0% found this document useful (0 votes)
395 views83 pages

Network Fundamental - Free4arab

8855
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
395 views83 pages

Network Fundamental - Free4arab

8855
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 83

Network Fundamental

To
My Girl that always support me.
Bassem

Page 1

Network Fundamental

About Author:Bassem Hamed is a Network and Security Engineer. He began to Building his
Knowledge and Experience in Network more than 5 years ago.
He is Interested in information Security and Data Center.
Bassem worked in many Companies with Different Position , but he love Training .
He has Authored books in Microsoft Active Directory and Infrastructure 2008 and
in Cisco CCNAx 200-120

Contacts :[email protected]
/basemhamed.13
/Pasemhamed
01001582348

Page 2

Network Fundamental

Page 3

Network Fundamental
Network Fundamental
is considered as the Basics for anyone want to know what the
Network is. This Book is Provides an overview of basic networking
concepts, including network architecture, devices, design,
components. The Book covers media types and standards and how data
is encoded and transmitted.

Speaking in-depth about application coverage includes email, the domain


name system, the World Wide Web and multimedia (including voice over
IP, Internet radio video on demand, video conferencing, and streaming
media. Each chapter follows a consistent approach: the Book presents
key principles, and then illustrates them utilizing real-world example
networks that run through the Internet, and wireless networks

Copyright 2015 by Bassem Hamed


All rights reserved. This book or any portion thereof
may not be reproduced or used in any manner whatsoever
without the express written permission of the publisher
except for the use of brief quotations in a book review.
Printed in Egypt
First Edition, 2015

Page 4

Network Fundamental

Content :Chapter: -

Page

Network Topology

Network Devices

17

Network Models

30

TCP/IP Model

42

Encapsulation

44

Headers

46

Addressing

50

Cisco Routing and Switching Components

70

Cables

74

Page 5

Network Fundamental

Network Topology
Network
Connection Centralize Device
Sharing of Recourses

Hardware File Server


Software any Application
Service Internet or Printer and etc ..

Network Topology
Connection
- :
Virtual or Logical Topology --- and --- Physical Topology
Virtual Topology
How Devises are Communicate -

Page 6

Network Fundamental
:- Bus Topology and Ring Topology with Token

Physical Topology
How Devises are Connected --
:- Star Topology and Ring Topology with MAU

Page 7

Network Fundamental
-1

Bus Topology :-

Line .
Virtual Topology Real Life
!!
.
Line Device Terminator

- :

Collision

Source PC1 Data Access service PC3 Destination


PC6 Access PC4
Data Broadcast
Broadcast - :
Login Accounts
Social Media E.Mail Accounts !!
.. Accounts

Page 8

Network Fundamental

PC1 PC3 Drop
Loop Destination
Loop Collision Data
Drop Packets

-: Collision
CSMA / CD
Carrier Sense Multiple Access / Collision Detection
Wired
Data Sense Carrier
Multiple Access
Detect Collision
Drop Collision Packet
( )
CSMA / CA
Carrier Sense Multiple Access / Collision Avoidance
Collision Wireless Connection
Collision

Jamming of Signal
Collision Random of Time
Data Collision
Terminator
Carrier Line
Broadcast --
Network
Loop Loop Broadcast

Topology Cables Co-Axil Cable


Document Cables
Network Interface Card Co-Axil Cables
Page 9

Network Fundamental

Co-Axil Cable -- Hub Terminator Topology


Internal Component Collision & Broadcast
Processor
Document

Page 10

Network Fundamental
Ring Topology

-2

I Ring Topology Using Token

PC1 Data PC3 Transmitter - Virtual or Logical Topology


Receiver
Transmitter Token
Token
Destination MAC Address & IP Data Virtual Thing
Data PC Token Free PC3
Source and Destination Address IP Load -- Token Data Load
Network Broadcast Token

Data Receiver
Address Check
Cut Copy Data
, Data Repeat
Data Mark

-1
-2
-3
-4

Transmitter Data Broadcast


Page 11

Network Fundamental
Token Transmitter
- 1 Data Mark Receiver
- 2 Delete Data Token
- 3 Token Empty

II Ring Topology Using MAU


- Physical Topologies Devise
Centralize Device
--- MAU Media Access Unit Token Receiver

-1
-2
-3
-4
-5
-6
-7

PC1 Data PC5 MAU


Data Broadcast MAU
PC2 Check Data || Receiver
Data MAU
Receiver
PC5 .
Copy and Mark Data
Release or Delete Data Token Empty MAU

