Networking
Network:-
Group of two or more devices that connect together to share
the information between each other.
Networking:-
It is a connection of two or more devices that connect to each
other and share the information and get the acknowledgement. It is called
networking.
Types of Network
On the base of Host
• Client - That request for the service, client cannot provide the service.
• Server - That provides the service cannot request for the service.
• Peer - A device which can request and respond to a service at the
same time. data is not centralized and data can be downloaded only
when the other peer is available.
On the base of Geographical
• LAN (Local area Network):-
LAN is a local area Network which we can deploy
in small geographical areas.
Ex = Home,office etc.
• WAN (Wide area Network):-
Wide area Network which we can deploy in a Long
Geographical Network. ex = ISP Network
• CAN (Campus area Network)
• MAN (Metropolitan area network)
On the base of Participation
• V.P.N: A Logical network which is connected to physical thought ISP. A
Private network over a public network.
• Private Network: Where data is shared only for authorized users. Network
which can be used by authorized users.
• Public Network: Network which can be used by authorized and
unauthorized users.
Types of communications
• Unicast – one to one communication.
• Multicast – one to many (selected user) communications.
• Broadcast – one to all user communications.
Modes of communications
• Simplex: One-way communication for example (Television & Radio)
• Half Duplex: Two-way communication, but not at the same time. for
example (walkie talkie & hub)
• Full Duplex: two way communication between hosts.communication can
travel in both directions at the same time.
Ex- mobile phone,telephones.
Network Components
● NIC Card: Network Interface card (used in connect the network)
Wireless -
Wired -
• Transmission Media:
Wireless -
Wired -
Protocols
• Logical instruction
• Rules or standards that define how communication will or should take place.
Network Topologies
• Design of a network: How devices are connected
• Physical topologies: How devices are physical connected
• Logical topologies: How data flows between the devices.
• Bus: it's a specific kind of network topology in which all of the various
devices in the network are connected to a single cable.
• Ring: it's a network configuration where device connections create a
circle data path.each network devices are connected two others ,like
points on a circle,together devices in a ring topology.
Most commonly used in routing and switching
● • Star: a star topology uses a centralized device (hub/switch) to
concentrate all network connections to a single physical location.
● Most commonly used in switching
• Extended Star: a star network which has been extended to include an
additional hub or hubs.
● Most commonly used in switching.
• Mesh:in mesh topology all computers are connected to each one of the
devices in the network with a separate cable.
● Most commonly used in routing
● Devices
• Hub -
1. It doesn't have any memory.
2. It works on Half Duplex.
3. It is a Physical Layer device.
4. It broadcasts the signal.
5. It has multiple ports to connect many devices.
6. It is used in LAN.
• Switch -
It has memory to store mac address and form mac table according,
• Its layer two devices
• It has multiple port so that we can connect many devices
• It is use to connect single network device
• Most commonly used for LAN connectivity.
• Router - it is used to connect two diff-2 LAN
• Routers can be used in LAN but most commonly used in WAN
• Router work in IP Address, Router is layer 3 device
• Bridge - Only have two ports
• it has small memory it is work in mac address table
• Firewall - it is used to control inbound and outbound traffic to protect your
network
• it is work on network layer3, it works on IP and MAC address, it
is work on layer7(user interface)
IP Addressing
Internet Protocol Address is a unique or logical identifier of each machine in a network.
Versions
Ipv4 Ipv6
32 bits 128 bits
Decimal Hexadecimal
Two type of IP
Private Ip Public Ip
LAN WAN
Ipv4 dividing into 5 class
Class A 0-126
Class B 128-191
Class C 192-223
Class D 224-239 (Multicasting)
Class E 240-255 (Research)
IANA: Define the range
0.0.0.0 Reserved for default routing
127.0.0.0 Reserved for loopback which is used to check self-testing
Private IP Address
Class A 10.0.0.0 – 10.255.255.255
Class B 172.16.0.0 – 172.31.255.255
Class C 192.168.0.0 – 192.168.255.255
Class A N.H.H.H [N(Network)- 8bit,
H(Host)-8bit]
Class B N.N.H.H [255.255.0.0/16]
Class C N.N.N.H [255.255.255.0/24]
Subnetting: It is a combination of network bit and host.
