Ambo University
Institute of Technology
Department of Information Technology
Lecturer's Name: Mulugeta.A
Course Name Computer Network Device Configuration
Course Number ITec4113
ECTS Credits 5
Target Group 4rd year IT Student
Department IT
The course Status Core
Compiled By: Mulugeta.A @ 2017
Chapter 1: Device Configuration
Introduction to Networking
VLANs
Wireless Mobility configuration menu
Device Schedules
VPN Policy Manager
Element Management
Compiled By: Mulugeta.A @ 2017
What is network?
It is a collection of different communication devices that are interconnected with each
other. Interconnected devices should exchange data or share a resource.
What is networking?
The process involved in designing, implementing, upgrading, managing and working
with networks and networking technologies.
Computer network?
A type of network that interconnects two or more autonomous (independent)
computers. The computers can be geographically located anywhere. Computer
networks are composed of both software and hardware. The software component
consists of services and protocols that run on the hardware components. The hardware
part consists of different end systems, intermediary devices and network media.
Compiled By: Mulugeta.A @ 2017
Compiled By: Mulugeta.A @ 2017
Source
– generates data to be transmitted
Transmitter
– Converts data into transmittable signals
Transmission System
– Carries data
Receiver
– Converts received signal into data
Destination
– Takes incoming data
Compiled By: Mulugeta.A @ 2017
Communication over a network begins with a message, or information, that must
be sent from one individual or device to another. People exchange ideas using
many different communication methods.
These communication methods have four elements in common:
1. Source - a source can people, or electronic devices, that need to send a
message to other individuals or devices
2. Destination - the destination receives the message and interprets it
3. Media (Channel): consists of physical entities that provide the pathway over
which the message can travel from source to destination
4. Protocols: are the set of rules that govern the process of sending and
receiving messages over a given network.
Compiled By: Mulugeta.A @ 2017
The various elements that make up a network :
– Devices: These are used to communicate with one another
– Medium: This is how the devices are connected together
– Messages: Information that travels over the medium
– Rules: Governs how messages flow across network
– Converged network: A type of network that can carry voice, video & data over the same
network.
Compiled By: Mulugeta.A @ 2017
Basic measures to secure data networks
– Ensure confidentiality through use of
• User authentication
• Data encryption
– Maintain communication integrity through use of
• Digital signatures
– Ensure availability through use of
• Firewalls
• Redundant network architecture
• Hardware without a single point of failure
Compiled By: Mulugeta.A @ 2017
Why Networking is a big deal?
Overcome geographic limits,
Access remote data and Separate clients and server
Advantages of Networks
Data and Hardware sharing,
Personal communication
Entertainment, Back-up, User and data management
Disadvantages of Networks
Viruses, Crackers and Unauthorized users, Network hardware and software costs,
Networks set up costs
Compiled By: Mulugeta.A @ 2017
PAN: a personal area network is a computer network used for communication
among computer devices (including telephones and personal digital
assistants) close to one person.
Technologies: USB and Fire wire (wired), IrDA and Bluetooth (wireless)
LAN: a local area network is a CN covering a small geographic area, like a home,
office, or group of buildings, Technology: Ethernet (wired) or Wi-Fi (wireless)
MAN: Metropolitan Area Networks are large CNs usually spanning a city
Technologies: Ethernet (wired) or WiMAX (wireless)
WAN: Wide Area Network is a CN that covers a broad area, e.g., cross
metropolitan, regional, or national boundaries, Examples: Internet
Wireless Technologies: HSDPA, EDGE, GPRS, GSM.
Compiled By: Mulugeta.A @ 2017
LAN uses Ethernet which in turn works on shared media. Shared media in Ethernet create
one single Broadcast domain and one single Collision domain.
With the introduction of switches to Ethernet has removed single collision domain issue
and each device connected to switch works in its separate collision domain. But even
Switches cannot divide a network into separate Broadcast domain. On the other hand
A station is considered part of a LAN if it physically belongs to that LAN. The criterion Of
membership is geographical station.