Ring Topology Collision


Data Token Token Data
Broadcast
Page 12

Network Fundamental
Stat Topology -4

Topology
Devises
Repeater Hub Bridge Switch
Document
Network Devises
Device
PCs

Tree Topology Star Topology


Tree Topology
Bus and Star Topology

Page 13

Network Fundamental
Mesh Topology -5
Stability
Data Redundancy
Logical Topology

NIC 4
Switches

Hybrid Topology -6
Topologies
Diagram

Speed
Device
Cables

Bus Topology
10 M.Bit/S
Terminator or Hub
Co-Axil or UTP

Communication Type
Simple Duplex
Half Duplex
Full Duplex

Ring Topology
45 M.Bit/S
Token or MAU
UTP

Star Topology
100 M.Bit/S
Hub or Switch
UTP

Description
" Cable " Cable
" "
Cables

Page 14

Network Fundamental
Networking Type
LAN Local Area Network
in the Same Location in Small Area Connected
- :
Ethernet 10Mb/S
Fast Ethernet 100 Mb/S
Giga Ethernet 1000 Mb/S
10 Giga Ethernet 10Gb/S

WAN Wide Area Network


Used to connect LANs together .Typically, WANs are used when the LANs that must be
connected are separated by a large distance

MAN Metropolitan Area Network


Hybrid between a LAN and a WAN

PAN Personal Area Network


Like Bluetooth
SAN Storage Area Networks
Between Storage Devices and File Servers
Data Center
Advantage:

Performance is fast.
Availability is high because of the redundancy features available.
Distances can span up to 10 kilometers.
Management is easy because of the centralization of data resources.

Disadvantage of SANs is their Cost.


Page 15

Network Fundamental

This Page Intentionally Left Blank

Page 16

Network Fundamental

Network Devices
Devices Network
Network
Devices

Terminators - 1
Document Signal Loop
Bus Topology

Repeater - 2
Re-generate Signal

Data Drop , Noising Device Re-


generate Signal Data
Cable PC Device Internet Service
Meter 100 Drop Signal Internet -- Repeater Digital Signal
Analog Signal Amplifier Re-Generate
Page 17

Network Fundamental

Data Broadcast

Repeater
Wireless RepeaterWired Repeater ( Booster _ Extender ) -

Connector - 3
Repeater Re-Generate
Connector One Cable
Repeater
Device
- :
Repeater Multi port Connector

Hub - 4
Multi-Port Devices Hub
Hub
LAN
- :
o Share ( Bandwidth
) Data
100 M.bit/S

o Data Broadcast
Loop Component Processor MAC
Address - . Collision
Hub Multi- port Repeater
Page 18

Network Fundamental

Type of Hub
1- Active Hub

Support CSMA/CD
Re-Generate of Data
Sending Data
Using only UTP Cables
Sending Data Only
Using only UTP Cables
Support CSMA/CD
Re-Generate of Data
Sending Data
Using Co-Axil and UTP Cables
Support IGMP ( internet Group
Management Protocol)
Using 10 Base.T Co-Axil

2- Passive Hub
3- Hybrid Hub

4- Intelligent Hub

Bridge - 5
MAC Smart Devices
Collision Address
Broadcast Unicast Data

Bridge Type
1- Transparent Bridge
2- Mixed Media Bridge
3- Local Bridge
4- Remote Bridge

Not Supporting CRC


Cyclic Redundancy Check
Support CRC | Error Detection
only
Between Rooms in the Same
Building
Hardware
Between More than One Building

Document CRC

Page 19

Network Fundamental

Switch - 6

Devices



Sharing of Resources
Switch is a Smart Device
Component Processor MAC Address
Broadcast Collision
Unicast Data ,
Hub
Share Bandwidth
Unicast One to One
Switches Un-Managed End Users
Configuration
Just Only Connecting PCs
Switches Configuration CISCO and
Juniper Material
Switching Mode

Data Destination

Frame
Check for Errors
CRC

Check Bit 64
Error

Page 20

Cut Throw

Store and Forward

Fragment Free

Network Fundamental

Router - 7
The Gateway for Devices
Connecting
More than Different Subnet
Define the Best Way to Send Data
Between Source and Destination
Broadcast
Unicast

Router
CISCO and Juniper Configuration
Material

Page 21

Network Fundamental
Device Router Router
) ADSL (Asymmetric Digital Subscriber Line

ADSL - 8
Device
Modulation and De-Modulation
Analog - Digital

- :
Connecting More than Different Subnet
Router
( ) Support Routing Protocols
Routers Interfaces Input RJ-11

Input RJ- 11
Digital to Analog Signal

Page 22

Network Fundamental
Internet

- :
ISP Internet Service Provider
-:
TE-Data , Link , Vodafone , etc,,,
PSTN Public Switched Telephone Network

