Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
62 views373 pages

Computer Networking

Uploaded by

mekgwereabetswe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views373 pages

Computer Networking

Uploaded by

mekgwereabetswe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 373

Computer Networking

Technologies
ITCTA1

Eduvos (Pty) Ltd (formerly Pearson Institute of Higher Education) is registered with the Department of Higher Education and Training as a private higher education institution under the
Higher Education Act, 101, of 1997. Registration Certificate number: 2001/HE07/008
Week 1: Lesson 1

• Induction and Orientation


• OSI Model Layers
• SOHO Networks
Attendance Code

• uzn74p
Week 1: Lesson 1
Module
Description
This module explores the diverse subject of
networking, looking at types of networks, the
structure of networks, how models explain how
data travels over networks, the different media
used to carry data, the different devices used to
move data, the underlying principles of
protocols, addressing schemes, services, and
standards, and the tools and techniques used to
manage, monitor, troubleshoot, and secure
networking systems.
Week 1: Lesson 1
Module Aim
• The aim of this module is to equip
students with networking concepts,
terminology, and the skills needed to
install, manage, troubleshoot, and
secure network infrastructure,
hardware, and software
Week 1: Lesson 1
Learning
Outcomes
• Demonstrate an understanding of networking principles.
o Compare network types, functions of the layers of different
networking models, explain the scope of network standards,
functions of network devices, security and optimizing network
performance
• Demonstrate knowledge in relation to the communication
principles of networks.
o Describe principles of signal theory, properties of different media,
different addressing schemes, functions of network protocols
names and data travels around a network.
• Demonstrate how to implement a network.
o Plan, build a network based on requirement, review and test the
network implementation
• Demonstrate how to carry out network activities.
o Describe regular network management task and network
monitoring tools
Week 1: Lesson 1
MyLMS Module Page
[mylms.vossie.net]
•Module guide
•Module lessons
•Blended learning activities
•Assessments
•Important notifications from your lecturer
•Module announcements (discussion forums)
•Links to lectures, lecture recordings and prescribed
videos (where applicable)
Week 1: Lesson 1
Prescribed Textbook

Pengelly. J., The Official CompTIA Network +


Student Guide (Exam N10-008). CompTIA
1 Edition
st

ISBN: 9781642743579
eBook: 9781642743586
Week 1: Lesson 1
Recommended Textbook

West, J., Dean, T., Andrews, J. and Cengage Learning (Firm


(2019). CompTIA Network+ guide to networks. 8th ed.
Boston, Ma, Usa: Cengage.

West, J. (2021). Comptia Network+ Guide To Networks. S.L.:


Cengage Learning.

Auteur: Doug Lowe (2021). Networking All-In-One For


Dummies. Editor: S.L.: John Wiley.
Week 1: Lesson 1
Supporting Documents

Geyer, L., Levin, A., Makati, P.,


Pierce, R., Potter, M., and Wheeler,
A. 2023. Eduvos Guide to
Referencing (Harvard Referencing
Method). Unpublished document.
Eduvos.
Week 1: Lesson 1
Checklist
• Access to the institution’s Learning Management System
(myLMS) to access all study material.
• Access to Microsoft Teams to attend online lectures and
consultations.
• Access to a resource centre or an online library with a
wide range of relevant resources including textbooks,
newspaper articles, journal articles, organisational
publications and databases.
• Access to a range of academic journals in electronic
format via ProQuest or other databases.
Week 1: Lesson 1
Roadmap

Learnin Topics
g
Weeks
Week 0 Induction and Orientation
Compare and Contrast OSI Model Layers
Week 1 Configure SOHO Networks
Deploying Ethernet Cabling: Ethernet Standards & Copper Cabling
Types
Week 2 Deploying Ethernet Cabling : Summarize Fiber Optic Cabling Types.
Deploying Ethernet Switching : Deploy Networking Devices
Week 3 Network Interfaces
Troubleshooting Ethernet Networks : Troubleshooting Methodology
Troubleshooting Common Cable Connectivity Issues
Week 1: Lesson 1
Roadmap contd
Learnin Topics
g
Weeks
Week 4 IPv4 Addressing: Explain IPv4 Forwarding
Configure IP Networks and Subnets
Week 5 Config and Troubleshoot IP networks
Routing Concepts & Network Management
Week 6 Network Management & Network Security Concepts
Supporting and Troubleshooting Secure
Networks: Security Appliances Organizational and
Physical Security Concepts.
Week 7 Disaster Recovery and High Availability Concepts
Network Hardening Techniques: Types of Network
Week 1: Lesson 1
Assessment

Assessment
= Formative +
Summative assessment
Week 1: Lesson 1
Assessment: Formative
Formative assessment refer to

• individual project

• an online test
Week 1: Lesson 1
Assessment: Individual Project
Individual project for the module and will count
40% towards the final mark

Up to 20-30 hours required to achieve 50% pass

Projects must be submitted on or before the due date to the


lecturer as per arrangement (or as otherwise stipulated).
Five percent (5%) will be deducted for every day that the
project is late, up to a maximum of three days. Projects that
are more than three days late will be awarded a zero.
Week 1: Lesson 1
Assessment: Online Test
The Online Test for the module and will count 10%
towards the final mark within a given time frame

If you miss an assessment


• Inform academic coordinator
• Present doctor's note
• Fill deferred assessment form
• Pay a fee
• Within 3days of the missed assessment
Week 1: Lesson 1
Assessment: Online Test
The Online Test for the module and will count 10%
towards the final mark within a given time frame

If you miss an assessment


• Inform academic coordinator
• Present doctor's note
• Fill deferred assessment form
• Pay a fee
• Within 3days of the missed assessment
Week 1: Lesson 1
Assessment: Summative
Summative assessment is an online invigilated
exam, and 40% pass mark is required

Project 40%
Test 10%
Exam 50%
Week 1: Lesson 1
Summary of Assessment
Formative assessment
• Project 40%
• Test 10%

Summative assessment
• Exam 50%

Final Mark = [(Online Test percentage × 0.10)


+ (Project percentage × 0.40)
+ (Summative Assessment percentage ×
0.50)]
Week 1: Lesson 1
Plagiarism
All assignments and reports must be
submitted to the online similarity checker
(Turnitin) available on myLMS prior to being
submitted for marking. When submitting
your assignment/report, it is compulsory to
submit the entire Turnitin report. Marks will
be deducted in accordance with the
institutional policy.
Week 1: Lesson 1
Consultation

• Email lecturer

• 24 hrs in advance
Week 1: Lesson 1
Introduction to Computer
Networks
• Computer Networks Today

• Common Networking Terms


Week 1: Lesson 1
Introduction to Computer Networks
Learning Outcomes

• Understand what computer networks are


and how devices communicate in a
network
Week 1: Lesson 1
Introduction to Networks
What is a Computer Network

• A network consist of two or more computer


that are linked to share resources allow
electronic communication through a
medium
Week 1: Lesson 1
Introduction to Networks
Network terms

• Node single device connected to a network


• Host assigned a unique IP address
• Transmission process
• Transmission media (wireless and wired)
pathways of communication
• Internetwork device connects
Week 1: Lesson 1
Introduction to Networks
Network terms

• Network
• Segment share a communication pathway
• Data communication transfer of data
• Link active connection over media
• Backbone fast link that connects LANs/
WANs
Week 1: Lesson 1
Introduction to Computer
Networks
• Compare and Contrast OSI Model Layers

• Deploying Ethernet Cabling: Summarize


Ethernet Standards
Week 1: Lesson 1
OSI Model and SOHO Networks
Learning Outcomes

Demonstrate understanding of networking


principles
• Compare the types of networks
• Explain the function of the layers of the different network
models
• Explain the purpose and scope of network standards
Week 1: Lesson 1
Compare and Contrast OSI
Model
Learning Outcomes

Demonstrate understanding of networking


principles
• Compare the types of networks
• Explain the function of the layers of the different network
models
• Explain the purpose and scope of network standards
Week 1: Lesson 1
Compare and Contrast OSI
Model
• Networks are built on common standards and models that
describe how devices and protocols interconnect.

• The OSI model breaks the data communication process


into discrete layers. Being able to identify the OSI layers
and compare the functions of devices and protocols
working at each layer will help you to implement and
troubleshoot networks
Week 1: Lesson 1
Compare and Contrast OSI
Model
Week 1: Lesson 1
Configure SOHO Networks
• It can include both residential networks with a couple of
computers, and enterprise networks with hundreds of
servers and thousands of workstations.
• Small office/home office (SOHO) is a category of LAN with
a small number of computing hosts that typically rely on a
single integrated appliance for local and Internet
connectivity.
• Networks such as the Internet that are in different
geographic regions but with shared links are called wide
area networks (WANs).
• The intermediate system powering SOHO networks is
usually described as a SOHO router because one of its
primary functions is to forward traffic between the LAN
and the WAN.
Week 1: Lesson 1
Configure SOHO Networks
Layer 1 (Physical Layer)
• SOHO router provides physical connection through a few
RJ-45 ports or radio antennas to a local network (cable or
wireless)
Week 2: Lesson 3
Ethernet Standards

• Ethernet Standards

• Data Transmission
Week 2: Lesson 3
Attendance code for 02/10/2024

•h36bhc
Week 1: Lesson 1
OSI Model recap
Reference Layer Devices

Application Interface for software Multilayer switches

Presentation Character set Multilayer switches


conversion ASCII
Session Dialogue Multilayer switches

Transport Frames & Datagrams Multilayer switches, Firewalls, IDS

Network IP Packets Router, Layer 3 Switch

Data Frames Bridge, Switch, Wireless Access Point, NIC

Physical Bits Hub, Repeater, Transreceiver


Week 1: Lesson 1
Configure SOHO Networks
Local Area Networks
A single network in a location

Small Office/ Home Office Networks


category of LAN with a small number of computing hosts
that typically rely on a single integrated appliance for local
and Internet connectivity.

Wide Area Networks


A network located in different geographical location with
shared links
Week 1: Lesson 1
Configure SOHO Networks
Layer 1 (Physical Layer)
• SOHO router provides physical connection through a few
RJ-45 ports or radio antennas to a local network (cable or
wireless)

• A number of RJ-45 ports (typically four) to connect to a


local cabled network. These are typically labeled as the
LAN ports.

• Radio antennas to transmit and receive wireless signals.

• A type of modem (typically cable or digital subscriber


line) to connect to the Internet Service Provider's (ISP's)
network.
Week 1: Lesson 1
Configure SOHO Networks
• This is typically labeled as the WAN port. On the example
in the diagram, the interface is another RJ-45 port,
designed to connect to a fiber to the premises Internet
service using the same Ethernet technology as the local
network. On other SOHO routers, there may be a different
type of WAN modem, such as an RJ-11 port to connect to
a digital subscriber line (DSL) service.
Week 1: Lesson 1
Configure SOHO Networks
Layer 2
the SOHO router functions

Ethernet switch—the RJ-45 jacks are connected internally by


an Ethernet switch.

Wireless access point—the radio antennas implement some


version of the Wi-Fi standard. The access point functions as
a wireless hub, allowing stations (PCs, tablets, smartphones,
and printers) to form a wireless network. The access point it
also wired to the Ethernet switch via an internal port. This
forms a bridge between the cabled and wireless segments,
creating a single logical local network.
Week 1: Lesson 1
Configure SOHO Networks
Layer 3, the network layer, the routing part of the SOHO
router makes forwarding decisions between the local private
network and public Internet. These zones are distinguished
by internet protocol (IP) addresses. The local network uses a
private IP address range, such as 192.168.1.0/24. The
SOHO router itself is identified by an address in this range,
such as 192.168.1.1 or 192.168.1.254.
Week 1: Lesson 1
Configure SOHO Networks
The WAN interface is the network perimeter. The SOHO
router can apply filtering rules to traffic sent between the
public and private zones, implementing a firewall. The
firewall can be configured to block traffic based on source or
destination IP addresses and also on the type of application.

At layer 4, each application is identified by a port number,


such as 80 for hypertext transfer protocol (HTTP) web traffic
or 25 for Simple Mail Transfer Protocol (SMTP) email traffic.
Week 1: Lesson 1
Configure SOHO Networks
The WAN interface of the router connects the SOHO
network to the Internet.