Subnet Range
Class A A = Slash 8 – 15
Class B B = Slash 16 – 23
Class C C = Slash 24 – 31
Broadcast: All bits define in 255.255.255.255
Number System
Binary (Base = 2) 0,1
Decimal (Base = 10)0,1,2,3,4,5,6,7,8,9
Hexadecimal (Base = 16)0-9 A, B, C, D, E, F
Binary to decimal 128,64,32,16,8,4,2,1- Value
1,2,3,4,5,6,7,8,
Class A 10.0.0.0/8- CIDR
H value: 32 minus slash value
Class C 192.168.0.1/27
Number of hosts 2h - 2
Subnet 255.255.255.224
block size 256 - 224
No of network 2n
Class B 172.18.0.1/22
Number of hosts 2h - 2
Subnet 255.255.252.0
block size 256 - 252
No of network 2n
Class A 64.122.0.0/14
Number of hosts 2h-2
Subnet 255.252.0.0
block size 256 - 252
No of network 2n
Osi model
Open system interconnection
:OSI MODEL WAS CREATED BY THE INTERNATIONAL ORGANIZATION FOR
STANDARDIZATION (ISO),AN INTERNATIONAL STANDARD SETTING-BODY.
:IT WAS DESIGNED TO BE A REFERENCE MODEL FOR DESCRIBING THE
FUNCTION OF A COMMUNICATION SYSTEM.
THERE ARE SEVEN LAYERS IN OSI.
7:- APPLICATION LAYER
6:- PRESENTATION LAYER
5:- SESSION LAYER
4:- TRANSPORT LAYER
3:- NETWORK LAYER
2:- DATA LINK LAYER
1:- PHYSICAL LAYER
These seven layers are further divided into two more categories for
the sake of simplicity.
UPPER LAYER :- CLOSE TO THE USERS
LOWER LAYER :- CLOSE TO THE NETWORK
APPLICATION LAYER :- it provides you user interface.
: It's also provide you set of protocols to get connected with actual application
FOR EXAMPLES:-
WEB SERVICES:- HTTP,HTTPS
REMOTE SERVICES:- TELNET SSH
PRESENTATION LAYER:- It's converting your data into standard format and also
performs encryption and decryption.
SESSION LAYER:- session layer is responsible for creating, managing and
terminating the session.it decides modes of communication.
TRANSPORT LAYER:- Transport layer provides end to end reachability with the help of
two protocols TCP and UDP.
TCP:- TRANSMISSION CONTROL PROTOCOL
UDP:- USER DATAGRAM PROTOCOL
TCP UDP
Transmission control protocol port number 6 User datagram protocol port number 17
It is a connection-oriented protocol It is a connection less protocol
It is performed three-way handshake It does not perform three-way handshake
It is a reliable protocol(acknowledge) it is an unreliable protocol
it is slow protocol as compare UDP It is a fast protocol as compare to TCP
TCP performs retransmission of data. UDP does not perform retransmission of the
data.
Segmentation: It is basically dividing the huge amount of data which we get from the top
three layers into small chunks of segments.
Sequence: sequence is basically to reassemble the data way it has been sent.
NETWORK LAYER:- It is responsible for giving ip addresses.
DATA LINK LAYER:- it is responsible for the mac address.