ISP Internet PSTN


ISP DSLAM PSTN Fiber Cables
ISP

Analog Cables

Page 23

Network Fundamental

DSLAM - 9
DSLAM Digital Subscriber Line Access Multiplexer
PSTN

Digital Signal Analog Signal Analog


Analog Signal PSTN Box Customer
Premises Splitter

Share Bandwidth
4 5 Load
Over Loaded

Page 24

Network Fundamental

Splitter - 10


ADSL
Analog Signal ;
PC Digital Signal
ADSL
Analog Digital


Digital Signal Using RJ- 45
Analog Signal Using RJ- 11
Router

NIC ( Network Interface Card) - 11


Ethernet
Physical Address
MAC Address
Switch ADSL Modem
Internet

Personal Computer - 12
LANWAN

Network

Page 25

Network Fundamental
Server - 13
Hardware
Internal Domain

File Server Important Data


Published Server


Microsoft and RedHat

Access Point - 14
Wireless
Wired Device Wireless

WNAP Wireless Network Access Point
NAP Network Access Point

IP Phone - 15

Phones that Connected Using RJ-45 not RH-11


Phones
ISP PSTN
VOIP

Account Skype Viper
viper
!! Skype

Page 26

Network Fundamental
Internet Service
IP Phone Communication

Multi-layer Switch - 16
Router Switch
Layer 2 Multi-Layer
Router Layer 3 Switch

Firewall - 17
Internet
Restricted Roles
Service Centralize Users
Protocols
Service and Application
Ports
To Prevent Any Outside External Threats

Cisco ASA Firewall

Page 27

Network Fundamental
Firewall Devices
Fortinet
Firewall Cisco Juniper
Devices

IPS and IDS - 18


Intrusion Prevention System Intrusion Detection System

Network
Sensors
| Packet Error
Internal Database

:-
Error Detect Alert IDS
Configuration Packet Drop Action IPS

Any Malicious Connection - : Error

Page 28

Network Fundamental

This Page Intentionally Left Blank

Page 29

Network Fundamental

Network Models
OS ! Facebook
!
Error
Not Compatible
Network Models Service Standard Roles

Tour Guide
Models To Allaw Different OS Devices Services Infrastructure to be Communicated
-: Network Models
OSI Model

-: OSI Model Open System Interconnection Intermediate

ISO International Organization for Standardization


7 Layers source Destination

Page 30

TCP/IP Model

Network Fundamental

Layer date
communication
Receiving = Destination

Sending = Source

-: Application Layer -1
Layer User Email Download
Browsing

Application Layer Port Number
Port Number Request Users
Network Access
User Access Service Port Number Firewall
service Disable
Access List CCNA
Feature

Port

Stand foe :-

Browsing
Connect What is New

URL
http://www.google.com

80

Hypertext Transfer Protocol

HTTP

HTTP Security

" " TLS or SSL

443

Hypertext Transfer Protocol


Secure

HTTPS


Connect

IP .
IP
Phone Contact Search
Dial
Connect
IP
DNS Connect <--
IP

53

Domain Name System


or Server or Service

Page 31

Protocol

DNS

Network Fundamental
Resolving from Name to IP
DHCP

Dynamic Host Configuration


Protocol

67 68
(IP v4)
546 -547
(IP v6)

TCP/IP Configuration Assign


Automatic

Network Configuration
Automatic Protocol Static
CCNAx #

SMTP

Simple Mail Transfer Protocol

25

Email Sending
Mail

POP2

Post Office Protocol Version 2

109

Source Receiving Mails


Destination

POP3

Post Office Protocol Version 3

110

Source Receiving Mails


POP2 Update

SNMP

Simple Network Management


Protocol

161

Monitor Analysis
Network

Apps
Solarwind Monitoring

FTP

File Transfer Protocol

20

Uploading & Downloading




Source Open Session PN 20
and Destination

FTP

File Transfer Protocol

21

and Start Uploading Process PN 21


Apply Security

TFTP

Trivial File Transfer Protocol

69

FTP
-:

Security
FTP

Telnet

Remote terminal Access


Protocol
( unencrypted text
communications )

23

Remote Connection
Router Switch - etc.
Username and
Hacking As Clear Text Password
Connection Tool like Wireshark
User and Pass

Secure Shell (SSH)

22

Telnet
Username and

SSH

Page 32

Network Fundamental
Password
1638432767

VOIP Tech

Real Time Transport Protocol

Service
Protocols Protocols
: Q IMAP and POP3

-2

-: Presentation Layer

Compression/De-compression

Formatting Date Type

Presentation Layer

Coding/De-coding

Encryption/Decryption

Coding/De-coding -1
0 & 1 Machine ""Binary

De-Coding on Destination Machine
Coding on Source Machine
Binary Destination Binary User
Encryption / Decryption -2
Security
Presentation Layer MD5 Message Digit ver.5
Source -- Destination
Compression/De-compression -3
Bandwidth
Bandwidth
Formatting Data Type -4
Extensions
YouTube
Page 33

RTP

Network Fundamental
Session Layer -3
Browser Tab facebook twitter soundcloud
Refresh Tab Facebook Tab
!! Time line for Facebook !!
Session Layer Service
Errors
Session layer Control Sessions
Open Connection Source Destination
Close for Connection
Session Layer Layer Users Open Connection Service
.