SOHO router can be called customer premises equipment


(CPE)

Internet Service Providers: The major infrastructure of the


Internet consists of high bandwidth trunks connecting
Internet eXchange Points (IXPs)
Week 1: Lesson 1
Configure SOHO Networks
Internet Standard
• Internet Assigned Numbers Authority (IANA) (iana.org)
• Internet Engineering Task Force (IETF) (ietf.org)
Week 1: Lesson 1
Configure SOHO Networks
Hexadecimal notation

Binary notation

Decimal notation
Week 1: Lesson 1
Configure SOHO Networks
Week 1: Lesson 1
Configure SOHO Networks
Step 1: Download packet tracer
https://www.netacad.com/resources/lab-downloads?courseLang=e
n-US

Packet Tracer 8.2.2 MacOS 64bit


Packet Tracer 8.2.2 Ubuntu 64bit
Packet Tracer 8.2.2 Windows 64bit

Step 2. Launch the Packet Tracer install program.


Step 3. Launch Cisco Packet Tracer by selecting the appropriate
icon.
Step 4. When prompted, click on Skills For All green button to
authenticate.
Step 5. Cisco Packet Tracer will launch, and you are ready to
Week 1: Lesson 1
Configure SOHO Networks
Router>enable [ privileged exec mode]
Router#config t [global configuration
mode]
Router(config)#hostname Eduvos-router [label your router]
Eduvos-router(config)# enable secret class [set encrypted password]
Eduvos-router(config)# line con 0 [configure password for console]
Eduvos-router(config-line)# password cisco [set the password]
Eduvos-router(config-line)# login [password prompt]
Eduvos-router(config-line)# exit [return to global config mode]
Eduvos-router(config)# line vty 0 4 [configure password for virtual
terminal lines]
Eduvos-router(config-line)# password cisco [set the password]
Eduvos-router(config-line)# login [password prompt]
Eduvos-router(config-line)# exit [return to global config mode]
Week 1: Lesson 1
Configure SOHO Networks
Eduvos-router(config)# int fa0/0 [configure FastEthernet]
Eduvos-router(config-if)# ip add 192,168,1,1 255,255,255,0 [configure
IP address]
Eduvos-router(config-if)# desc Router FastEthernet0/0 [describe the
interface]
Eduvos-router(config-if)# no shutdown [start the interface]
Eduvos-router(config-if)# exit [return to global config mode]
Eduvos-router(config)# int fa0/1 [configure FastEthernet]
Eduvos-router(config-if)# ip add 192,168,2,1 255,255,255,0 [configure
IP address]
Eduvos-router(config-if)# desc Router FastEthernet0/1 [describe the
interface]
Eduvos-router(config-if)# no shutdown [start the interface]
Eduvos-router(config-if)# exit [return to global config mode]
Week 1: Lesson 1
Configure SOHO Networks
Eduvos-router()# exit [Hit Enter]
Eduvos-router()# show running-config [display current configuration] [Hit
Enter]
Eduvos-router()# copy running-config startup-config [Hit Enter]

Set static IP address on PC0


Desktop
Select Static
Type 192,168,1,1

Set static IP address on PC1


Desktop
Select Static
Type 192,168,2,1
Week 1: Lesson 1
Configure SOHO Networks
Ping PC1 from PC0
Ping 192,168,2,2
You should get a reply

Simulation mode
Show all
Edit
Select ICMP
Pick a PDU
Click the PDU on PC0 and on PC1
Observe how the PDU travels on the network
Week 1: Lesson 3
Ethernet Cabling
• Network Data Transmission

• Ethernet Standards
Week 1: Lesson 3
Ethernet Cabling
• Data is transmitted via
electromagnetic radiation

• This could be through electric current,


infra-red, or radio waves

• Type of media determines the


bandwidth or range of frequency
Week 1: Lesson 3
Ethernet Cabling
Ethernet standards provide the
assurance that network cabling will
meet the bandwidth requirements of
applications. The standards specify the
bit rate that should be achieved over
different types of media up to the
supported distance limitations.
Week 1: Lesson 3
Ethernet Cabling
Ethernet standard specifications are
named using a three-part convention,
which is often referred to as xBASE-y.
This describes:

The bit rate in megabits per second


(Mbps) or gigabits per second (Gbps).
Week 1: Lesson 3
Ethernet Cabling
Ethernet Standards
• The signal mode (baseband or broadband). All
mainstream types of Ethernet use baseband
transmissions, so you will only see
specifications of the form xBASE-y.
Week 1: Lesson 3
Ethernet Cabling
Ethernet Standards
• A designator for the media type.
For example, 10BASE-T denotes an early
implementation that works at 10 Mbps (10), uses
a baseband signal (BASE), and runs over twisted
pair copper cabling (-T).
Week 1: Lesson 3
Ethernet Cabling
Media Access Control and Collision
Domains

Media access control (MAC) refers to the


methods a network technology uses to
determine when nodes can communicate
on shared media and to deal with possible
problems, such as two devices attempting
to communicate simultaneously.
Week 1: Lesson 3
Ethernet Cabling
100BASE-TX Fast Ethernet Standard

•The Fast Ethernet standard uses the same


CSMA/CD protocol as 10BASE-T but with
higher frequency signaling and improved
encoding methods, raising the bit rate from
10 Mbps to 100 Mbps.
Week 1: Lesson 3
Ethernet Cabling
100BASE-TX Fast Ethernet Standard

•100BASE-TX refers to Fast Ethernet


working over Cat 5 (or better) twisted pair
copper cable with a maximum supported
link length of 100 meters (328 feet)
Week 1: Lesson 3
Ethernet Cabling
100BASE-TX Fast Ethernet Standard

•100BASE-TX refers to Fast Ethernet


working over Cat 5 (or better) twisted pair
copper cable with a maximum supported
link length of 100 meters (328 feet)
Week 1: Lesson 3
Ethernet Cabling
Gigabit Ethernet Standards

Gigabit Ethernet builds on the standards defined


for Ethernet and Fast Ethernet to implement
rates of 1000 Mbps (1 Gbps). Over copper wire,
Gigabit Ethernet is specified as 1000BASE-T,
working over Cat 5e or better. Gigabit Ethernet
does not support hubs; it is implemented only
using switches.
Week 1: Lesson 3
Ethernet Cabling
Gigabit Ethernet Standards

Gigabit Ethernet builds on the standards defined


for Ethernet and Fast Ethernet to implement
rates of 1000 Mbps (1 Gbps). Over copper wire,
Gigabit Ethernet is specified as 1000BASE-T,
working over Cat 5e or better. Gigabit Ethernet
does not support hubs; it is implemented only
using switches.
Week 1: Lesson 3
Ethernet Cabling
Gigabit Ethernet Standards

Gigabit Ethernet builds on the standards defined


for Ethernet and Fast Ethernet to implement
rates of 1000 Mbps (1 Gbps). Over copper wire,
Gigabit Ethernet is specified as 1000BASE-T,
working over Cat 5e or better. Gigabit Ethernet
does not support hubs; it is implemented only
using switches.
Week 2: Lesson 2
Deploying Ethernet Cabling
• Summarize Ethernet standards

• Summarize copper cabling types.

• Summarize fiber optic cabling


types.

• Deploy Ethernet cabling.


Week 2: Lesson 2
Deploying Ethernet Cabling
Learning Outcome

• Demonstrate an understanding of networking


principles.

• Demonstrate knowledge about the


communication principles of networks.
Week 2: Lesson 2
Deploying Ethernet Cabling

Types of Cable

• Copper

• Fibre
Week 2: Lesson 2
Deploying Ethernet Cabling

Types of Copper Cable

Unshielded Twisted Pair Cable

• One pair of insulated wires twisted


together forms a balanced pair.
Week 2: Lesson 2
Deploying Ethernet Cabling

Types of Copper Cable

Unshielded Twisted Pair Cable

•The pair carry the same signal but


with different polarity; one wire is
positive, and the other is negative.
Week 2: Lesson 2
Deploying Ethernet Cabling

Types of Copper Cable

Unshielded Twisted Pair Cable

This allows the receiver to distinguish the


signal from any noise more strongly. The
cable is completed with an insulating outer
jacket.
Week 2: Lesson 2
Deploying Ethernet Cabling

Types of Copper Cable

Shielded and Screened Twisted


Pair Cable

• Shielded cable is less susceptible


to interference and crosstalk.
Week 2: Lesson 2
Deploying Ethernet Cabling

Types of Copper Cable

Shielded and Screened Twisted


Pair Cable

•This type of cable is required for some Ethernet


standards and may also be a requirement in
environments with high levels of interference.
Week 2: Lesson 2
Deploying Ethernet Cabling

Types of Copper Cable

Shielded and Screened Twisted


Pair Cable

•Shielded cable can be referred to generically as


shielded twisted pair (STP),
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards

• These Ethernet media specifications are


named using a three-part convention,
which is often referred to as xBASE-y.
This describes:
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards

• The bit rate in megabits per second


(Mbps) or gigabits per second (Gbps).
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards

• The signal mode (baseband or


broadband). All mainstream types of
Ethernet use baseband transmissions, so
you will only see specifications of the
form xBASE-y.
• A designator for the media type.
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards

• For example, 10BASE-T denotes an early


implementation that works at 10 Mbps
(10), uses a baseband signal (BASE), and
runs over twisted pair copper cabling (-
T).
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards

• American National Standards Institute


(ANSI)

• Telecommunications Industry Association


(TIA)/Electronic Industries Alliance (EIA)
Week 2: Lesson 2
Deploying Ethernet Cabling

Attendance code

ltglty
08-10-2024 15h00 – 17h00
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards: Copper

•Twisted pair copper cabling


uses Registered Jack (RJ) connectors
for the physical interface. There are
many different types of RJ connector,
identified by numbers (and sometimes
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards: Copper

• American National Standards Institute


(ANSI)

• Telecommunications Industry Association


(TIA)/Electronic Industries Alliance (EIA)
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards : Copper

•Each conductor in a 4-pair data cable is


color-coded. Each pair is assigned a color
(Blue, Orange, Green, or Brown).
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards: Copper

•The first conductor in each pair has a


predominantly white insulator with strips of
the color; the second conductor has an
insulator with the solid color
Week 2: Lesson 2
Deploying Ethernet Cabling

Cable Standards: Copper

•The first conductor in each pair has a


predominantly white insulator with strips of
the color; the second conductor has an
insulator with the solid color
Week 2: Lesson 2
Deploying Ethernet Cabling

Fibre

• Fiber optic signaling uses pulses of


infrared light, which are not
susceptible to interference, cannot
easily be intercepted, and suffer less
from attenuation.
Week 2: Lesson 2
Deploying Ethernet Cabling

Fibre

Consequently, fiber optic cabling


supports higher bandwidth over longer
cable runs (that can be measured in
kilometers, rather than meters).
Week 2: Lesson 2
Deploying Ethernet Cabling

Fibre

Consequently, fiber optic cabling


supports higher bandwidth over longer
cable runs (that can be measured in
kilometers, rather than meters).
Week 2: Lesson 2
Deploying Ethernet Cabling

Fibre Optics

Consequently, fiber optic cabling


supports higher bandwidth over longer
cable runs (that can be measured in
kilometers, rather than meters).
Week 2: Lesson 2
Deploying Ethernet Cabling

Fibre Optics
1. Single Mode Fiber (SMF)
2. Multimode Fiber (MMF)
Week 2: Lesson 2
Deploying Ethernet Cabling

Fibre Optics
1. Single Mode Fiber (SMF) has a
small core (8 to 10 microns) and a
long wavelength, near-infrared
(1310 nm or 1550 nm) light signal,
generated by a laser.
Week 2: Lesson 2
Deploying Ethernet Cabling

Fibre Optics
2. Multimode Fiber (MMF) has a
larger core (62.5 or 50 microns) and
shorter wavelength light (850 nm or
1300 nm) transmitted in multiple
waves of varying lengths.
Week 2: Lesson 2
Deploying Ethernet Cabling

Fibre Optics
MMF uses less expensive optics and
consequently is less expensive to
deploy than SMF.
Week 2: Lesson 2
Deploying Ethernet Cabling

Fiber Optic Connector Types

•Straight Tip

•Mechanical Transfer Registered Jack


Week 2: Lesson 2
Deploying Ethernet Cabling

Fiber Optic Connector Types

•Straight Tip

•Mechanical Transfer Registered Jack


Week 2: Lesson 2
Deploying Ethernet Cabling

Fiber Ethernet Standards

Ethernet standards over fiber set out


the use of different cable types for 100
Mbps, 1 Gbps, and 10 Gbps operation.
The table below shows the different
fiber standards
Week 2: Lesson 2
Deploying Ethernet Cabling