PHYSICAL LAYER:- bits/byte
MSS: Maximum Segmentation Size
MSS – 1460 bytes
1 byte 8bits
8bit 1 byte
1024 bit 1MB (Megabytes)
1024MB 1GB (Gigabytes)
1024GB 1TB (Terabytes)
1024 TB 1PB (Petabytes)
1024 PB 1EB (Exabytes)
1024EB 1ZB (Zettabytes)
1024ZB 1YB (Yottabytes)
Protocols
Protocol HTT HTTP Telne SS SMT FTP DHC TFT DNS
s P S t H P P P
TCP TCP TCP TCP TCP TCP UDP UDP UDP/TC
P
Port 80 443 23 22 25 20/21 67/68 69 53
Number
s
TCP/IP MODEL
TCP :- TRANSMISSION CONTROL PROTOCOL
IP:- INTERNET PROTOCOL
: TCP / IP model was created in the 1970s by the DEFENSE ADVANCE RESEARCH
PROJECT AGENCY (DARPA) as an open,vendor-natural,public networking model.
Application layer Application layer
Transport layer Host to Host
Network layer Internet layer
Data link layer Network Access layer
Physical layer
The protocol that make up TCP/IP define:-
* How data is transmitted across a network
* How data should be formatted so that the network system can
understand it.
Two key TCP/IP features support Decentralization:-
1. End Node Verification:- The two endpoints of any data transfer are
responsible for making sure it was successful.
* no centralized control( system.
2. Dynamic routing:- End nodes can transfer data on multiple paths
and the n/w choose the best path for individual data transfer.
Network issues:-
1. Addressing
2. Routing
3. Name resolution
4. Flow & Error Control
5. Interoperability
MSS: Maximum Segmentation Size
MSS – 1460 bytes
1 byte 8bits
8bit 1 byte
1024 byte 1MB (Megabytes)
1024MB 1GB (Gigabytes)
1024GB 1TB (Terabytes)
1024 TB 1PB (Petabytes)
1024 PB 1EB (Exabytes)
1024EB 1ZB (Zettabytes)
1024ZB 1YB (Yottabytes)
Icmp(Internet control messaging protocol):-
* Is used to verify connectivity b/w source and destination.
* Utilities/ tools:-
ping = packet internet groper.
Traceroute = Tracing the path b/w source to
destination.
Massages:- --- Query = echo request
Echo reply
User ---- Windows - 5 sec timeout == 4 time
Cisco - 2sec timeout === 5 time
Arp(Address resolution protocol):-
* Arp finds the mac address of a host from its known ip address.
* It is layer 2 protocol.
* Arp request is a broadcast but arp response is a unicast.
* The arp concept is used only in IPv4.
* Arp is never generated for the device of another network.
Arp is four types:-
1. ARP
2. Proxy Arp
3. Reverse Arp
4. Gratuitous
HTTP(Hypertext transfer protocol):-
* To exchange web pages b/w client to server.
* Encapsulates in TCP with port no 80.
* It is not encrypted or secure.
* All data is sent in cleartext form.
HTTPS( Secure):-
* Encapsulates in TCP with port no 443.
* All data is encrypted.
* Encryption for https will be done by the presentation layer.
FTP(File Transfer Protocol):-
* It is used to transfer data b/w client to server.
* Encapsulates in TCP with port no 20,21
* Data is unsecured.
7 * We can browse through files and folders.
* you can not download or copy folder but only file and that to one
by one.
TFTP(Trivial FTP):-
* Encapsulated in UDP Port no 69.
* No Authentication.
* Data is unsecured and cannot be secured in any way.
* In order to secure any file, it is recommended to align a typical
file name.
APIPA (Automatic private IP address):-
==> 169.254.0.1 ------ 169.254.255.254
==> Inbuilt feature
Advantage:-
* It works the same as DHCP server.
* It stops unwanted broadcasting.
DNS (Domain name server/service/system)
• It is used to translate IP into domain names.
• It is used for 53 protocol numbers.
• It works on the application layer.
Telnet (Teletype Network)
• It is using for the remote access of other devices
• It is using port no 23
• All the data that is transmitted through telnet is in cleartext format
• encapsulates in TCP protocol
SSH (Secure shell)
• Almost same as telnet
• All data is encrypted and secure
• It is using port number - 22
• Encapsulates in TCP protocol
DHCP
( Dynamic host configuration protocol)
● It is used for the IP implementation -> Statically and dynamically
• It is automatically assigned an IP address to the DHCP client.
