SDFC - Basics of Networking
SDFC - Basics of Networking
NETWORKING
SERVICE DESK FOUNDATION CERTICATION
Agenda
01 Introduction to Networking
02 Types of Cables
03 Network Concepts
04 Network Components
05 Networking Commands
• A local area network, or LAN, is • A metropolitan area network, is • A wide area network, or WAN,
a network in which computers a network in which the is a network that spans a large
are relatively close together, computers are spread across geographic territory, such as an
such as within the same office an entire city. entire state or country, or even
or building. an entire continent.
• MAN connects two or more
• Usually a LAN is contained LANs that are within the same • The biggest WAN on the planet
within a single building, but a city but are far enough apart is known as the world wide web
LAN can extend to several that the networks can’t be or the ‘Internet’.
buildings on a campus. connected using a simple cable
or wireless connection. • Example: Accenture’s global
• Example: Network within an network
Accenture office building(s) • Example: Network between
Accenture buildings in a city
• Bus topology orients all devices • Ring topology is where nodes • Star topology is laid out so every
on a network along a single are arranged in a circle (or node in the network is directly
cable running from one end of ring). Data travels through the connected to one central hub via
the network to the other ring in either one or both coaxial, twisted-pair, or fiber-
directions. optic cable.
• Bus topologies are a good, cost-
effective choice for smaller • Ring topology is efficient at • It is stable as one node’s failure
networks because the layout is
transmitting data without errors. does not affect the network and
simple.
devices can be added or
•
• It also requires constant
Data transmission along a single removed without taking the
cable means that bus topology is vigilance as cable/node failure network offline.
vulnerable to cable failure and can bring down the entire
slow transmission speeds. network. Addition of devices
• Star topology is heavily
increases the communication
dependent on the central node
delay.
and data transmission is limited
by the technical configuration of
the central node.
Copyright © 2020 Accenture. All rights reserved. 11
Network Classification - Topology
• It allows easy addition of nodes • Mesh topologies are reliable and • The main advantage of hybrid
and network expansion. stable, and the complex degree of structures is the degree of
Troubleshooting errors is also a interconnectivity between nodes flexibility they provide as there
straightforward process as each makes the network resistant to are few limitations on the network
branch can be individually failure. structure itself that a hybrid setup
assessed. can’t accommodate.
• Mesh topologies are incredibly
• Entire network depends on the labor-intensive. Each
interconnection between nodes • Combining multiple topologies
health of the root node. Failure of makes the network design very
the root node will lead to failure requires a cable and configuration
once deployed, so it can also be complex and drives up the cost.
of all the subsequent branches.
time-consuming to set up.
Copyright © 2020 Accenture. All rights reserved. 12
Summary
01 02 03
A network is an interconnection of A network allows us to share files, Networks cab be classified based
two or more network devices, that stream media, play network games on their size, entity, connectivity
are linked/ connected in order to and printer sharing between 2 or and topology.
share resources, exchange more devices.
information, or allow electronic
communications.
• Category 1 — Used for telephone communications. Unsuitable for transmitting data. CAT 5e
• Category 2 — Can transmit data at speeds up to 4 megabits per second (Mbps).
• Category 3 — Can transmit data at speeds up to 10 Mbps.
• Category 4 — Can transmit data at speeds up to 16 Mbps.
• Category 5 — Can transmit data at speeds up to 100 Mbps.
CAT 6
• Category 5e — Used in networks running at speeds up to 1000 Mbps (1 Gbps).
• Category 6/6a — Can transmit data at 10 Gbps up to 55 meters.
• Category 7 — Can transmit data at 10 Gbps up to 100 meters
Copyright © 2020 Accenture. All rights reserved. 16
Ethernet Cable
01 02 03
There are a wide variety of cables Unshielded twisted pair cable is Fiber optic cable is used for long
used to create networks. The most used with the RJ – 45 connector to range data transmission. It provides
common types of cables are co- create the ethernet/patch cable fast and reliable data transmission
axial, unshielded/shielded twisted used to connect computers with but it more expensive to implement
pair and fiber optic cable. other computers or routers and than other cables.
switches.