Finishing Type

The core of a fiber optic connector is a


ceramic or plastic ferrule that holds the
glass strand and ensures continuous
reception of the light signals. The tip of the
ferrule can be finished in one of three
formats:
Week 2: Lesson 2
Deploying Ethernet Cabling

•Physical Contact (PC)


•Ultra Physical Contact (UPC)
•Angled Physical Contact (APC)
Week 2: Lesson 2
Deploying Ethernet Cabling

•Physical Contact (PC)


•Ultra Physical Contact (UPC)
•Angled Physical Contact (APC)
Week 2: Lesson 5
Deploying Ethernet Cabling

•Physical Contact (PC)


•Ultra Physical Contact (UPC)
•Angled Physical Contact (APC)
Week 2: Lesson 5
Deploying Ethernet Cabling

Attendance code

8il05c
09-10-2024 08h00 – 09h50
Week 2: Lesson 5
Deploying Ethernet Cabling

Structured Cabling

Horizontal cabling refers to the cabling system that connects


telecommunications rooms (TRs) to individual workstations
or devices on the same floor of a building. It typically
includes the cabling that runs between the equipment room
(ER) or telecommunications closet (TC) and the wall outlets
or work area endpoints.
Week 2: Lesson 5
Deploying Ethernet Cabling

Structured Cabling

Wall socket
Week 2: Lesson 5
Week 2: Lesson 5

Punch-down
Block
A punch-down block is a
connection device that allows wires to be
terminated and connected
using insulation-
displacement connection
(IDC) terminals, where the
wire is "punched down" into
the block with a special tool,
securing the connection
without needing to strip the
wire's insulation
Week 2: Lesson 5
Deploying Ethernet Cabling
Punch-down block

• 66 Block
• 110 Block
• BIX and Krone Distribution Frames
• Patch Panel/Patch Bay
Week 2: Lesson 5
Deploying Ethernet Cabling
Punch-down block

• 66 Block
• 110 Block
• BIX and Krone Distribution Frames
• Patch Panel/Patch Bay
Week 2: Lesson 5
Deploying Ethernet Cabling

Wiring Tools and Techniques

• Electrician’s scissors (snips)


• cable stripper
• punchdown tool
• cable crimper.
Week 2: Lesson 5
Deploying Ethernet Cabling

Wiring Tools and Techniques

• Electrician’s scissors (snips)


• cable stripper
• punchdown tool
• cable crimper.
Week 2: Lesson 5
Deploying Ethernet Cabling

Fiber Distribution Panels and Fusion


Splicing
Week 2: Lesson 5
Deploying Ethernet Cabling

Fiber Distribution Panels and Fusion


Splicing

Permanent cables are run through conduit-to-wall


ports at the client access end and a fiber
distribution panel at the switch end. Fiber patch
cables are used to complete the link from the wall
port to the NIC and from the patch panel to the
switch port. The Fibre distribution Pannel is shown
Week 2: Lesson 5
Week 2: Lesson 5
Deploying Ethernet Cabling

Fiber transceiver
A transceiver is used when different cable types to
convert from one cable type to another for
example from fiber to ethernet or vice versa.

•Enterprise switches and routers are available with


modular, hot-swappable transceivers/media
converters for different types of fiber optic patch
cord connections.
Week 2: Lesson 5
Deploying Ethernet Cabling

Fiber transceiver
The following are media converter form
factors;

•Gigabit Interface Converter (GBIC) form


factor
•Small Form Factor Pluggable (SFP)
•Quad small form-factor pluggable (QSFP)
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Demonstrate understanding of wireless


networks
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Attendance code

wyqacz
10-10-2024 15h00 – 16h50
Week 3: Lesson 6
OSI model review

https://youtu.be/vv4y_uOneC0?si=QVU
PnvzJAwU0B_JU
Computer Networking
Technologies
ITCTA1

Eduvos (Pty) Ltd (formerly Pearson Institute of Higher Education) is registered with the Department of Higher Education and Training as a private higher education institution under the
Higher Education Act, 101, of 1997. Registration Certificate number: 2001/HE07/008
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Demonstrate understanding of wireless


networks
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Attendance code

3luasr
15-10-2024 15h00 – 16h50
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
• Explain how signals are interchanged between
nodes

• Determine the crucial aspects of wireless


transmission

• Design the architecture of a wireless LAN

• Distinguish between the different wireless


protocols
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Attendance 5 min
Review of last lesson 10 min
First session 35 min
Break 10 min
Second session 25 min
Question & Answer 20 min
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
A Collision Domain is a network segment where
data packets can "collide" with one another when
two devices attempt to send messages
simultaneously

A Broadcast Domain is a network segment


where a broadcast message sent by one device is
received by all other devices within the same
domain
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Hubs

Functionality: Hubs are basic networking


devices that operate at OSI Layer 1 (Physical
Layer).

They do not differentiate between devices


connected to them and simply forward all
incoming signals to all ports.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Hubs

Collision Domains: All devices connected to a


hub share a single collision domain.

This means that when multiple devices try to


send data at the same time, a collision occurs,
and the devices need to retransmit the data.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Hubs

Broadcast Domains: Hubs do not separate


broadcast domains. Any broadcast or multicast
traffic is sent to all devices connected to the
hub.

Therefore, the entire network connected to the


hub shares a single broadcast domain.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Hubs

Half-Duplex Operation: Devices connected to a


hub operate in half-duplex mode, meaning they
can either send or receive data, but not both
simultaneously.

This increases the chance of collisions,


especially in larger networks.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters

Functionality: Repeaters also operate at OSI


Layer 1 (Physical Layer).

Their main function is to regenerate or amplify


network signals to extend the physical distance
over which data can travel without signal
degradation.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters

Collision Domains: Like hubs, repeaters do not


create separate collision domains. All devices
connected through a repeater remain part of
the same collision domain.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters

Broadcast Domains: Repeaters do not impact


broadcast domains either.

They simply pass on the electrical signal, and


broadcast traffic will continue to be sent to all
connected devices in the network segment,
maintaining a single broadcast domain.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters

Duplex Mode: Repeaters do not influence duplex


modes directly but are typically part of a network
where half-duplex is used.

However, they are transparent to this, meaning


the devices connected can operate in half-duplex
or full-duplex depending on the network
configuration.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters

Duplex Mode: Repeaters do not influence duplex


modes directly but are typically part of a network
where half-duplex is used.

However, they are transparent to this, meaning


the devices connected can operate in half-duplex
or full-duplex depending on the network
configuration.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Both hubs and repeaters operate at OSI Layer


1 (Physical Layer) and do not have any logic to
manage traffic, separate collision or broadcast
domains, or control duplex communication.

They simply forward signals to all devices, which


can lead to performance issues in larger
networks.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Bridges

Functionality: A bridge is a device that operates


at OSI Layer 2 (Data Link Layer). It is used to
divide a large network into smaller segments,
reducing collisions and improving network
efficiency.

A bridge inspects incoming data packets,


determines the destination, and then forwards
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Bridges

Collision Domains: Bridges create separate


collision domains. This means each network
segment connected to a bridge has its own
collision domain, reducing the chance of
collisions and improving network performance.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Bridges

Broadcast Domains: A bridge does not separate


broadcast domains. Devices connected to the
bridge still share a single broadcast domain,
so broadcast traffic will be forwarded to all
segments.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Bridges

Duplex Mode: Bridges allow devices to operate in


full-duplex mode, meaning devices can send
and receive data simultaneously, which reduces
collisions and improves throughput.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Attendance code

mtvaej
16-10-2024 08h00 – 09h50
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches
Functionality: A switch, like a bridge, operates at
OSI Layer 2 (Data Link Layer). It is essentially a
multi-port bridge with the ability to intelligently
forward packets based on MAC addresses.

Switches maintain a MAC address table that


maps each device to its corresponding port,
ensuring that data is only sent to the device it's
intended for.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches

Collision Domains: Switches create separate


collision domains for each port. Each device
connected to a switch has its own dedicated
collision domain, which virtually eliminates
collisions and improves network efficiency.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches

Broadcast Domains: By default, all devices


connected to a switch still share a single
broadcast domain, meaning broadcast traffic is
sent to all ports.

However, switches can also be configured with


VLANs (Virtual LANs), which allow the creation of
multiple broadcast domains within a switch.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches

Duplex Mode: Switches support full-duplex


communication, allowing devices to send and
receive data simultaneously.

This further enhances network performance by


reducing the potential for collisions.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Key Differences:
Collision Domains: Both bridges and switches create separate
collision domains, but switches do so more effectively since each
port has its own collision domain.

Broadcast Domains: Both devices allow a single broadcast domain


by default, but switches can be configured with VLANs to separate
broadcast domains.

Ports: Bridges typically have fewer ports, often just two (one for
each network segment), while switches have many more ports,
making them suitable for larger networks.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Summary
• Bridges and switches operate at OSI Layer 2 (Data Link Layer).

• Both help reduce collisions by creating separate collision


domains.

• Both maintain a single broadcast domain unless VLANs are


configured (for switches).

• Switches are more scalable and offer better performance than


bridges, as they provide a dedicated collision domain for each
connected device.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Short break

Classes resume 09h10


Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Functionality: A router operates at OSI Layer 3
(Network Layer). Its primary function is to route
data between different networks by examining
the destination IP address in each data packet.

Routers use routing tables and protocols to


determine the best path for forwarding packets to
their destination across interconnected networks,
such as the internet.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Collision Domains: Routers do not directly affect
collision domains, but they separate networks
into different collision domains.

Each interface of a router connects to a different


network segment, and each segment has its own
collision domain. This improves network
performance because collisions are confined to
individual network segments
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Broadcast Domains: Routers separate
broadcast domains. A router does not forward
broadcast traffic (such as ARP requests) from one
network to another.

This ensures that broadcast traffic stays within its


local network, reducing unnecessary congestion
in other networks.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Duplex Mode: Routers typically support full-
duplex communication, allowing data to be
sent and received simultaneously on each
network interface.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Routing: Routers determine the best path for
data using routing protocols such as OSPF
(Open Shortest Path First), BGP (Border
Gateway Protocol), or RIP (Routing Information
Protocol).

These protocols enable routers to communicate


with each other, share information about
network topology, and dynamically adjust
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters
Functionality: A media converter is a device that operates
at OSI Layer 1 (Physical Layer) and sometimes at OSI
Layer 2 (Data Link Layer) if it deals with frame
conversion.

Its main purpose is to convert signals between different


types of media, such as copper (Ethernet) and fiber optic
cabling. Media converters allow different physical media
types to coexist within the same network, enabling
seamless data transmission across diverse network
infrastructure.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters
Collision Domains: Since media converters operate at the
physical or data link layer, they do not affect collision
domains. Devices connected to a media converter still
share the same collision domain, similar to how hubs and
repeaters function.

The media converter simply changes the signal type


without managing traffic or collisions.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters
Broadcast Domains: Media converters also do not
separate broadcast domains. Any broadcast traffic on one
side of the media converter will be forwarded to the other
side.

Broadcast traffic remains intact as the converter only


handles the physical or frame conversion of data.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters
Duplex Mode: Media converters can support both half-
duplex and full-duplex modes, depending on the network
devices connected to them.

However, the converter itself doesn't manage duplex


settings, as its function is purely related to signal
conversion.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters Types
1. Copper to Fiber Converters
2. Single-mode to Multi-mode Fiber Converters
3. Ethernet Speed Converters:
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Types of Media Converters:
1. Copper to Fiber Converters: These are the
most common media converters, used to
connect copper Ethernet networks (using
twisted pair cables) to fiber optic networks,
enabling extended network reach due to
fiber's longer transmission distances.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Types of Media Converters:
2. Single-mode to Multi-mode Fiber
Converters:
These are used to connect different types
of fiber optic cables. Single-mode fiber is
typically used for long-distance
transmission, while multi-mode fiber is
used for shorter distances.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Types of Media Converters:
3. Ethernet Speed Converters: Some media
converters can convert data rates, allowing
devices with different Ethernet speeds
(e.g., 10/100/1000 Mbps) to communicate
over the same network.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Transmission Media
1. Copper cabling
1. Coaxial cable,
2. Twisted pair cable

2. Fiber Optic Cabling


1. Single-mode fiber
2. Multimode fiber

3. Wireless transmission
1. Radio waves
2. Microwaves
3. Infrared waves
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Interfaces
The Network Interface Card (NIC) provides the physical
interface between the transmission medium (such as Ethernet)
and the device (node).