• It is based on client server model
• DHCP work at application layer
• IP address assigned is known as dynamic IP address
• DHCP IP address range is called scope.
• DHCP is dynamic boot up
• It is use UDP 67/68 Ports in transport layer (67 for server 68 is used for client)
DHCP server provide service
• IP Address
• Subnet Mask
• Default gateway
• Domain name
• DNS server address
DORA PROCESS
DORA: Discover, offer, request, Acknowledgement): it is type of message in DHCP
Discover/client (68): UDP broadcast from DHCP client to local available server
• Layer 2 Broadcast =
• Layer 3 Broadcast =255.255.255.255
Offer/server (67): DHCP server to client in response to DHCP discover with offer of
configuration parameters (IP ADDRESS of DHCP server offer IP, MAC address of client
subnet mask).
Request/client (68): Client then broadcasts to the server a DHCP request message asking
for the offered IP.
Acknowledgement/Server (67): server to client with configuration parameters including
connect network address.
Routing Part
Ip Routing: To identify the path from on network to another network
Types of routing:
Static Routing:
• with using next hop address
• with using exit interface
• with using exit interface and next hop address
As number (automounts system number): Group of devices or network within a
single administrator. It is a 16 bit decimal number. Range = 0-66535
Dynamics routing: Routing in which solute are calculated automatically
Routes automatically exchange the routes b/w each other
Some packets are there for each protocol which are advertised by routing protocols
Types of dynamics routing:
IGP – Interior gateway protocol
EGP – Exterior gateway protocol
IGP - Routing protocols that shares routes among some autonomous system
(Exp: EIGRP, OSPF)
EGP – Routing protocol that shares routes b/w will rent autonomous system
(Exp: BGP)
ACL(Access control list):-
* ACL is a set of rules which will allow or deny the specific traffic
moving through the router.
* It is layer 3 security which controls the flow of traffic from one router to another.
* It is also called a packet filtering firewall.
Type of ACL:- 1. Standard
2. Extended
Standard Access list Extended access list
* The access-list number range is 1 - 99 * The access-list number range is
100-199.
* Can block a network, Host and subnet. * Can block a network , host,
Subnet and service
* Two way communication is stopped. * Implemented closest to the
source.
* All services are blocked. * One way Communication is
Stopped.
* Implemented closest to the destination. * Selected services can be Blocked.
* Filtering is done based on only source ip
address
NAT (Network Address Translation):-
Network Address Translation is a process
of changing the source and destination IP addresses and ports. Address translation
reduces the need for IPv4 public addresses and hides private network address ranges.
This process is usually done by routers or firewalls.
Three types of address translation:-
Static NAT – Translates one private IP address to a public one. The public IP
address is always the same.
Dynamic NAT – Private IP addresses are mapped to the pool of public IP
addresses.
Port Address Translation (PAT) – One public IP address is used for all internal
devices, but a different port is assigned to each private IP address. Also known as NAT
Overload.
VLAN virtual local area network:-
➢ To break broadcast domain at layer2 we use vlan and one
vlan.defines one broadcast domain.
➢ vlan identify by a number and it is in 12 bits.
➢ range of vlan from 0 to 4095 (normal=1to1005,extended=1006
to 4094).
➢ default vlan is vlan1.
➢ vlan database save in vlan.dat file in flash memory.
how to create vlan:-
➢ switch(config)#vlan 10
➢ switch(config-vlan)#name sales
➢ switch#show vlan brief
how to assign port to any vlan:-
Static vlan assignment:
➢ switch(config-if)# switchport access vlan 10
➢ switch#show vlan brief
➢ switch#show vlan id 10
Dynamic vlan assign:-
➢ VMPS VLan Management Policy Server
➢ AAA Authentication, Authorization and Accounting.
Switchport:-
a switch which has capability to do layer2 address switching
➢ Access port- carry single vlan data
➢ Trunk port - carry multiple vlan data