What happens if we need a virtual connection between two stations belonging to two
different physical LANs?
We can roughly define a virtual local are a network (VLAN) as a local area network
configured by software, not by Physical wiring.
Virtual LAN is a method to divide a single Broadcast domain into more than one
Broadcast domains. Host in one VLAN cannot speak to a host in another. By default, all
hosts are placed into same VLAN called VLAN1.
A VLAN is a broadcast domain created by one or more switches.
Compiled By: Mulugeta.A @ 2017
• In above pictures, different VLANs are depicted in different color codes.
Hosts in one VLAN, even if connected on the same Switch cannot see or
speak to other hosts in different VLANs.
• VLAN is Layer -2 technology which works closely on Ethernet. To route
packets between two different VLANs a Layer-3 device (such as Router) is
required.
Compiled By: Mulugeta.A @ 2017
VLANs provide segmentation based on broadcast domains.
VLANs logically segment switched networks based on the functions, project teams,
or applications of the organization regardless of the physical location or connections
to the network.
All workstations and servers used by a particular workgroup share the same VLAN,
regardless of the physical connection or location.
Compiled By: Mulugeta.A @ 2017
2 VLANs or more within a single switch
VLANs address scalability, security, and network management.
Routers in VLAN topologies provide broadcast filtering, security, and traffic
flow management.
Edge ports, where end nodes are connected, are configured as members of a
VLAN
The switch behaves as several virtual switches, sending traffic only within
VLAN members.
Switches may not bridge any traffic between VLANs, as this would violate the
integrity of the VLAN domain.
Traffic should only be routed between VLANs.
Compiled By: Mulugeta.A @ 2017
10.1.0.0/16
10.2.0.0/16
Without
VLANs: 10.3.0.0/16
Without VLANs, each group is on a different
IP network and on a different switch. One link per VLAN or a single VLAN
Trunk
10.1.0.0/16
Using VLANs. Switch is configured with the
ports on the appropriate VLAN. Still, each With
group on a different IP network; however, VLANs
they are all on the same switch. 10.2.0.0/16
What are the broadcast domains in each?
10.3.0.0/16
Compiled By: Mulugeta.A @ 2017
172.30.1.21
Switch 1
172.30.2.12
255.255.255.0
255.255.255.0
VLAN 1
VLAN 2
172.30.2.10 172.30.1.23
1 2 3 4 5 6 . Port 255.255.255.0 255.255.255.0
1 2 1 2 2 1 . VLAN VLAN 2 VLAN 1
Two VLANs
Two Subnets
Important notes on VLANs:
VLANs are assigned to switch ports. There is no “VLAN” assignment
done on the host.
In order for a host to be a part of that VLAN, it must be assigned an IP
address that belongs to the proper subnet.
Compiled By: Mulugeta.A @ 2017
ARP
Request
172.30.1.21
Switch 1
172.30.2.12
255.255.255.0
255.255.255.0
VLAN 1
VLAN 2
172.30.2.10 172.30.1.23
1 2 3 4 5 6 . Port 255.255.255.0 255.255.255.0
1 2 1 2 2 1 . VLAN VLAN 2 VLAN 1
Two VLANs
Two Subnets
VLANs separate broadcast domains == subnets.
e.g. without VLAN the ARP would be seen on all subnets.
Assigning a host to the correct VLAN is a 2-step process:
Connect the host to port on the switch.
Assign the correct IP address to host depending on the VLAN membership
Compiled By: Mulugeta.A @ 2017
As a device enters the network, it assumes the VLAN membership of the port
to which it is attached.
The default VLAN for every port in the switch is VLAN 1 and cannot be
deleted.
All other ports on the switch may be reassigned to arbitrary VLANs.