Ethernet cabling support 10/100/1000 operation


• 10BASE-T (10 Mbps)

• Fast Ethernet (100 Mbps)

• Gigabit Ethernet (1000 Mbps)


Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
When data is transmitted over Ethernet, it is encapsulated within
a structure known as a frame. The Ethernet frame contains
various headers and fields that control how data is handled by the
network. An Ethernet frame includes information such as source
and destination MAC addresses, the data payload, and error-
checking codes to ensure that the data is received intact.

Preamble SFD Destination


MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
1. Preamble (7 Bytes)
The preamble consists of alternating 1s and 0s, and its
main function is to synchronize communication between
sender and receiver by indicating the start of a frame.

Preamble SFD Destination


MAC MAC
Source Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Attendance code

y5g9o2
17-10-2024 15h00 – 16h50
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
2. Start Frame Delimiter (SFD) (1 Byte)
This is a specific sequence (10101011) that
marks the end of the preamble and signals
the actual beginning of the Ethernet frame.
Preamble SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
3. Destination MAC Address (6 Bytes)
This field contains the MAC address of the
device that is intended to receive the
frame. It's used to identify the receiver
within the local network.
Preamble
SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
4. Source MAC Address (6 Bytes)
This field contains the MAC address of the
device that is sending the frame. It
identifies the sender.

Preamble SFD Destination


MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
5. EtherType / Length (2 Bytes)
If the value is greater than 1536 (0x0600 in hexadecimal), it indicates
the EtherType, which specifies the protocol encapsulated in the frame
(e.g., IPv4, ARP). If the value is less than or equal to 1536, it specifies
the length of the payload in bytes.

Preamble SFD Destination


MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
6. Payload (46–1500 Bytes)
This is the actual data being transmitted. It
contains the encapsulated protocol data (such as
an IP packet). If the payload is less than 46 bytes,
padding is added to meet the minimum Ethernet
frame size of 64 bytes.
Preamble
SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
7. Frame Check Sequence (FCS) (4 Bytes)
The FCS is a checksum value used to detect errors
in the frame. The sender calculates a Cyclic
Redundancy Check (CRC) and appends it here. The
receiver recalculates the CRC and compares it to
this value to ensure data integrity.
Preamble SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
• Preamble – Synchronizes sender and receiver.
• SFD – Marks the start of the frame.
• Destination MAC Address – Identifies the receiving device.
• Source MAC Address – Identifies the sending device.
• EtherType/Length – Identifies the protocol or specifies the
frame length.
• Payload – Carries the data being transmitted.
• FCS – Ensures data integrity through error checking.

Preamble SFD Destination


MAC MAC
Ether Payload
Source
TypeFormat
FCS
Basic Ethernet Frame
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Short break

Classes resume 16h10


Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting
• Protocol analyzers
• Packet sniffers

A protocol analyzer inspects the traffic received by a host or passing


over a network link, providing deep insights into the protocols in use,
the structure of the frames, and any potential issues.

A packet sniffer is a specific type of protocol analyzer used to


Preamble
capture frames as they move across the network. For
example, Wireshark
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting
• Protocol analyzers
• Packet sniffers

A protocol analyzer inspects the traffic received by a host or passing


over a network link, providing deep insights into the protocols in use,
the structure of the frames, and any potential issues.

A packet sniffer is a specific type of protocol analyzer used to


Preamble
capture frames as they move across the network. For
example, Wireshark
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting
• Protocol analyzers
• Packet sniffers

A protocol analyzer inspects the traffic received by a host or passing


over a network link, providing deep insights into the protocols in use,
the structure of the frames, and any potential issues.

A packet sniffer is a specific type of protocol analyzer used to


Preamble
capture frames as they move across the network. For
example, Wireshark
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Evaluation
A network is a system of interconnected devices,
such as computers, servers, printers, and other
equipment, that communicate and share resources

Networks operate through a combination of


hardware and software. Devices communicate by
sending data in small units called packets. These
Preamble
packets travel across the network using switches
and routers, which ensure that the data reaches its
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Evaluation
The process of communication within a network
relies on protocols. The most common protocol is
the Internet Protocol (IP), which provides unique
addresses to devices on the network, allowing
them to communicate effectively.

Another key protocol is Transmission Control


Preamble
Protocol (TCP), which ensures that data is
transmitted reliably between devices.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Why Networks are Important
Networks play a crucial role in both personal and
business environments for several key reasons:

• Resource sharing – hardware, file, software


• Data access & Collaboration – share data and
collaboration in real time
• Communication - email, messages, video
Preamble
conferencing
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Why Networks are Important
Networks play a crucial role in both personal and
business environments for several key reasons:

• Scalability – expansion
• Security and centralized management – data
access, security policies, monitoring across
connected devices
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Why is Network Evaluation Important
• Performance lapses – bandwidth, inefficient routing, high
latency (delay in data transfer)

• Security – firewalls, encryption, access control

• Reliability – uninterrupted service

• Scalability – Growth(devices)
Preamble
• Compliance – regulatory standards
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Steps in Network Evaluation
1. Document your Network Infrastructure

2. Monitor your Network’s Performance

3. Security (audits)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Attendance code

qvu5xl
22-10-2024 15h00 – 16h50
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Steps in Network Evaluation
1. Document your Network Infrastructure

2. Monitor your Network’s Performance

3. Security (audits)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Steps in Network Evaluation
1. Document your Network Infrastructure

2. Monitor your Network’s Performance

3. Security (audits)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Steps in Network Evaluation
4. Network Policy review

5. Check device health (firmware, software bugs,


hardware failures)

6. Create action plan (upgrade, network configs,


new security measures)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Evaluation Tools
• Network monitoring tools e.g. SolarWinds, PRTG,
Nagio

• Vulnerability scanners e.g. Nessus, OpenVAS


checks for outdated software, misconfigurations
or weak encryption protocols
Preamble
• Bandwidth analysis tools e.g. Wireshark, Netflow
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
1. Identify the problem
2. Establish a theory of probable cause
3. Test theory to determine cause
4. Establish a plan of action to resolve the problem and
identify potential effects
5. Implement the solution or escalate as necessary
6. Verify full system functionality if applicable and
implement preventive measures
Preamble
7. Document finding, actions and outcomes
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
1. Cable issues

Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
2. Network interface card
• Solid green—The link is connected but there is no traffic.
• Flickering green—The link is operating normally (with traffic).
The blink rate indicates the link speed.
• No light—The link is not working, or the port is shut down.
• Blinking amber—A fault has been detected (duplex mismatch,
excessive collisions, or redundancy check errors, for instance).
• Solid amber—The port is blocked by the spanning tree algorithm,
which works to prevent loops within a switched network.

Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
3. Cable tester

Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
3. Wire map testers and tone generators

Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
4. Attenuation and Interference Issues
Cross talk
Termination
Bad cable
Poor network connectors
Interference
Electrical ampliances
Industrial areas
Data centers

Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
5. Fibre optic cable testing tools
• Fiber Light Meter: Measures optical power (in dBm or μW) to verify
signal strength and detect losses.

• Optical Spectrum Analyzer (OSA): Analyzes optical spectrum to


identify wavelength, power, and signal quality.
• Optical Time Domain Reflectometer (OTDR): Measures fiber length
detects faults and locates breaks or losses along the fiber cable.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
Fibre optics
• Dirty optical cables
• Incorrect transceivers

Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Components
• Network Interface Card
• Cabling and connectors
• Crimping Process
• Routers
• Access Points
• Firewall
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Functions of a Router
• Routing traffic between networks
• IP addressing (NAT: private to public address)
• Firewall and Security
• Dynamic and Static routing
• RIP, OSPF, BGP
• Load balancing
• Wireless access
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches

When a switch receives data, it examines the destination


MAC address and directs the data only to the specific
device connected to the corresponding port, thus
preventing broadcast traffic from overwhelming the
network.

This feature, known as unicast forwarding, is particularly


Preamble
useful in environments where multiple devices are active,
such as in office buildings or enterprise networks
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
When to use a Switch
• When multiple devices need to communicate
within a single network (LAN)
• When connecting servers, storage system and
network equipment in data centers
• When increasing bandwidth between devices
(link aggregation)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Evaluation Tools

Tools for evaluating a network's performance, security, and overall health include

• Network Monitoring Tools: Tools such as SolarWinds, PRTG, and Nagios


provide real-time insights into network traffic, bandwidth usage, and device
health. They can alert administrators to potential performance issues before
they become major problems.

• Vulnerability Scanners: Tools like Nessus and OpenVAS are used to scan for
known security vulnerabilities within the network, such as outdated software,
misconfigurations, or weak encryption protocols.

• Bandwidth Analysis Tools: Wireshark and NetFlow help analyze network


traffic patterns and identify bandwidth bottlenecks that could impact network
performance and reliability.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Configuring Network devices
• Physical setup
• IP Addressing and NAT
• Routing configuration
• Security setup
• Wireless setup

Preamble
Week 4: Lesson 6
IPv4 Addressing
Learning Outcomes

Demonstrate understanding of how computer


communicate in a network

Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Attendance code

ngnu6d
23-10-2024 08h00 – 09h50
Week 4: Lesson 6
IPv4 Addressing
Learning Outcomes

1.1 Explain what computer networks are


1.2 Compare and contrast the Open Systems Interconnection (OSI) model layers
and encapsulation concepts.
1.3 Explore the applicability of the OSI layers in transmission of data in a network.
1.4 Configure SOHO networks..
1.5 Describe addressing and distinguish between an IP address and a MAC
address
1.6 Describe the process of a domain name server resolution and the role of an
IP address.
1.7 Demonstrate an understanding of how addressing works and the roles of IP
and MAC Addresses.
Week 4: Lesson 6
IPv4 Addressing
IP addresses provides logical addressing and packet
forwarding or routing between different networks
Week 4: Lesson 6
IPv4 Addressing
IP addressing is the process of assigning unique
logical address to devices on a network for
communication

• Routing
• Network organization
• Device identification
• Network security
Week 4: Lesson 6
IPv4 Addressing
- IP Address Structure: IP addresses consist of 32-bit (IPv4) or 128-bit (IPv6) binary numbers, typically represented
in dotted decimal (IPv4: xxx.xxx.xxx.xxx) or hexadecimal (IPv6: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx) notation.

- IP Address Classes: IPv4 addresses are divided into five classes (A-E), determining the network and host portions.
IPv6 does not use classful addressing.

- Subnet Mask: A subnet mask determines the network portion of an IP address, allowing for subnetting and
supernetting.

- Public vs. Private IP Addresses: Public IP addresses are routable on the internet, while private IP addresses (e.g.,
192.168.x.x, 10.x.x.x) are used internally and require NAT (Network Address Translation) for internet access.

- IPv4 vs. IPv6: IPv4 (32-bit) has limited address space, whereas IPv6 (128-bit) provides vastly more addresses,
supporting future internet growth and IoT devices.
Week 4: Lesson 10
IPv4 Addressing
Addressing at Different Layers
• Data Link Layer MAC Address: Every Network Interface Card (NIC) in the world is
assigned a unique MAC address at the Data Link Layer. A MAC address is a 48-bit
identifier usually written as six hexadecimal digits separated by colons (e.g.,
00:60:8C:00:54:99). MAC addresses allow devices within a local area network (LAN) to
communicate with each other. MAC addressing is essential for device-to-device
communication within the same network segment.

• Network Layer IP Address: An IP address is issued to every network interface or


node connection at the Network Layer. If a device’s IP address is publicly accessible on
the Internet, it can be located by other devices. Browsers, applications, and services rely
on IP addresses to send and retrieve information. The primary function of an IP address is
for routing traffic between devices on different
Week 4: Lesson 10
IPv4 Addressing
IP Addressing
There are two main methods to assign an IP address to a device:
•Static IP Addressing: A static IP address is manually assigned and
remains constant over time. This is often used for servers and
devices that need a consistent address for other devices to connect
to.

•Dynamic IP Addressing (via DHCP): A Dynamic Host


Configuration Protocol (DHCP) server assigns IP addresses
dynamically. Devices request an IP address from the DHCP server
whenever they connect to the network, ensuring there are no
conflicts and reducing administrative overhead.
Week 4: Lesson 10
IPv4 Addressing
IPv4 Addressing
IPv4 (Internet Protocol version 4) is the fourth version of the Internet Protocol and remains the core
protocol used to route most internet traffic. It is a connectionless protocol, meaning that data is
transmitted to the receiver without checking whether the recipient is available. This can sometimes
lead to packet loss or retransmissions but simplifies the protocol's operation.