rTnaL tTo snarT -4


Layers Backbone Layer
Three Layers Data as Data Encapsulation
""Headers
Transport Layer Layer Encapsulation
Application Layer Service Service
Security
UDP

TCP

Service
Service Data Segment
TCP Transmission Control Protocol
Security Reliability

Error Detect
and Correct
Flow Control

Connection Users
ecdon SEliomE gnidaolp

-: Transport Layer
Page 34

esD"DPDU

toae torPs aD"DtsD


Real Time
Destination Source
Live Matches or Live Broadcasting
Error

Error
Voice and Video Over IP

Network Fundamental

nritraonogta -1
Data Transport Layer Segment Communication
Segmentation Segment Segments .
:
: Error Detect and Correct Segment

: Service

Service TCP
UDP
Download Request Traffic
Skype Online Service Feature Real Time
Segmentation Mix Segments Data
Sequencing -2
Segmentation Destination
Three Way Handshake -3
Page 35

Network Fundamental
Test Connection Source Destination Synchronous
and Acknowledge message

Source Destination Segments Source Msg


, Synchronous Destination Segments Source Acknowledgement Msg
Segment
Segment 150 Byte Segmentation Segment 10 Byte
15 - - Source Segments Process
Destination - :

-: Case 1
Source Segment 5
Window Size
Segments

Destination Ack
5
Source Segments Value
Window Size

-: Windowing

Page 36

Network Fundamental

-: Case 2
Source ,
Destination Error Segments 3 , 4
Internet
Window Size Destination
Source
Errors CRC
Cyclic Redundancy Check Error Detect
and Error Correct Segments

-: Case 3
Source ,
Destination Error Segments 3 , 4
Error Destination
Over Flow
-: Date Source Destination
Destination
Destination Source
Window Size
Destination Flow Control
Source
Case Window Size
CRC
Case Test for Connection
Connection Windowing
Transport Layer

Network Layer -5
Page 37

Network Fundamental
Layer Encapsulation way -- Data IP Address Segment Packet
IP Connect

-: Network Layer

Other
Protocols

Routed
Protocols

ARP
IP
Address MAC
RARP
,


Addressing
IP
OS

ICMP
Test
Connection
Destination



ping sitename
Responce

1- Request time out
2- Destination host
unreatchable

3- Reply from

rnon sgai snarT -6


Page 38

Types of it :IP --> Standard


IPX/SPX --> for Novell
Apple talk --> for
Apple Decvices

Routing
Protocols

Routing
Protocols

Define the Best PathRoute- Way to Send


Data

Type of Routing
Protocols :-

RIP
OSPF
EIGRP
BGP

Routing Track

Network Fundamental
Packet Frame MAC Address
MAC
Physical Address NIC , MAC
, Unique 48 bit 6 Byte
Hexa Decimal
MAC CMD ipconfig /all

L
MAC Address

Vendor
Category
Devices
Samsung , Dell ,
Apple

OUI "Organization Unit


Identifier

2nd 24 bit

1st 24 bit

-: Data Link Layer


-1

Page 39

-: Arbitration
. Bus and Ring Topologies

Network Fundamental
Define the Best Time for Sending Data
-2
-

Error Detection
-: Parity Check
Bits 1
Two Algorithms -:
Even
or
Odd
Odd Bits 1
Even Bits 1
Error Bits 1 algorithm
Detect

-: CRC with FCS
CRC Data Link Layer Error Detect Only Correct
Error User Transport Layer
FCS CRC Tailer Header
rnon sgai nkn snarTL

MAC 802.3
"Media
Access
" Control

LLC 802.2
" Logical Link
" Control
Detect
Routed Protocol

Physical Layer -7
Coding Header 0/1 Medium Destination
Not Smart Cables
Cables

Page 40

Network Fundamental

This Page Intentionally Left Blank

Page 41

Network Fundamental

TCP/IP Model
Model DOD Department of Defense
OSI Backup
Standard

4 Layers OSI Process


Layers Layers

Application, Presentation and Session Application


Network Internet
Data link and Physical Network Access or Network
Interfaces

Page 42

Network Fundamental
Encapsulation Techniques in Models:-

Transport Layer Service User Data


Segment
Network Layer IP Addresses Routing and Routed
Protocols , Failures Segment
Packet
Data Link Layer MAC Address Header FCS Tailer
Packet Frame
Physical Layer Coding Header 0/1
Cables

Coding - :

Presentation Layer Data Physical


Layer Header

Page 43

Network Fundamental
Network Devices with its Layers

Device
Hub , Connector , Repeater , Cables
Switch , Bridge , Access Point , NIC
Router , Multi-Layer Switch
IPS , IDS
Firewall
Server

Layer
Physical Layer
Data Link Layer
Network Layer
Presentation Layer
Filter All Traffics in All Layer
Its about the Service type that Provide

