. Dynamic Routes


Static Route
Uses a route
that a network
administrator
enters into the
router manually

Dynamic Route
Uses a route that a
network routing
protocol adjusts
automatically for
topology or traffic
changes

What Is a Dynamic Routing Protocol?

Routing protocols are


used between routers to
determine paths to remote
networks and maintain
those networks in the
routing tables.
After the path is determined,
a router can route a routed
protocol to the learned networks.

Autonomous Systems: Interior and


Exterior Routing Protocols

An autonomous system is a collection of networks within


a common administrative domain.
Interior gateway protocols operate within an autonomous system.
Exterior gateway protocols connect different autonomous systems.

Classes of Routing Protocols

Selecting the Best Route Using Metrics

Administrative Distance:
Ranking Routing Sources

Routers choose the routing source with the


best administrative distance:
OSPF has an administrative distance of 110.
EIGRP has an administrative distance of 90.

Distance Vector Routing Protocols

Routers pass periodic copies of their routing table to


neighboring routers and accumulate distance vectors.

Link-State Routing Protocols

After initial flood, passes small event-triggered link-state updates to all other
routers

Section.7
OSPF

Link-State Routing
Dikjstras algorithm also known as the shortest
path first (SPF) algorithm

Link-State Routing
The shortest path to a destination is not
necessarily the path with the least number
of hops

Link-State Routing
Directly Connected
Networks
Link
This is an interface on a
router
Link state
This is the information
about the state of the
links

OSPF Overview
Creates a neighbor relationship by exchanging hello
packets
Propagates LSAs rather than routing table updates
Link: Router interface
State: Description of an interface and its relationship to
neighboring routers

Floods LSAs to all OSPF routers in the area, not just


directly connected routers
Pieces together all the LSAs generated by the OSPF
routers to create the OSPF link-state database
Uses the SPF algorithm to calculate the shortest path
to each destination and places it in the routing table

OSPF Hierarchy Example

Minimizes routing table entries


Localizes the impact of a topology change within an area

Neighbor Adjacencies: The Hello


Packet

SPF Algorithm
10
10
1

1
1

Places each router at the root of a tree and calculates the


shortest path to each destination based on the cumulative cost
Cost = Reference Bandwidth / Interface Bandwidth (b/s)

Potrebbero piacerti anche