• Loopback (localhost): Loopback addresses, such as 127.0.0.1, are used to test the IP stack on a
local machine. Any IP address in the range 127.0.0.1 to 127.255.255.254 is reserved for loopback
testing.
• Layer 2 Broadcasts: These broadcasts are sent to all nodes within a LAN, using the MAC address as
the destination.
• Layer 3 Broadcasts: These broadcasts are sent to all nodes within the network, using the IP
address to target all devices (e.g., 255.255.255.255).
• Unicast: A unicast address is used to send data to a single specific destination device, identified by
its IP address.
• Multicast: A multicast address is used to send packets from a single source to multiple recipients
across different networks. This is often referred to as “one-to-many” communication.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting

Attendance code

ngnu6d
23-10-2024 08h00 – 09h50
Week 4: Lesson 10
IPv4 Addressing
IPv6 Addressing

IPv6 was created to overcome the limitations of IPv4, such as the limited address space. It
enhances routing capabilities, speeds up communication, and allows for many more unique
public IP addresses.
• IPv6 addresses are 128-bit in length and are written as eight blocks (quartets) of
hexadecimal digits separated by colons, e.g.,
2001:0DB8:0B80:0000:0000:00D3:9C5A:00CC.
• Each block in the address is 16 bits long. For example, the first block 2001 is represented
in binary as 0010 0000 0000 0001.
• Leading zeroes can be omitted from a four-character hex block, so
2001:0000:B80:0000:0000:D3:9C5A:CC is a valid shorthand.
• If an entire block contains only zeroes, it can be replaced with double colons (::).
However, this can only be done once in an address to avoid confusion. For example,
2001::B80:0000:0000:D3:9C5A:CC is equivalent to 2001:0000:B80::D3:9C5A:CC.
Week 4: Lesson 10
IPv4 Addressing
Port
- A logical connection point for devices to communicate
- Identifies a specific process or service on a device

Types of Ports:
- Physical Ports (e.g., Ethernet, USB)
- Logical Ports (e.g., TCP/UDP ports)

Key Port Concepts:

- Port Numbers (0-65535)


- Port States (Open, Closed, Filtered)
- Port Protocols (TCP, UDP, SCTP)
Week 4: Lesson 10
IPv4 Addressing
Port
Common Port Ranges:
- Well-known Ports (0-1023): Standard services (HTTP, FTP, SSH)
- Registered Ports (1024-49151): Registered services (MySQL, PostgreSQL)
- Private Ports (49152-65535): Custom or dynamic ports

Port Functions:
- HTTP (80), HTTPS (443): Web services
- FTP (20, 21): File transfer
- SSH (22): Secure remote access
- DNS (53): Domain name resolution

Importance of Ports:
- Enables multiple services on a single IP address
- Facilitates network communication and connectivity
- Crucial for network security and firewall configuration
Week 4: Lesson 10
IPv4 Addressing

TCP vs UDP
Week 4: Lesson 10
IPv4 Addressing
TCP vs UDP
• TCP (Transmission Control Protocol): TCP is a connection-oriented protocol
that ensures reliable data transmission. It establishes a connection between the
sender and receiver before data transfer begins, verifying that each packet has
been received correctly. If packets are lost, TCP retransmits them. TCP is
commonly used for services that require data reliability, such as web traffic
(HTTP/HTTPS), email (SMTP), and file transfers (FTP).
• UDP (User Datagram Protocol): UDP is a connectionless protocol that sends
data without establishing a connection. It doesn't guarantee the delivery of
packets, nor does it handle retransmissions. UDP is faster but less reliable than
TCP. It is typically used for services where speed is more critical than reliability,
such as live streaming, online gaming, and DNS queries.
Week 4: Lesson 10
IPv4 Addressing
Port Numbers in Action
• The IP address of a host is like the street address of
a building—this identifies the location (the host) on the network.

• A port number is analogous to an apartment number


in that building. If a device is the building,
the port identifies which "apartment" (process or service)
inside the device should receive the incoming message.
Week 4: Lesson 10
IPv4 Addressing
Socket address

Socket address = IP address + Port number


e.g. 192.168.1.3:21
Week 4: Lesson 10
IPv4 Addressing
Common TCP/UDP Ports

• HTTP (TCP port 80): The standard port for transmitting web pages over the Internet
using the Hypertext Transfer Protocol.
• HTTPS (TCP port 443): Used for secure web traffic, encrypting data between the client
and server using SSL/TLS.
• DNS (UDP port 53): The Domain Name System service that resolves domain names to
IP addresses, allowing users to access websites using human-readable names.
• FTP (TCP ports 20 and 21): Used for file transfers over the network. Port 21 is used to
establish the connection, while port 20 is used to transfer data.
• SMTP (TCP port 25): Simple Mail Transfer Protocol used for sending email between mail
servers.
• DHCP (UDP ports 67 and 68): Used by the Dynamic Host Configuration Protocol to
automatically assign IP addresses to devices on a network.
Week 4: Lesson 10
IPv4 Addressing
Network Troubleshooting
Whether you're diagnosing connectivity issues or verifying configurations, tools like
• ipconfig (Windows only),
• ifconfig (Linux & MacOS), nslookup, and dig (Linux only) provide essential insights.

Ping
Ping, which stands for "Packet Internet Groper," is a tool used to verify that TCP/IP is installed, bound to the NIC,
correctly configured, and communicating with the network. Think of ping as similar to how a whale sends out a signal
and listens for the echo—this echo provides crucial information about the environment and the object that the signal
collided with.
•The ping command sends an echo request to another device on the network. The target device responds with
an echo reply if it is reachable.
•This process uses the ICMP (Internet Control Message Protocol), a lightweight protocol designed to transmit
error messages and information about network conditions.
•Ping is commonly used to test network connectivity and measure the round-trip time for data packets sent from the
source to the destination and back.
Week 4: Lesson 10
IPv4 Addressing
Network Troubleshooting Tools

Windows ipconfig /all


Linux/MacOS ifconfig -a
Week 4: Lesson 10
IPv4 Addressing
Network Troubleshooting Tools

• ping,
• ipconfig, ifconfig,
• nslookup, and
• dig
Week 4: Lesson 10
IPv4 Addressing
Subnetting

Why Subnetting Matters


Subnetting is essential for modern networks, especially as organizations grow and expand. It provides
several key benefits:
• Improved Traffic Management: By dividing a network into smaller subnets, traffic can be confined
within each subnet, reducing the overall traffic load on the network and improving performance.
• Better Security: Subnetting allows administrators to apply specific security policies to different
subnets. For example, sensitive departments such as HR or finance can be placed on isolated
subnets, restricting access from other parts of the network.
• Efficient Use of IP Addresses: Subnetting enables more efficient allocation of IP addresses. In
large networks, subnetting can prevent the waste of IP addresses by ensuring that addresses are
only assigned where needed.
• Broadcast Traffic Containment: Broadcast traffic is limited to each subnet, preventing
unnecessary broadcasts from overwhelming the entire network. This makes the network more
scalable and easier to manage as it grows.
Week 4: Lesson 10
IPv4 Addressing
Subnetting

• Breakdown of logical
IP network
OR
• the division of a larger classful
network into smaller
manageable networks
(called subnets)
Week 4: Lesson 10
IPv4 Addressing
Subnetting

- Divides a larger network into smaller subnets


- Uses a fixed subnet mask
- Conserves IP addresses, improves organization and security
- Example: 192.168.1.0/24 divided into 4 subnets
Week 4: Lesson 10
IPv4 Addressing
Variable Length Subnet Masking

- Uses different subnet masks within a network


- Allows for more efficient IP address use
- Combines subnetting with variable mask lengths
- Example: 192.168.1.0/24, 192.168.2.0/30, 192.168.3.0/28
Week 4: Lesson 10
IPv4 Addressing
Supernetting

- Combines multiple subnets into a larger network


- Uses a shorter subnet mask
- Increases address space, simplifies routing
- Example: 192.168.1.0/24, 192.168.2.0/24 combined into
192.168.0.0/23
Week 4: Lesson 10
IPv4 Addressing
Addressing

• Layer 3 addressing or forwarding (Router)


• Layer 2 addressing or forwarding (Switch)
Week 4: Lesson 10
IPv4 Addressing
IP Networking

• IP address
• MAC address
• Default Gateway
• Address Resolution Protocol (ARP)
o Protocol for device-to-device communication
o ARP request (broadcast message)
o ARP reply
Week 4: Lesson 10
IPv4 Addressing
Comparing Addressing Methods

Each addressing method is suited to different network communication scenarios.


Here’s a summary of when each method is used:
• Multicast: Ideal for one-to-many communication where a single stream of data
needs to reach multiple devices (e.g., video conferencing, IPTV).
• Unicast: The most common form of communication, used for one-to-one
exchanges (e.g., browsing the web, sending emails).
• Broadcast: Useful for delivering messages to all devices in a network (e.g., ARP
requests, DHCP discovery).
• Anycast: Used for optimized delivery to the nearest available device in a
distributed network (e.g., DNS queries, content delivery networks).
Week 4: Lesson 10
IPv4 Addressing
Comparing Addressing Methods

Each addressing method is suited to different network communication scenarios.


Here’s a summary of when each method is used:
• Multicast: Ideal for one-to-many communication where a single stream of data
needs to reach multiple devices (e.g., video conferencing, IPTV).
• Unicast: The most common form of communication, used for one-to-one
exchanges (e.g., browsing the web, sending emails).
• Broadcast: Useful for delivering messages to all devices in a network (e.g., ARP
requests, DHCP discovery).
• Anycast: Used for optimized delivery to the nearest available device in a
distributed network (e.g., DNS queries, content delivery networks).
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting

What is a Network Segment?


A network segment is a portion of a larger network that is isolated or separated
for management purposes. Segments can be divided based on departments,
geographic locations, or specific functions within an organization. By separating
the network into smaller segments, traffic is confined to specific areas, reducing
the amount of unnecessary broadcast traffic and making the network more
efficient.

At the Network Layer (Layer 3), network segments are represented


as subnets. Each subnet functions as an individual network with its own IP
address range, but all subnets are part of the larger organizational network.
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting

https://youtu.be/s_Ntt6eTn94?si=7KLMAlCpZYtC7cYt

https://youtu.be/uyRtYUg6bnw?si=py1LLnUP4I7FIeBV
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
Network Segmentation is the division of a large network into a smaller manageable
network

A Subnet described the network segment. It is the logical subdivision of an IP network

A Network segment is a small portion of the network isolated for management purpose.

Each subnet is identified by its own range of IP addresses, typically determined by a


combination of the IP address and subnet mask.
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
Benefits of Network Segmentation with Subnets

•Improved Performance: Subnetting reduces network traffic by confining data


transmission to specific subnets. This minimizes the impact of broadcast traffic on
the overall network, ensuring that devices in one subnet don’t overwhelm others
with unnecessary traffic.

•Enhanced Security: By isolating different parts of the network into subnets,


organizations can implement stricter security controls. For example, sensitive
areas of the network, such as finance or HR, can be placed on their own subnet,
with firewalls and access control lists (ACLs) used to limit who can access these
segments.
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
Benefits of Network Segmentation with Subnets

•Network Management: Network administrators can manage subnets more


effectively. Network issues, such as troubleshooting or upgrades, can be isolated
to a specific subnet without disrupting the entire network. Subnetting also allows
for efficient IP address allocation and easier monitoring of network activity.

•Scalability: As organizations grow, subnets make it easier to expand networks.