Page 44

Network Fundamental

This Page Intentionally Left Blank

Page 45

Network Fundamental

Headers
Models Encapsulation Data
Add Header Service Layer

TCP Header
Data Security and Reliability
Byte 42
32 bit 5 Byte

Page 46

Network Fundamental
- : Source and Destination Port
Port User Service Access
User Port Number
Ports 87757
-:
3245 : 2 Online , Public , Reserved Service Application Layer
-- Users Bit 38

- : Sequence Number
Segments Segmentation Destination
-- Bit 54

-: Acknowledgement
Check Segments , User

-: Header Length
Header Byte 42

-: Reserved
Update Header Future Use

-: TCP Flags
Test Connection Source Destination

Default Value Flag 2


Page 47

Network Fundamental
PSH RST URG Hacking C|EH

Flags NMAP :

Flag Name

Service
Source Destination Connection
Destination SYN Source

Synchronous SYN
Acknowledgement ACK

Segments
Window Size Destination
Over Flow
Segment
Queue Segments

Push PSH

Urgent URG

Reset Connection Destination

Reset RST

Segments
Connection Connection

Finish FIN

-: Window Size
Header , Data 20 Byte
. Header
Detect Data Window Size

-: Check Sum
Error Detection and Correction CRC

-:Urgent Pointer
Error , Header , . 16 Bit
Error urgent Pointer Segment Rejected
Destination Source
Page 48

Network Fundamental

-: Option
Vendor Infrastructure OS Option Add
Header

-: Data
Header Header
Window Size

Page 49

Network Fundamental

UDP Header
Data Real Time
Header , 8 Byte 32 Bit 2 Byte
Diagram TCP Header
Security .

- : Source and Destination Port


TCP Header

-: Length
, TCP Window Size Header Data

- : UDP Checksum
Error Detect Only Destination Error Correction
, CRC

-: Data
Header Header
Header Length

Page 50

Network Fundamental

IP Header
Segment -- Packet TCP Header

- : Version
IP IPv4 or IPv6
-: Header Length
Detect Header 20 Byte
-: TOS Type of Service
Service IP QoS Quality of Service Router
, Queue
)IP Differentiated Services Code Point (DSCP

Page 51

Network Fundamental
-: Total Length
Header Segment Transport Layer
-: Identification
MTU Maximum Transmission Unit Packet
Device Interface 1500 Byte by Default
User Packet MTU Router !! Reject !!
Router Fragmentation ID
Fragments Flag
-- Destination Fragment Offset Identification Flags
- : TTL
Time to Live Packet Destination Drop Packet
Loop
Why

TTL Default Value

Ping Online Site


64 Hops

64

Ping LAN

34:

Ping Gateway Router

478

Page 52

Network Fundamental
Hops Packets Destination
Network Layer Protocols tracert Packets
TTL Default Hops Packet
Destination

-: Protocols
Protocol Header
Protocols Values
-: Header Checksum
Error Detect Only Packet
-: Source and Destination IP
Connect Packet
-: Options
Header TCP Header

Page 53

Network Fundamental
IP Header TOS - for Read only
Value Protocol
0 HOPOPT, IPv6 Hop-by-Hop Option.
1 ICMP, Internet Control Message Protocol.
IGAP, IGMP for user Authentication Protocol.
2 IGMP, Internet Group Management Protocol.
RGMP, Router-port Group Management Protocol.
3 GGP, Gateway to Gateway Protocol.
4 IP in IP encapsulation.
5 ST, Internet Stream Protocol.
6 TCP, Transmission Control Protocol.
7 UCL, CBT.
8 EGP, Exterior Gateway Protocol.
9 IGRP, Interior Gateway Routing Protocol.
10 BBN RCC Monitoring.
11 NVP, Network Voice Protocol.
12 PUP.
13 ARGUS.
14 EMCON, Emission Control Protocol.
15 XNET, Cross Net Debugger.
16 Chaos.
17 UDP, User Datagram Protocol.
18 TMux, Transport Multiplexing Protocol.
19 DCN Measurement Subsystems.
20 HMP, Host Monitoring Protocol.
21 Packet Radio Measurement.
22 XEROX NS IDP.
23 Trunk-1.
24 Trunk-2.
25 Leaf-1.
26 Leaf-2.
27 RDP, Reliable Data Protocol.
28 IRTP, Internet Reliable Transaction Protocol.
29 ISO Transport Protocol Class 4.
30 NETBLT, Network Block Transfer.
31 MFE Network Services Protocol.

References
RFC 2460
RFC 792
RFC 1112
RFC 823
RFC 2003
RFC 1190, RFC 1819
RFC 793
RFC 888

RFC 741

IEN 158
RFC 768
IEN 90
RFC 869

RFC 908
RFC 938
RFC 905

Page 54

Network Fundamental
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67

MERIT Internodal Protocol.