Compiled By: Mulugeta.A @ 2017
Two switches can exchange traffic from one or more VLANs
Inter-switch links are configured as trunks, carrying frames
from all or a subset of a switch’s VLANs
Each frame carries a tag that identifies which VLAN it belongs
to
Compiled By: Mulugeta.A @ 2017
No VLAN Tagging
VLAN Tagging
VLAN tagging is used when a single link needs to carry
traffic for more than one VLAN.
Compiled By: Mulugeta.A @ 2017
Tagged Frames
802.1Q Trunk
Trunk Port
VLAN X VLAN Y VLAN X VLAN Y
Edge Ports
This is called “VLAN Trunking”
Compiled By: Mulugeta.A @ 2017
You can no longer “just replace” a switch
Now you have VLAN configuration to maintain
Field technicians need more skills
You have to make sure that all the switch-to-switch
trunks are carrying all the necessary VLANs
Need to keep in mind when adding/removing VLANs
Compiled By: Mulugeta.A @ 2017
You want to segment your network into multiple subnets,
but can’t buy enough switches
Hide sensitive infrastructure like IP phones, building controls, etc.
Separate control traffic from user traffic
Restrict who can access your switch management address
Compiled By: Mulugeta.A @ 2017
Because you can, and you feel cool
Because they will completely secure your hosts (or so you think)
Because they allow you to extend the same IP network over multiple
separate buildings
Compiled By: Mulugeta.A @ 2017
Extending a VLAN to multiple buildings across trunk ports
Bad idea because:
Broadcast traffic is carried across all trunks from one end of the
network to another
Broadcast storm can spread across the extent of the VLAN
Maintenance and troubleshooting nightmare
Type of VLAN
There are two types of VLAN
Port based VLAN
MAC based VLAN
Compiled By: Mulugeta.A @ 2017
1. Users assign membership by port
2. Easily administer by GUI
3. Requires no lookup when we done in ASCIs
4. Maximize security in between VLAN
5. Packet don’t ‘leak’ in to other domain
6. Easily control through the network
VLAN membership by MAC Address
1. User assigned membership by MAC address
2. Offers flexibility, yet add overhead
3. Impact scalability, performance and administration
4. Offers similar process for other higher layers
Compiled By: Mulugeta.A @ 2017
Compiled By: Mulugeta.A @ 2017
Some pros of VLAN:
Easily move workstations on the LAN.
Easily add workstations to the LAN.
Easily control network traffic.
Improve security
Allows us to split switches into separate (virtual) switches
Only members of a VLAN can see that VLAN’s traffic
Inter-VLAN traffic must be routed (i.e. go through a router)
because they are separate subnets
Compiled By: Mulugeta.A @ 2017
Virtual Private Network is a type of private network that uses public
telecommunication, such as the Internet, instead of leased lines to
communicate.
Became popular as more employees worked in remote locations.
Terminologies to understand how VPNs work ?.
Compiled By: Mulugeta.A @ 2017
Network users can access the network (Intranet) from
remote locations.
Secured networks.
The Internet is used as the backbone for VPNs
Saves cost tremendously from reduction of equipment and
maintenance costs.
Scalability
Compiled By: Mulugeta.A @ 2017
Two connections – one is made to the Internet and the second is made to
the VPN.
Data grams – contains data, destination and source information.
Firewalls – VPNs allow authorized users to pass through the firewalls.
Protocols – protocols create the VPN tunnels.
Compiled By: Mulugeta.A @ 2017
Authentication – validates that the data was sent from the sender.
Access control – limiting unauthorized users from accessing the network.
Confidentiality – preventing the data to be read or copied as the data is
being transported.
Data Integrity – ensuring that the data has not been altered
Compiled By: Mulugeta.A @ 2017
PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol Security
SOCKS – is not used as much as the ones above
Compiled By: Mulugeta.A @ 2017
What does “implementation” mean in VPNs?
3 types
Intranet – Within an organization
Extranet – Outside an organization
Remote Access – Employee to Business
Good Lack and Congratulation
Compiled By: Mulugeta.A @ 2017