Rather than adding devices to a single large network, administrators can create
new subnets as needed, ensuring that the network infrastructure scales efficiently.
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
Practical Uses of Subnets
Subnets are used in a wide variety of networking scenarios:
•Departmental Separation: An organization may create separate subnets for
different departments, such as IT, Sales, and Finance. Each department has its
own isolated network environment, improving both security and network
performance.
•Geographic Segmentation: For organizations with multiple office locations,
subnetting can be used to segment networks by location. Each office or branch
can have its own subnet, with a dedicated range of IP addresses.
•VLAN Integration: Subnets can be combined with Virtual Local Area Networks
(VLANs) to further enhance network segmentation. VLANs allow devices to be
grouped logically, regardless of their physical location, and each VLAN can be
assigned its own subnet for traffic isolation.
Week 4: Lesson 10
IPv4 Addressing
Virtual LAN (VLAN)

A Virtual LAN (VLAN) is a logical network


segmentation technique that
• Divides a physical network into multiple virtual
networks
• Groups devices by function, department, or
security requirements
• Enhances security, flexibility, and scalability
Week 4: Lesson 10
IPv4 Addressing
Virtual LAN (VLAN)

VLAN Benefits

• Improved security
• Reduced broadcast traffic
• Increased flexibility
• Better network organization
• Simplified management
Week 4: Lesson 10
IPv4 Addressing
Classful Addressing

Classful addressing is an IP addressing scheme


in which the IP address space is divided into five
classes (A, B, C, D, and E), each with predefined
network and host portions. This scheme allocates a
network ID based on the first octet (8 bits) of the IP
address, determining the number of networks and
hosts that can be supported in each class.
Week 4: Lesson 10
IPv4 Addressing
Classful Addressing

Classful addressing is an IP addressing scheme


in which the IP address space is divided into five
classes (A, B, C, D, and E), each with predefined
network and host portions. This scheme allocates a
network ID based on the first octet (8 bits) of the IP
address, determining the number of networks and
hosts that can be supported in each class.
Week 4: Lesson 10
IPv4 Addressing
Classful addressing was used in the early days of
the Internet, but it has limitations in terms of
flexibility and scalability, which is why CIDR
(Classless Inter-Domain Routing) is now used.
However, classful addressing established important
IP address ranges that still affect how public and
private IP addresses are assigned today.
Week 4: Lesson 10
IPv4 Addressing
Classful Addressing
• Based on fixed IP address classes (A, B, C)
• Subnet masks fixed for each class
• Limited subnetting flexibility
• Example: 192.168.1.0/24 (Class C)
Classless Inter-Domain Routing (CIDR)
• Variable-length subnet masks (VLSM)
• Flexibility in subnetting
• Supports route summarization
• Example: 192.168.1.0/26
Week 4: Lesson 10
IPv4 Addressing
IPv4 Address Scheme Design

Number of IP Networks and Subnetworks


Required
Before assigning IP addresses, it is crucial to determine
how many distinct networks and subnetworks are
needed. Organizations often need multiple subnets to
separate departments, locations, or different functions
(e.g., guest networks vs. internal networks). Subnetting
allows you to allocate IP ranges to specific segments of the
network, ensuring that each network can operate
Week 4: Lesson 10
IPv4 Addressing
Types of IP Address

1. Public IP addresses: Routable on the internet.


2. Private IP addresses: Used internally, requiring NAT.

https://geotargetly.com/blog/what-is-a-private-ip-addresses-full-guide
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code

azi5tr
29-10-2024 15h00 – 16h50
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Learning Outcomes
• Demonstrate an understanding of ethernet switching
and troubleshooting of ethernet networks
• Demonstrate an understanding of network
management in relation to risk and performance
management
• Demonstrate an understanding of the performance
and recovery of network
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Introduction to Planning Network
Configuration
Effective network planning is required in every IT organizational
infrastructure. This planning requires careful consideration on IP
address distribution, communication pathways for devices and
security of the network.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Introduction to Planning Network
Configuration
Proper planning entails
• performance optimization
• scalability
• easy troubleshooting
• securing the network
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Introduction to Network Planning
• IP addressing and Subnetting
• Static & Dynamic IP assignment
o Static IP addressing results in IP conflicts,
o Dynamic allow automatic IP assignment and management
• Network Security
o Private IP address range
o Network Address Translation
o Access Control
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
IP Addressing & Subnetting
By assigning IP addresses and dividing networks into smaller sub-
networks, we can
• control traffic,
• enhance security, and
• manage resources efficiently.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
IP Addressing & Subnetting
Type IP addresses Subnet Number of
addresses

Class A 1.0.0.0 - 126.0.0.0 255.0.0.0 16 million

Class B 128.0.0.0 - 191.255.0.0 255.255.0.0 65,536


Class C 192.0.0.0 - 233.255.255.0 255.255.255.0 256
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
IP Addressing & Subnetting
Type IP addresses

Class D 224.0.0.0 - 239.255.255.255

Class E 240.0.0.0 - 255.255.255.255


Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code

famha5
30-10-2024 08h00 – 09h50
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
Subnetting allows the division of large IP networks into
smaller manageable network segments.

For example,
192.168.1.0/24

We know this is a class C network with a subnet mask of 255.255.255.0


Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
So, if we break 192.168.1.0/24 and borrow two bit
We have 192.168.1.0/26

• Subnet 1: 192.168.1.0/26 - Hosts: 192.168.1.1 to 192.168.1.62 (192.168.1.0 is the network


address, 192.168.1.63 is the broadcast)
• Subnet 2: 192.168.1.64/26 - Hosts: 192.168.1.65 to 192.168.1.126 (192.168.1.64 is the network
address, 192.168.1.127 is the broadcast)
• Subnet 3: 192.168.1.128/26 - Hosts: 192.168.1.129 to 192.168.1.190 (192.168.1.128 is the
network address, 192.168.1.191 is the broadcast)
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
First, we must know the required number of
IP addresses, the division required and the subnet
we would like to use to achieve the requirement
in a way that allows us to scale the network in the future
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
First, we must know the required number of
IP addresses, the division required and the subnet
we would like to use to achieve the requirement
in a way that allows us to scale the network in the future
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
The principle of subnetting in IPv4 also applies to IPv6

For example, in IPv6, a typical subnet might be 2001:0db8:85a3::/64, where the /64 prefix indicates the first 64
bits are used for the network portion, leaving 64 bits for hosts.

IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334


Subnet Prefix: /64 -> Network portion (2001:0db8:85a3)
Host Portion: Remaining bits -> 0000:0000:8a2e:0370:7334
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP
Dynamic Host Configuration Protocol provides automation of the allocation

• IP addresses,
• subnet masks,
• default gateways, and
• DNS information
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP
4 steps process for automatic IP address assignment

• DHCP Discovery: The client sends a broadcast message (DHCPDISCOVER) to locate available
DHCP servers on the network.
• DHCP Offer: The DHCP server responds with a DHCPOFFER, offering an IP address and other
configuration details.
• DHCP Request: The client replies with a DHCPREQUEST, indicating its acceptance of the
offered IP address.
• DHCP Acknowledgment: The DHCP server finalizes the process with a DHCPACK, confirming
the lease of the IP address and other network parameters.

These four steps complete the IP assignment process, enabling the client device to connect to the
network with minimal manual configuration.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Setting up a DHCP Server

The server defines the


• scope (range)
• lease duration
• network parameters
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Setting up a DHCP Server
• IP Address Scope: Define the range of IP addresses that the DHCP server can allocate.
For example, a DHCP scope of 192.168.1.100 to 192.168.1.200 allows up to 101 devices
to connect within that range.
• Subnet Mask: Specify the subnet mask for devices. For instance, a subnet mask of
255.255.255.0 (Class C) is common for smaller networks.
• Lease Duration: Determine how long a device can hold an IP address lease before
needing to renew. Shorter leases (e.g., 8 hours) suit environments with high device
turnover, while longer leases (e.g., 7 days) are ideal for static setups.
• Default Gateway: Configure the router’s IP as the default gateway, directing traffic to
external networks. For a network with IP 192.168.1.0, the gateway might be 192.168.1.1.
• DNS Server: Provide DNS server addresses to enable domain name resolution. Common
entries include Google DNS (8.8.8.8) or Cloudflare DNS (1.1.1.1).
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Setting up a DHCP Server
• IP Address Scope: Define the range of IP addresses that the DHCP server can allocate.
For example, a DHCP scope of 192.168.1.100 to 192.168.1.200 allows up to 101 devices
to connect within that range.
• Subnet Mask: Specify the subnet mask for devices. For instance, a subnet mask of
255.255.255.0 (Class C) is common for smaller networks.
• Lease Duration: Determine how long a device can hold an IP address lease before
needing to renew. Shorter leases (e.g., 8 hours) suit environments with high device
turnover, while longer leases (e.g., 7 days) are ideal for static setups.
• Default Gateway: Configure the router’s IP as the default gateway, directing traffic to
external networks. For a network with IP 192.168.1.0, the gateway might be 192.168.1.1.
• DNS Server: Provide DNS server addresses to enable domain name resolution. Common
entries include Google DNS (8.8.8.8) or Cloudflare DNS (1.1.1.1).
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP Lease Renewal

•Devices automatically renew their IP addresses before the lease expires, preventing IP
conflicts and ensuring continued network connectivity. Renewal occurs through the
following stages:
•T1 Timer (Renewal): When 50% of the lease time has passed, the client sends a
renewal request (DHCPREQUEST) directly to the DHCP server.
•T2 Timer (Rebinding): If no response is received, the client enters the rebinding
phase, broadcasting the DHCPREQUEST to any available DHCP server. This occurs at
87.5% of the lease time.
•Lease Expiry: If no DHCP server responds, the client’s lease expires, and it must
restart the DHCP discovery process to obtain a new IP.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Static IP Reservation with DHCP
In some cases, specific devices require a consistent IP address but benefit from DHCP’s central management.
DHCP reservations assign a permanent IP to a device based on its MAC address:

# DHCP Reservation Example

host printer {
hardware ethernet 00:1A:2B:3C:4D:5E;
fixed-address 192.168.1.150;
}

•In this example, a printer with MAC address 00:1A:2B:3C:4D:5E is assigned a fixed IP of 192.168.1.150. This
setup allows the printer to always receive the same IP while remaining managed by the DHCP server.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Benefits of DHCP Configuration

Configuring DHCP provides several advantages:


• Efficient IP Management: Automatically assigns IPs to new devices,
minimizing administrative workload.
• Reduces Configuration Errors: Minimizes manual entry, decreasing the
chance of errors.
• IP Conflict Prevention: Manages IP leases to avoid duplicate IP addresses
on the network.
• Network Scalability: DHCP’s dynamic allocation supports networks with
varying numbers of connected devices.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Static IP assignment
Manual IP configuration

Advantages of Static IPs


• Reliability: Essential for devices that need a permanent address, such as servers, printers, and network
infrastructure (e.g., routers).
• Improved Network Management: Enables administrators to easily identify and locate devices within a
network.
• Direct Access: Facilitates remote access to devices (such as web servers or database servers) without
needing to update IP addresses.
Disadvantages of Static IPs
• Time-Consuming Configuration: Manual assignment for each device can be labor-intensive, especially in
large networks.
• IP Conflict Risk: Incorrect assignments can lead to duplicate IPs, causing connectivity issues.
• Limited Scalability: Static IPs are less flexible and require regular management if the network frequently
changes.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Dynamic IP assignment

Advantages of Dynamic IPs


• Scalability: DHCP automates IP assignment, supporting networks with many devices or frequent
connectivity changes.
• Reduced Administrative Overhead: Minimizes the need for manual IP configuration, which can be labor-
intensive.
• Prevention of IP Conflicts: The DHCP server manages and reclaims IP addresses, reducing the risk of
duplicate IPs.