DCCP, Datagram Congestion Control Protocol.
Third Party Connect Protocol.
IDPR, Inter-Domain Policy Routing Protocol.
XTP, Xpress Transfer Protocol.
Datagram Delivery Protocol.
IDPR, Control Message Transport Protocol.
TP++ Transport Protocol.
IL Transport Protocol.
IPv6 over IPv4.
RFC 2473
SDRP, Source Demand Routing Protocol.
IPv6 Routing header.
IPv6 Fragment header.
IDRP, Inter-Domain Routing Protocol.
RSVP, Reservation Protocol.
GRE, General Routing Encapsulation.
DSR, Dynamic Source Routing Protocol.
BNA.
ESP, Encapsulating Security Payload.
AH, Authentication Header.
I-NLSP, Integrated Net Layer Security TUBA.
SWIPE, IP with Encryption.
NARP, NBMA Address Resolution Protocol.
Minimal Encapsulation Protocol.
TLSP, Transport Layer Security Protocol using Kryptonet key management.
SKIP.
ICMPv6, Internet Control Message Protocol for IPv6.
MLD, Multicast Listener Discovery.
IPv6 No Next Header.
IPv6 Destination Options.
Any host internal protocol.
CFTP.
Any local network.
SATNET and Backroom EXPAK.
Kryptolan.
MIT Remote Virtual Disk Protocol.
Internet Pluribus Packet Core.
Page 55

Network Fundamental
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103

Any distributed file system.


SATNET Monitoring.
VISA Protocol.
Internet Packet Core Utility.
Computer Protocol Network Executive.
Computer Protocol Heart Beat.
Wang Span Network.
Packet Video Protocol.
Backroom SATNET Monitoring.
SUN ND PROTOCOL-Temporary.
WIDEBAND Monitoring.
WIDEBAND EXPAK.
ISO-IP.
VMTP, Versatile Message Transaction Protocol.
SECURE-VMTP
VINES.
TTP.
NSFNET-IGP.
Dissimilar Gateway Protocol.
TCF.
EIGRP.
OSPF, Open Shortest Path First Routing Protocol.
MOSPF, Multicast Open Shortest Path First.
Sprite RPC Protocol.
Locus Address Resolution Protocol.
MTP, Multicast Transport Protocol.
AX.25.
IP-within-IP Encapsulation Protocol.
Mobile Internetworking Control Protocol.
Semaphore Communications Sec. Pro.
EtherIP.
Encapsulation Header.
Any private encryption scheme.
GMTP.
IFMP, Ipsilon Flow Management Protocol.
PNNI over IP.
PIM, Protocol Independent Multicast.
Page 56

Network Fundamental
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132

ARIS.
SCPS.
QNX.
Active Networks.
IPPCP, IP Payload Compression Protocol.
SNP, Sitara Networks Protocol.
Compaq Peer Protocol.
IPX in IP.
VRRP, Virtual Router Redundancy Protocol.
PGM, Pragmatic General Multicast.
any 0-hop protocol.
L2TP, Level 2 Tunneling Protocol.
DDX, D-II Data Exchange.
IATP, Interactive Agent Transfer Protocol.
ST, Schedule Transfer.
SRP, SpectraLink Radio Protocol.
UTI.
SMP, Simple Message Protocol.
SM.
PTP, Performance Transparency Protocol.
ISIS over IPv4.
FIRE.
CRTP, Combat Radio Transport Protocol.
CRUDP, Combat Radio User Datagram.
SSCOPMCE.
IPLT.
SPS, Secure Packet Shield.
PIPE, Private IP Encapsulation within IP.
SCTP, Stream Control Transmission Protocol.

133
134
135
136
137
138
139

Fibre Channel.
RSVP-E2E-IGNORE.
Mobility Header.
UDP-Lite, Lightweight User Datagram Protocol.
MPLS in IP.
MANET protocols.
HIP, Host Identity Protocol.

RFC 2393

RFC 3768, RFC 5798

RFC 3931

RFC 6172
RFC 3175
RFC 3775
RFC 3828
RFC 4023
RFC 5498
RFC 5201
Page 57

Network Fundamental
140
141
142
143
252
253
254
255

Shim6, Level 3 Multihoming Shim Protocol for IPv6.


WESP, Wrapped Encapsulating Security Payload.
ROHC, RObust Header Compression.

RFC 5533
RFC 5840
RFC 5858

Experimentation and testing.


reserved.