255 0 0 0
255 255 0 0
01 02 03
The OSI model provides a Devices are identified on an DHCP service allows dynamic
theoretical description of the network via an IP address. There assignment of IP addresses on a
network communication. The are 2 types of IP address version in network and DNS service translates
TCP/IP model is used for real world use currently: IPv4 and IPv6. domain names into IP addresses or
application. vice versa.
A B
0260.8c01.1111 0260.8c01.3333
E0 E1
C E2 E3 D
0260.8c01.2222 0260.8c01.4444
A B
0260.8c01.1111 0260.8c01.3333
E0 E1
C D
E2 E3
0260.8c01.2222 0260.8c01.4444
0260.8c01.1111 0260.8c01.3333
E0 E1
C E2 E3 D
0260.8c01.2222 0260.8c01.4444
0260.8c01.2222 0260.8c01.4444
• When a data packet comes in on one of the lines, the router uses
information in its routing table or routing policy and directs the packet
to the next network on its journey towards its destination.
• The most familiar type of IP routers are home and small office
routers that simply forward IP packets between the home computers
and the Internet.
Routing Table
Destination Exit Int.
10.0.0.0/8 E1 20.0.0.1
20.0.0.0/8 E2
30.0.0.0/8 E3
30.0.0.0/8
40.0.0.0/8 E4
Router E2
E3
E1
40.0.0.1 E4
10.0.0.1 30.0.0.1
40
.0 .0.
1
10.0.0.0/8
40.0.0.0/8
40.0.0.1
01 02 03
NIC card acts a medium to Hub, Switch and Router are Firewall is used to inspect
exchange data between a network network devices that operate at information entering or leaving a
and a computer. Each NIC has a Layer 1, 2 and 3 respectively. They network. A gateway is a system that
unique MAC address assigned to it are tasked with data transmission can be established at any layer and
by the manufacturer. within a network. acts as a point of entry into a
network.
• Flushes and resets the contents • Verifies IP-level connectivity to • Determines the path taken to a
of the DNS client resolver cache. another TCP/IP computer by destination by sending ICMP
During DNS troubleshooting, this sending ICMP echo Request echo Request or ICMPv6
procedure can discard negative messages. The receipt of messages to the destination
cache entries from the cache, as
corresponding echo Reply with incrementally increasing
well as any other entries that
messages are displayed, along time to live (TTL) field values.
have been added dynamically.
with round-trip times.
• Demilitarized Zone is a physical or logical subnetwork that contains and exposes an organization's external-facing
services to an untrusted, usually larger, network such as the Internet. The purpose of a DMZ is to add an additional layer
of security to an organization’s LAN.
• VPN Servers along with other services are usually hosted in the DMZ subnet of the organization so that they are
accessible by the internal as well as external resources.
Virtual Private Network (VPN)
1. Computer
2. Internet connectivity
01 02 03
DMZ is subnet of an organization’s VPN is an encrypted connection VPN connection requires the
network that is accessible by over the Internet from a device to a availability of certain prerequisites
internal and external resources. network. There are two types of in order to successfully establish
VPN. connection to a VPN server.
1. Wi – Fi Authentication
2. Wi – Fi Encryption
1. Open authentication
2. Shared authentication
3. Extensible Authentication Protocol
01 02 03
Wi - Fi networks use radio waves to Wireless networks need to be kept Wi – Fi networks are identified by
exchange information with devices. secure so that information is not their SSID. The SSID broadcasting
Wireless enabled devices connect accessed in an unauthorized way. can be enabled or disabled as per
to Wi – Fi network via an AP. an administrators preference.
2. https://www.dnsstuff.com/what-is-network-topology
3. http://www.firewall.cx/networking-topics/cabling-utp-fibre/112-network-cabling-utp.html
4. https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/
5. https://www.geeksforgeeks.org/introduction-of-classful-ip-addressing/
6. https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/windows-com
mands
7. https://www.cisco.com/c/en_in/products/security/vpn-endpoint-security-clients/what-is-vpn.html
8. https://www.cisco.com/c/en/us/solutions/small-business/resource-center/security/how-does-a-vpn-w
ork.html
9. https://www.netspotapp.com/wifi-encryption-and-security.html
Thank you for your time!