Disadvantages of Dynamic IPs


• Inconsistent IPs: Devices may receive different IP addresses on reconnecting, which can complicate
network management.
• Limited Accessibility: Dynamic IPs are less suitable for devices requiring consistent access, such as web
servers or network printers.
• Lease Dependency: Devices must renew their IP leases periodically, requiring connectivity to the DHCP
server.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP Reservations for Dynamic yet Consistent IPs

Some devices may require a dynamic IP with consistency. DHCP reservations allow the DHCP server to assign the
same IP address to a device based on its MAC address, providing the benefits of DHCP with the consistency of
static IPs.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
When to Use Static vs. Dynamic IPs

The choice between static and dynamic IP assignment depends on the device type,
network structure, and connectivity requirements. Here are some typical use cases:
• Use Static IPs for: Servers, network printers, infrastructure devices (e.g., routers),
and any device that requires consistent IP access.
• Use Dynamic IPs for: Client devices (e.g., laptops, smartphones) that connect
temporarily to the network, especially in environments where device count
fluctuates.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Network Security in Address Planning

Address planning in network design plays a crucial role in enhancing security. By


carefully managing IP address allocation, subnetting, and access control, administrators
can prevent unauthorized access, control traffic flow, and ensure data privacy.
Implementing secure address planning is essential in protecting network resources and
ensuring compliance with security standards.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Private IP Addressing
• Private IP Ranges: The following IP ranges are reserved for private networks and
are not routable on the public internet:
• Class A: 10.0.0.0 to 10.255.255.255
• Class B: 172.16.0.0 to 172.31.255.255
• Class C: 192.168.0.0 to 192.168.255.255
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Network Address Translation (NAT)
Network Address Translation (NAT) enables private IP addresses to access the internet by mapping them to a
public IP address. This hides the internal IPs from external networks, adding an extra layer of security.
• Basic NAT: Maps a single public IP address to a private IP, enabling external access while maintaining
internal address privacy.
• Port Address Translation (PAT): A form of NAT where multiple private IP addresses share a single public IP.
PAT assigns a unique port number to each session, preserving individual connections.
• # Example of PAT Configuration (Cisco Router)
• ip nat inside source list 1 interface FastEthernet0/0 overload
• access-list 1 permit 192.168.1.0 0.0.0.255

• Security Benefits: NAT and PAT provide an additional barrier by masking internal IPs, making it difficult for
external attackers to identify and reach internal devices.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting for Enhanced Security
Subnetting divides a network into smaller segments, controlling data flow between sections. Each subnet can be
isolated with its own access controls, which restricts access based on user or device roles.
• Role-Based Segmentation: Different departments (e.g., HR, finance, IT) can be assigned separate subnets,
ensuring sensitive data is accessible only to authorized users.
• Reduced Broadcast Traffic: By dividing the network into smaller subnets, broadcast traffic is contained
within each subnet, improving performance and reducing exposure to broadcast-based attacks.
• Subnet ACLs: Access Control Lists (ACLs) define permissions for each subnet, allowing administrators to
permit or deny traffic based on IP addresses, protocols, and ports.
• # Example of Subnet ACL (Cisco Router)
• access-list 100 permit tcp 192.168.1.0 0.0.0.255 any eq 80
• access-list 100 deny tcp any any
• interface FastEthernet0/0
• ip access-group 100 in
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
IP Filtering and Access Control Lists (ACLs)
IP filtering and ACLs limit access to network resources by specifying which IP addresses can communicate with
certain network segments or services. ACLs provide granular control, allowing or blocking traffic based on
conditions set by administrators.
Standard ACLs: Control traffic based solely on the source IP address. Standard ACLs are typically used in
smaller networks.
# Standard ACL Example (Cisco Router)
access-list 10 permit 192.168.1.0 0.0.0.255
access-list 10 deny any

• Extended ACLs: Offer more detailed filtering by allowing administrators to specify source and destination
IPs, protocols, and port numbers.
• # Extended ACL Example (Cisco Router)
• access-list 110 permit tcp 192.168.1.0 0.0.0.255 10.0.0.0 0.0.0.255 eq 22
• access-list 110 deny ip any any

• Benefits of ACLs: ACLs prevent unauthorized access by filtering traffic at the network level, ensuring only
trusted devices can communicate with sensitive resources.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP Security and IP Binding
DHCP security measures like IP binding ensure that only authorized devices receive IP
addresses on the network. This prevents unauthorized devices from connecting and
helps track devices based on MAC addresses.
MAC Address Binding: Configures the DHCP server to reserve specific IP addresses
for known MAC addresses. This method ensures a consistent IP for critical devices and
prevents unauthorized access.
# DHCP Binding Example (Linux DHCP Server)
host secure_printer {
hardware ethernet 00:1D:7E:1A:2B:3C;
fixed-address 192.168.1.150;
}

• IP Exclusions: Administrators can configure the DHCP server to exclude IP ranges,
reducing the risk of conflicts and reserving addresses for specific functions.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Implementing VLANs for Traffic Isolation
Virtual LANs (VLANs) segment network traffic based on logical groups rather than
physical location, adding an additional layer of security by isolating departments or
user groups.
Enhanced Isolation: VLANs separate traffic, limiting the spread of attacks and
allowing fine-tuned access control.
# VLAN Configuration Example (Cisco Switch)
vlan 10
name Finance
interface FastEthernet0/1
switchport access vlan 10

• Role-Based Access: By placing sensitive departments (e.g., finance) on a separate
VLAN, administrators can control access to specific data and systems.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Network Security & Address Planning
1. Private IP addressing
2. Network Address Translation
3. Subnetting
4. IP Filtering and Access Control Lists
5. DHCP Security and IP Binding
6. VLAN for traffic isolation
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
1. Command-Line Tools for Diagnostics
o ping –c 5 –s 1024 google.com
o traceroute –m 20 eduvos.com
o tracert –m 20 eduvos.com
o netstat –an
o arp –a
o nslookup google.com
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
2. Advanced IP Configuration and
Verification

o detect IP conflicts
o confirm subnet configurations
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
3. Network Performance Monitoring

o wireshark
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
4. Routing and Path Troubleshooting

o verify routing tables


o correcting static and dynamic routes
 route -n
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code

1lsp0v
31-10-2024 15h00 – 16h50
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
5. Security & Unauthorized Access
Detection

o firewall rule checks


o detecting unauthorized access with
packet sniffers
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
5. Security & Unauthorized Access
Detection
Firewall Rule Checks: Ensure firewalls are correctly configured to permit valid traffic
and deny unauthorized access. Misconfigured firewall rules can prevent legitimate
traffic or leave networks exposed.

Detecting Unauthorized Access with Packet Sniffers: Packet sniffers like tcpdump
or Wireshark monitor for anomalies, such as unexpected data spikes or login attempts.

# capture packet with tcpdumps


sudo tcpdump –i eth0
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
6. Logs

o syslog servers
o event viewer
 tail –f /var/log/syslog
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
7. System Approach to
Troubleshooting
• Physical Layer Check: Start by confirming physical connections, cable
integrity, and power sources.
• Link Layer Verification: Check MAC addresses, VLAN configurations, and
switches for misconfigurations.
• Network Layer Analysis: Verify IP addresses, routing paths, and
subnetting configurations.
• Application Layer Inspection: Check for application-specific issues, such
as protocol errors or service outages.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing
Concepts
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Routing is a fundamental aspect of network design, responsible for directing
data packets across interconnected networks to reach their intended
destinations.

By leveraging routing protocols and algorithms,


• routers can efficiently manage and optimize data paths,
• ensuring that information is delivered reliably and promptly.

Effective routing is essential for maintaining connectivity, supporting network


growth, and optimizing resource use.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Routers use routing tables, which store information about network paths, to
make decisions on where to forward packets. The selection of these paths is
determined by various routing protocols and metrics that prioritize routes
based on factors like distance, bandwidth, and reliability.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
•Routing Types: The two main types of routing—static and dynamic—define
how routes are set and updated within a network. Each type has unique
advantages suited for specific network configurations.
•Routing Protocols: Routing protocols like RIP, OSPF, and EIGRP allow
routers to communicate and share path information. These protocols ensure
networks can dynamically adjust routes based on topology changes.
•Interior vs. Exterior Routing: Routing protocols are designed for either
internal networks (IGPs) or external networks (EGPs), each handling routing
within and between organizations.
•Metrics and Path Selection: Metrics such as hop count, bandwidth, and
delay help routers evaluate and select the best path for data transmission.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
A routing table is a database stored in a router or other forwarding device
that contains information about the routes to various network destinations. It
essentially serves as an address map, guiding the router on where to send
packets based on their destination IP address. The routing table is typically
stored in the router’s RAM, allowing it to be updated dynamically in the case of
dynamic routing protocols or modified manually when static routes are
configured
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
•Protocol: This parameter specifies the source of the route, such
as static routes, routes learned through routing protocols like
OSPF or RIP, or routes automatically configured by the operating
system.

•Destination: This field identifies the destination network or


host. While routing tables can contain routes to specific hosts,
they are generally directed to network IDs. If multiple routes
match the destination, the most specific route (with the longest
subnet mask) is chosen as the forwarding path.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
•Interface: This parameter defines the local network interface
that will be used to forward the packet along the chosen route. It
may be represented as the IP address of the interface or a Layer
2 interface ID, depending on the network’s configuration.

•Gateway/Next Hop: This field specifies the IP address of the


next router (gateway) along the path to the destination. Routers
use this to forward packets toward the final destination by
directing them to the appropriate next hop
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Static Routing: In static routing, routes are manually configured
by a network administrator. This means that each route is
predetermined, and packets must follow that specific path to
reach a particular destination. Static routing is simple to set up
and requires fewer resources, but it lacks the flexibility of
dynamic routing and may not be suitable for large or complex
networks where routes need to change frequently.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Dynamic Routing: In dynamic routing, routers exchange routing
information with each other using routing protocols such as OSPF,
RIP, or BGP. This allows the network to automatically adjust to
changes, such as network failures or added links, by updating the
routing tables dynamically. Dynamic routing is more flexible and
scalable, making it ideal for larger, more complex networks.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
A default route is a special type of static route that specifies the
next hop for packets destined for any network that does not have
a specific route in the routing table. It acts as a catch-all route,
ensuring that packets with unknown destinations are still
forwarded, typically toward the Internet or a main router within
the network. The default route is usually denoted as 0.0.0.0/0 in
the routing table
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
The Time To Live (TTL) field in the IP header determines the
maximum number of hops a packet can take before it is
discarded. Each time a packet passes through a router, the TTL
value is reduced by at least 1. If the TTL reaches zero, the packet
is dropped, and an ICMP "Time Exceeded" message is sent back
to the source. TTL prevents packets from circulating endlessly in
case of routing loops and helps manage the lifespan of data
packets on the network
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Packet Forwarding: This is the process by which routers send
incoming packets to the next hop or final destination based on
the information in the routing table. The decision to forward is
made based on the destination IP address of the packet and the
best match in the routing table.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Hop Count: This refers to the number of routers (or hops) a
packet must traverse to reach its destination. Each router the
packet passes through is considered one hop. Hop count is often
used as a metric in routing protocols like RIP, where the shortest
path is defined by the fewest number of hops.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Fragmentation: When a packet is too large to be transmitted
over a network link (due to the link’s maximum transmission unit
or MTU), it is divided into smaller fragments. Each fragment is
then sent separately and reassembled at the destination.
Fragmentation is important for ensuring that large packets can
traverse networks with varying MTUs.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Routing tables are central to how routers manage the flow of data
across networks, using parameters such as destination, next hop,
and interface to determine the best path for each packet.
Understanding static and dynamic routing, as well as related
concepts like TTL, packet forwarding, and fragmentation, is key to
managing efficient and reliable network traffic. With a solid grasp
of routing tables and these core concepts, network administrators
can optimize network performance and troubleshoot routing
issues more effectively.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code

dv2vyl
05-11-2024 15h00 – 16h50
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Dynamic Routing Concepts
Dynamic routing protocols use algorithms and metrics to
automatically build and maintain a routing information base (also
known as the routing table).
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Dynamic Routing Concepts
Convergence is the process by which routers running dynamic
routing protocols agree on the network topology and routing
information. When convergence occurs, all routers in the network
share a consistent view of the routes available, ensuring that data
can be forwarded efficiently to its destination. The speed of
convergence is an important factor in determining how quickly a
network can recover from changes, such as a failed link or router
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Dynamic Routing Concepts
• Interior Gateway Protocols (IGPs) (Autonomous system)
• RIP (15 hop count max)
• OSPF
• EIGRP (Cisco)

• Exterior Gateway Protocols (EGPs) (Different autonomous


systems)
• BGP
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Dynamic Routing Concepts
• IGP
• Distance Vector Protocols
• RIP
• EIGRP
• Link-State Protocols
• OSPF
• IS-IS
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Network security encompasses the strategies, processes, and


controls put in place to safeguard data, protect network
infrastructure, and ensure business continuity. The goal of
network security is to make systems and hosts resilient to various
types of attacks, including unauthorized access, data breaches,
malware, and denial-of-service (DoS) attacks. A well-implemented
network security framework ensures that data assets are
protected from internal and external threats while maintaining
the availability and integrity of network resources.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Objectives of Network Security


The primary goals of network security are often referred to as the
CIA triad, which stands for:
• Confidentiality
• Integrity
• Availability
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Overview Management Services
Importance of Network Management:
•Reliability: Regular monitoring helps prevent outages, ensuring
that services remain available.
•Performance Optimization: Identifying bottlenecks allows
administrators to make necessary adjustments, enhancing overall
performance.
•Cost Efficiency: Efficient resource management reduces
operational costs and improves return on investment.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Overview Management Services
Network management involves the monitoring and
maintenance of a business’s information technology. You can
have an in-house network management team or hire the services
of network management providers. Vendors of network
management services provide a wide range of services:
•implementing upgrades
•monthly status reporting
•user administration
•network maintenance
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Overview Management Services
Managed Network Services
•Network administration: This covers tracking of network
resources, such as switches, servers, and routers. Software
updates and performance monitoring are also part of network
administration.
•Network maintenance: This includes fixes and upgrades to
network resources. Remediation activities and proactive
measures are executed here. They may include replacing
switches, routers, or other network gears.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Overview Management Services
Managed Network Services
•Network operation: This ensures the smooth running of the
network. The network manager closely monitors activities to
identify and fix issues as they happen.
•Network provisioning: Often, you’ll need to configure network
resources to support the requirements of specific services.
Network provisioning lets you do that. For instance, you can
increase bandwidth requirements to accommodate more users.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Confidentiality: Ensuring that sensitive information is only


accessible to authorized users. Techniques like encryption and
access controls help protect data from being disclosed to
unauthorized parties.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Integrity: Ensuring that data remains accurate and unaltered


during transit or storage. Integrity is maintained through
mechanisms like hashing, checksums, and digital signatures,
which detect unauthorized modifications to data.