Page 58

Network Fundamental

This Page Intentionally Left Blank

Page 59

Network Fundamental

IPv4 Address

IP Address IP
" 0 to 9 " Decimal
IP Address 6 Octet Octet .
100.90.55.10

IP Address Header 32 Bit 4 Octet Octet


8 Bit
Octet 8 Bit Binary Machine

Decimal Binary

Bit 2 - 3 4 8 Bit

20

21

22

23

24

25

26

27

16

32

64

128

4 477 Octet 2

-:
322 - :
322 34: , 86
58 Bit
58 54 6 6

Page 60

100 01100100

Network Fundamental
433
Bit by Bit
Bit 2
433 34: :5 86
; , 3 , 16 5 4
3+

211 11010011

Decimal -:
32323322 3 394 = 6 + : + 54 + 34:

IP Address - : " Internet Assigned Numbers Authority " IANA


IP Bit 54 Bit IPs 4
54

4.292.967.296
Online Sites Machines Smart Phones Laptops
IPs

IANA IP Classes Class


, IPs Octet Class
1 126
128 191
192 223

Class A
Class B
Class C

224 - 232
240 254

Class D
Class E

5
0 Default Network
721 Loopback Interface NIC Test
. Internet Connection

Page 61

Network Fundamental
-

255 Broadcasting
- : Class D Multicast Routing Protocols
- : Class E New Technology and Experiments

Subnet Mask -:
-3
-4
Class A
Class B
Class C

255.0.0.0
255.255.0.0
255.255.255.0
D,E Subnet Mask

o
o
o
o

Network ID IP Class
Class Subnet Mask
Binary Anding IP and Subnet Mask
Anding
100.50.40.17 IP , IP Class A Subnet Mask
255.0.0.0
01100100.00110010.00101000.00010001

100.50.40.17

11111111.00000000.00000000.00000000

255.0.0.0

o Anding Bits , 2
01100100.00000000.00000000.00000000
o Decimal

100.0.0.0


o Switch Octet 322 Octets

Page 62

Network Fundamental

Topology 3 5

4

Network ID Network . Host


Network , Switch Bits
3 Subnet Mask
Host , Bits 2 Subnet Mask

Diagram Class Octet Network and Host


Class
Class A Octet Class B , 1st Two Octets Class C , 1st Three Octets

Zeros Hosts IPs

Page 63

Network Fundamental
72 Network
-

IPs Class C 478 Octet


Subnet Mask 2
72 !! Subnetting
Subnetting Bits Host Customize IPs
-:

2h 2 = H

h Bits Octets Hosts


H Hosts
4
4 IPs

Network ID , Broadcast


2h 2 = 50

2h = 52

2 !! 8
Bit 8 Host
Hosts Bits
11111111.11111111.11111111.11000000 Subnet Mask
Bits 3 /26

Subnet Mask 722 10.0.0.0/8


2h 2 = 500

2h = 502

2 !! 9

Page 64

Network Fundamental
29 =512
9 Bit Host 24
10.0.0.0/23

Subnet Mask 3 255.255.254.0

- :
Subnet Mask 255.240.0.0
Bit 2 Hosts Subnet Mask Binary
- 11111111.11110000.00000000.00000000 42
220 2 = H

H = 1.048.574

/ -:
Subnet Mask /21

Network ID IP 170.55.99.17/20
Network ID Anding . IP and Subnet Mask
/20 20 Bit 3
Octet Anding 3
170.55.99.17 170.55.01100011.00010001
255.255.240.0 255.255.11110000.00000000
Anding 170.55.01100000.00000000 -:
170.55.48.0/20
Subnetting Bits , Host
" "

Page 65

Network Fundamental
- :
IP 192.168.10.13/29
Network ID :
192.169.10.00001101
255.255.255.11111000
Anding 192.168.8.0/29
Subnetting
Bits Host
,
Octet Mix 0 and 1 3 Subnet Mask
255.255.255.11111000 8 Octet Interest Octet
2h 2 = H
3 Bit Host 6 Valid IP IPs . : Two IPs
Network ID & Broadcast IP
192.168.8.0/29 8 Octet Mix Subnet Mask
192.168.8.8/29 192.168.8.16/29

PC1 Connection PC2

Subnet Mask

Subnet =Network

-:
IP 100.60.45.10/18
Page 66

Network Fundamental
Network ID :
100.60.45.10 100.60.00101101.00001010
Subnet Mask 255.255.11000000.00000000
Anding -:

100.60.0.0/18

Subnetting
Bits Host
,
Octet Mix 0 and 1 3 Subnet Mask
255.255.11000000.00000000 64 Octet Interest Octet
100.60.0.0/18 86 Octet ,

-:
Subnet Mask - - - IP IP
192.168.50.33/27
? What is the Network ID and Number of Valid Hosts and 5 th Network and 1st IP in it
-:
192.168.50.00100001
Subnet Mask 255.255.255.223 255.255.255.11100000
Network ID 192.168.50.00100000 192.168.50.32
Bits 0 -:
2h -2 =H

25 2 = H

H=30

Valid Hosts = 30 IP
Interest Octet ID
3 Subnet Mask 54
Page 67

Network Fundamental
192.168.50.64/27 192.168.50.96/27 192.168.50.128/27
192.168.50.160/27
IP 192.168.50.161/27 Network ID

IP 192.168.50.192/27
IP 3 192.168.50.191/27 Broadcast Last
Valid 3 192.168.50.190/27
52

: IP 100.60.45.10/18
IP IP

Page 68

Network Fundamental

This Page Intentionally Left Blank

Page 69

Network Fundamental

Cisco Router and Switch Component

Configuration Service

Switches LAN Cisco or Juniper
Cisco

Memory

Power Supply

Cisco
Componetn

Interfaces

Processor

-: Power Supply -1
Component Power Performance

Component Volt
Convert from AC to DC

Page 70

Network Fundamental
Interfaces -2
Device Interface
CCNAx
- : Processor -3
Configuration Device
Process
-: Memory -4

RAM

NV-RAM

Memory

Flash

ROM

-: RAM
Random Access Memory Running Configuration
, Save Restart
-: NV-RAM
Device Saved Configuration
Reload
-: Flash
Operating System Router or Switch IOS Internetwork
Operation System 15.3 CCNAx 200-120
ROM
Read Only Memory

Page 71

Network Fundamental
Responsible for :-

ROM - Component

Power on Self-Test Device Check


Interfaces LEDs Configuration
Shutdown Error LED

POST

Device Flash
IOS . Device
NV-RAM Saved Configuration Compile
RAM Running Device

Boot Strap

Configuration Register
Booting Device
Basic Configuration . Device

Page 72

Rommon RX-Boot

Network Fundamental

This Page Intentionally Left Blank

Page 73

Network Fundamental

Network Cables
Cables Medium .
-:

Phone
Cable

Twisted
Pair

Console
Cable

Co-Axil
Cable

Fiber
Cable

- : Phone Cable -1
Cable
DSLAM
RJ-11

-: Console Cable -2
Cisco Devices Initial Configuration Password
Recovery

Page 74

Network Fundamental

- :Co-Axil Cable -3
Network Cables
.
The Bandwidth for Co-Axial Cable is 10 Mbps - Megabits per second

Thin (Thinnet)
Cable

Thick (Thicknet) Cable

TV Cables
-:
- Flexible coaxial cable about inch thick.
- Thinnet is used for short-distance.
- Thinnet connects directly to a workstations network adapter
card using a British Naval Connector (BNC).
- The maximum length of thinnet is 185 meters
- RG-58 family
-

Thicknet coaxial is thicker cable than thinnet.


Thicknet cable is about inch thick and can support
data transfer over longer distances than thinnet.
Thicknet has a maximum cable length of 500 meters
and usually is used as a backbone to connect several
smaller thinnet-based networks.

Page 75

Network Fundamental
-: Twisted Pair -4
Cable
LAN
Noising Cables Twisted
and Losing

Pin

-: Twisted Pair
UTP Unshielded Twisted Pair
STP Shielded Twisted Pair
. Pin
UDP UTP STP
1. STP cables are shielded while UTP cables are unshielded
2. STP cables are more immune to interference and noise than UTP cables
3. STP cables are better at maximizing bandwidth compared to UTP cables
4. STP cables cost more per meter compared to UTP cables
5. STP cables are heavier per meter compared to UTP cables
6. UTP cables are more prevalent in SOHO networks while STP is used in more high-end
applications

CAT5e and CAT6 , CAT Categories UTP


-:
1000Mbps data capacity
For runs of up to 90 meters
Solid core cable ideal for structural installations (PVC or Plenum)
Stranded cable ideal for patch cables
Terminated with RJ-45 connectors

Page 76

Network Fundamental

Twisted-Pair Cabling Considerations


o Use twisted-pair cable if:
Your LAN is under budget constraints.
You want a relatively easy installation in which computer connections are simple.
o Do not use twisted-pair cable if:
Your LAN requires a high level of security and you must be absolutely sure of data
integrity.
You must transmit data over long distances at high speeds

Cables Pins RJ-45 Twisted Pair Cables

Page 77

Network Fundamental
-: UTP Pins Colors
Cables ,

" " Pins
RJ Crumble
,
- : RJ
- Straight Through

Cross Over

Cable
Cross Over

Cable
Device ,
Straight Through Cross Over
Straight
Through
Pin 1 with 3 and 2 with 4 Cable Cross Over
8 Pin Pins 1,2,3,6 Backup
POE Power Over Ethernet

Page 78

Network Fundamental
How to Make a Network Cable

Cable

Page 79

Network Fundamental
Pair


568B - Put the wires in the following order, from left to right:

white orange
orange
white green
blue
white blue
green
white brown
brown
568A - from left to right:
Page 80

Network Fundamental

white/green
green
white/orange
blue
white/blue
orange
white/brown
brown

Pins

Page 81

Network Fundamental

Crumble

Test Cable

Page 82

You might also like