Availability: Ensuring that network services and resources are


accessible to authorized users when needed. This is achieved by
preventing disruptions through network redundancy, firewalls,
and intrusion prevention systems (IPS) to defend against DoS
attacks.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Integrity: Ensuring that data remains accurate and unaltered


during transit or storage. Integrity is maintained through
mechanisms like hashing, checksums, and digital signatures,
which detect unauthorized modifications to data.

Availability: Ensuring that network services and resources are


accessible to authorized users when needed. This is achieved by
preventing disruptions through network redundancy, firewalls,
and intrusion prevention systems (IPS) to defend against DoS
attacks.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Types of Network Security Threats


• Unauthorized access
• Malware
• Denial-of-service (DoS) attacks
• Man-in-the-middle attacks
• Phishing
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Unauthorized Access: This occurs when


attackers gain access to a network or system
without proper authorization. Techniques like
password attacks, social engineering, and
exploiting software vulnerabilities are common
methods used to gain unauthorized access.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Unauthorized Access: This occurs when


attackers gain access to a network or system
without proper authorization. Techniques like
password attacks, social engineering, and
exploiting software vulnerabilities are common
methods used to gain unauthorized access.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Malware: Malware, or malicious software, includes


viruses, worms, Trojans, ransomware, and spyware.
These threats can cause data theft, system corruption,
or complete disruption of services. Anti-malware
software, firewalls, and intrusion detection systems
(IDS) are used to detect and mitigate these threats.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Malware: Malware, or malicious software, includes


viruses, worms, Trojans, ransomware, and spyware.
These threats can cause data theft, system corruption,
or complete disruption of services. Anti-malware
software, firewalls, and intrusion detection systems
(IDS) are used to detect and mitigate these threats.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Network Security Assessment


• Vulnerability (security breach)
• Threat (intentional and non-intentional)
• Risk (likelihood of attack)
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Risk management is the process of identifying,


assessing and mitigating vulnerabilities and threats to
the critical functions of an organization
• Identify
• Assess
• Implement
• Monitoring
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security

Security Information and Event Management


(SIEM) is a security control that automates the
collection, aggregation and analysis of log data from
multiple systems within an organization.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Security concepts

• Penetration testing
• Privileged Access Management (PAM)
• policies, procedures and technical controls
implemented to prevent misuse of privileged
account
• Least privilege
• Role-Based Access Control (RBAC)
• Zero trust
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Security concepts

• Penetration testing
• Privileged Access Management (PAM)
• policies, procedures and technical controls
implemented to prevent misuse of privileged
account
• Least privilege
• Role-Based Access Control (RBAC)
• Zero trust
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods

Network Authentication Methods


• Access control systems technical
security controls that govern how users,
devices or other entities (subjects) are
permitted to interact with resources
(objects)
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods

Identity and Access Management (IAM)


• Identity
• Authentication
• Authorization
• Accounting
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods

Multi-factor Authentication
• code
• answer a security question
• fingerprint scan
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods

Local Authentication
• Windows (Active Directory)
• Linux (Username and password)
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods

• Single Sign-On (SSO) authenticate


once
• Digital Certificates and Public Key
Infrastructure (PKI)
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Security Appliances

• Firewalls
• Packet Filtering Firewalls
• Stateful Inspection Firewalls
• Next-Generation Firewalls (NGFW)
• IDS/IPS
• Network Access Control
• VPN
• IPSec
• SSL/TLS
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Security Appliances

• Data Loss Prevention


• Endpoint security ( antivirus, anti-malware)
• Security Information and Event Management
Week 6: Lesson 14
Organization and Physical Security
Concepts
Learning Outcomes

•Demonstrate an understanding of network management in


relation to risk and performance management.

•Demonstrate an understanding of the performance and recovery


of network.
Week 6: Lesson 14
Organization and Physical Security
Concepts
The cabling, switches, routers, security
appliances, servers, and clients that make up a
local network must all be located within a
company premise. Managing the company
premises so that the network is highly available
and secure involves creating policies and best
practices, supported by documentation.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Security Policies

IT Policies include ;
1. Password Policy
2. Acceptable Use Policies
3. Bring-your-own-device (BYOD) Policy
4. Remote Access Policy
5. Data Loss Prevention Policy
Week 6: Lesson 14
Organization and Physical Security
Concepts
Security Policies

Common Agreements

1.Service level agreement (SLA)

2.Non-Disclosure Agreement (NDA)

3.Memorandum of understanding (MOU)


Week 6: Lesson 14
Organization and Physical Security
Concepts
IT Documentation and Policies

Operating Plans and Procedures


Week 6: Lesson 14
Organization and Physical Security
Concepts
IT Documentation and Policies

System Life Cycle Plans and Procedures

The asset register include;


1.Audit reports
2.Assessment Reports.
3.Physical Network Diagrams
4.Logical network diagrams
5.Rack Diagrams
Week 6: Lesson 14
Organization and Physical Security
Concepts
IT Documentation and Policies

Security Response Plans and Procedures

1.Incident Response Plan


2.Business Continuity Plan
3.Disaster Recovery Plan
Week 6: Lesson 14
Organization and Physical Security
Concepts
IT Documentation and Policies

Physical Security Methods

1.Access Control Hardware


2.Smart lockers
3.locking cabinets
4.Locking racks
5.CCTVs
6.Assets tags
7.Alam and tamper detection.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Internet of Things

Internet of Things (IoT) describes the global network of personal devices, home
appliances, home control systems, vehicles, and other items that have been
equipped with sensors, software, and network connectivity.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Internet of Things

1. Consumer-grade Smart Devices


2. Physical Access Control Systems and Smart Buildings

Cellular network
• Z-wave, wireless protocol
• Zigbee, open-source competitor
Week 6: Lesson 14
Organization and Physical Security
Concepts
Internet of Things

Placement & Security


1.consumer-grade devices,
2.smart building technology, and
3.industrial systems.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Disaster Recovery

Disaster recovery (DR) is an organization’s ability to


restore access and functionality to IT infrastructure after
a disaster event, whether natural or caused by human
action (or error).
IT disaster recovery refers to a combination of policies,
tools, and processes used to recover or continue
operations of critical IT infrastructure, software, and
systems after a natural or human-made disaster.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Disaster Recovery

• High availability
• Fault tolerance
• Redundancy
• Recovery
Week 6: Lesson 14
Organization and Physical Security
Concepts
Disaster Recovery

Other Important issues to consider are;


1.Heating, Ventilation and Air Conditioning (HVAC)
2.Power Management.
3.Network Device Backup Management
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Learning Outcomes

•Demonstrate an understanding of network


management in relation to risk and performance
management.

•Demonstrate an understanding of the performance and


recovery of network
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Network Attacks

• Internal attacks
• External attacks
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Network Attacks

• Internal attacks
• External attacks
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Types of Attacks

1.Footprinting and Fingerprinting Attacks.


2.Spoofing Attacks.
3.Denial of Service Attacks.
4.MAC Spoofing and IP Spoofing.
5.ARP Spoofing.
6.Rogue DHCP
7.DNS Poisoning Attacks
8.VLAN Hopping Attacks
9.Rogue Access Points
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Types of Attacks

10. Evil Twins


11.De-authentication Attacks
12.Distributed DoS Attacks and Botnets.
13.Viruses and worms.
14.Potentially unwanted programs (PUPs)/Potentially unwanted applications
(PUAs)
15.Trojan
16.Password Attacks
17.Phishing Attacks
18.Shoulder Surfing
19.Tailgating and Piggybacking
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Network Hardening

Network hardening refers to the processes that


minimize security gaps within a cybersecurity
infrastructure. Network hardening standards help guide
the processes used in optimizing network security
across your organization’s cybersecurity infrastructure.
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Device and Service Hardening

1. Change default passwords/credentials.


2. Enforce password complexity/length requirements.
3. Configure role-based access.
4. Disable unneeded network services
5. Disable unsecure protocols
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Endpoint Security and Switchport


Protection

1.Disable Unneeded Switch Ports.


2.MAC Filtering and Dynamic ARP Inspection.
3.DHCP Snooping.
4.Neighbor Discovery Inspection and Router Advertisement
Guard.
5.Port Security/IEEE 802.1X Port-Based Network Access Control
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Endpoint Security and Switchport


Protection

1.Disable Unneeded Switch Ports.


2.MAC Filtering and Dynamic ARP Inspection.
3.DHCP Snooping.
4.Neighbor Discovery Inspection and Router Advertisement
Guard.
5.Port Security/IEEE 802.1X Port-Based Network Access Control
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Endpoint Security and Switchport


Protection

1.Disable Unneeded Switch Ports.


2.MAC Filtering and Dynamic ARP Inspection.
3.DHCP Snooping.
4.Neighbor Discovery Inspection and Router Advertisement
Guard.
5.Port Security/IEEE 802.1X Port-Based Network Access Control
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code

er4ugs
06-11-2024 08h00 – 09h50
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Wireless Security

1. Preshared keys (PSKs)


2. Extensible Authentication Protocol.
3. Captive portal
4. MAC filtering
5. Geofencing
6. Antenna placement and power levels
7. Wireless client isolation
8. Guest network isolation
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Other Network consideration

1. IoT Access considerations


2. Patch And Firmware management
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

Cloud computing is on-demand access, via the internet,


to computing resources—applications, servers (physical
servers and virtual servers), data storage, development
tools, networking capabilities, and more—hosted at a
remote location managed by a cloud services provider
(or CSP).
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

Advantages
• Lower IT costs
• Improve agility and time-to-value
• Scale more easily and cost-effectively
• Elasticity
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

Cloud Deployment Models

•Public (or multitenant)


•Hosted private
•Private
•Community
•Hybrid
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

Cloud Deployment Models

1. Infrastructure as a Service.
2. Software as a Service (SaaS)
3. Platform as a Service (PaaS).
4. Desktop as a Service
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

Virtualization is the process of running a virtual


instance of a computer system in a layer
abstracted from the actual hardware
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

What is a Hypervisor?
A hypervisor is software that creates and
manages virtual machines (VMs), allowing
multiple operating systems to run on a single
physical host
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

Types of Hypervisor
1. Type 1 Hypervisor (Bare-Metal Hypervisor)
• Runs directly on the host machine's hardware (bare
metal)
• No underlying operating system required
• Examples: VMware ESXi, Microsoft Hyper-V, KVM
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

Types of Hypervisor
2. Type 2 Hypervisor (Hosted Hypervisor)
• Runs on top of an existing operating system (host OS)
• Uses host OS resources and drivers
• Examples: VMware Workstation, VirtualBox, Parallels
Desktop
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

Types of Hypervisor
2. Type 2 Hypervisor (Hosted Hypervisor)
• Runs on top of an existing operating system (host OS)
• Uses host OS resources and drivers
• Examples: VMware Workstation, VirtualBox, Parallels
Desktop
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

A virtual network interface card


(vNIC) represents the configuration of a VM
connected to a network. A VM can be configured
to have multiple vNICs. Within the VM, the virtual
NIC (vNIC) will look exactly like an ordinary
network adapter and will be configurable in the
same way.
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization

Cloud computing

A storage area network (SAN) provisions access to


storage devices at block level. Each read or write
operation addresses the actual location of data on the
media (Block I/O). A SAN is isolated from the main
network. It is only accessed by servers, not by client PCs
and laptops. SAN clients are servers running databases
or applications that require access to shared storage.

You might also like