0% found this document useful (0 votes)
22 views47 pages

Networking - Part 1

The document provides an overview of IT infrastructure networking concepts, detailing the evolution of networking from mainframe computers to modern local area networks (LANs) and wide area networks (WANs). It covers essential components such as the OSI Reference Model, various network topologies, cabling types, and protocols like IP, TCP, and UDP. Additionally, it discusses the differences between IPv4 and IPv6, routing protocols, and the role of switches and routers in network management.

Uploaded by

samir.elsagheer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views47 pages

Networking - Part 1

The document provides an overview of IT infrastructure networking concepts, detailing the evolution of networking from mainframe computers to modern local area networks (LANs) and wide area networks (WANs). It covers essential components such as the OSI Reference Model, various network topologies, cabling types, and protocols like IP, TCP, and UDP. Additionally, it discusses the differences between IPv4 and IPv6, routing protocols, and the role of switches and routers in network management.

Uploaded by

samir.elsagheer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

IT Infrastructure

Architecture
Infrastructure Building Blocks
and Concepts

Networking – Part 1
(chapter 9)
Introduction

• Mainframe computers in the


1960s were stand-alone machines
• In the late 1960s, a number of
computers were connected by
means of the ARPANET – the
predecessor of the internet
• With PCs in the 1980s, local Area
Networks (LANs) were introduced
 They allowed PCs to connect to each
other and to shared resources like a
file server, a printer or a router to the
internet
Network topologies

Mesh network Bus network

Star network Ring network


Networking building blocks
OSI Reference Model

• The OSI Reference Model (OSI-


RM) was developed in 1984 by
the International Organization
for Standardization (ISO)
• Seven layers define the different
stages that data must go
through to travel from one host
to another over a network
OSI Reference Model

• The OSI stack allows:


 Implementing network
components independently of
each other
 Ensuring all components work
together
• Provides freedom to
implement the network stack
in an optimal way for a certain
usage
• Each layer’s payload contains
the protocol for the next layer
Physical layer
Cables

• At the most elementary level, networking is about cables


• Copper based cables:
 Coax
 Twisted pair

• UTP comes in several quality ratings called categories

Category Maximum bandwidth


5 or 5e 1 Gbit/ s
6 10 Gbit/ s
7 10 Gbit/ s
8 40 Gbit/ s
Fiber optic cabling

• A fiber optic cable contains multiple strands of fiber glass or plastic


 Each provide an optical path for light pulses

• Light source:
 Light-emitting diode (LED)
 Laser

• Two types of fiber optic cable are most common:


 Multi-Mode Fiber (MMF)
 Single Mode Fiber (SMF)
Patch panels

• Cables in buildings are most visible in


patch panels
 In racks in the datacenter
 In patch closets in various locations in (office)
buildings

• They connect systems in a flexible way,


without having to change the installed
cabling in the building
• Patch panels are passive connecting
devices
• Connecting systems is done using patch
cables
Vertical and horizontal cabling

• The main distribution cabling in


buildings connects the patch
panels on the floors to the
datacentre (vertical cabling)
• Endpoints in the walls are
connected to the patch panels
(horizontal cabling)
Leased lines

• Leased lines are dedicated data connections between two


locations, provided by a telecom provider
• Leased lines are based on:
 T or E carrier lines
 SONET
 SDH
 Dark fiber
Internet access

Three ways to connect to the internet:


• Cable internet access
 Uses cable television infrastructure

• Digital Subscriber Line (DSL)


 Asymmetric DSL (ADSL)
 Symmetric DSL (SDSL)
 Very High DSL (VDSL)
Network Interface Controllers
(NICs)
• Hardware component that connects a server or end user device
to a physical network cable
• The NIC is actually both a physical layer and data link layer device
 Provides physical access to a networking cable and an implementation of a
datalink protocol like Ethernet

• A NIC has a fixed MAC address that is uniquely assigned to its


network interface
Datalink layer
PAN, LAN, MAN, WAN

• PAN stands for Personal Area Network. It is a network used for


communication between devices in close proximity to an individual, usually
based on Bluetooth or Near Field Communication (NFC). It can be used to
connect devices such as smartphones, tablets, wireless headsets, and other
electronic devices
• LAN stands for Local Area Network. It is a networking technology, usually
based on Ethernet, to connect PCs, laptops, and printers within an office
building
• MAN stands for Metropolitan Area Network. This refers to a network that
connects multiple buildings, usually on a campus, such as a university, or in a
city
• WAN stands for Wide Area Network. It is a network that extends over larger
distances, such as between cities, countries or continents
Ethernet

• Developed at Xerox PARC between 1973 and 1975


• Originally employed a shared medium topology, based on coax cable
• Later Ethernet used twisted pair cabling with hubs and switches
 Decreased the vulnerability of the network caused by broken cables or bad connectors

• An Ethernet packet contains:


 Source and destination MAC addresses
 Data that needs to be transported (payload)
 Cyclic redundancy check
Ethernet CSMA/CD

• Carrier Sense Multiple Access with Collision Detection


• Any machine can start transmitting packets when the shared
carrier is not in use
 Coax cable, twisted-pair hub or Wi-Fi radio signal spectrum

• Carrier sensing circuitry checks the activity on the carrier


• When two machines start to transmit a packet at the same time,
a packet collision occurs
 This is detected by all sending machines
 They will stop the transmission immediately
 After a short waiting time, they will retransmit their packet when the carrier
is not in use anymore
WLAN (Wi-Fi)

• A wireless local area network (WLAN) links two or more devices


using radio transmissions
• Wi-Fi: WLANs that are based on the IEEE 802.11 protocol family
• Wi-Fi is a special implementation of Ethernet
 The radio spectrum is the shared medium
WLAN (Wi-Fi)

• Wi-Fi range is about 30 m


• Access points are base stations for a wireless network
• Data encryption: Wi-Fi Protected Access (WPA)
 WPA dynamically generates a new key for each packet
 WPA includes a Message Integrity Check
 Prevents an attacker from capturing, altering and/or resending data packets
Switching

• Switches split a single network segment into multiple


segments
 Each segment has one device

• Switches learn which MAC address is connected to


which port
• Data sent to a certain MAC address will only be
forwarded to the switch port that has that MAC
address connected
• On a switched network, many simultaneous data
transfers can take place, in full-duplex
WAN

• Wide Area Networks (WANs) started to appear in the 1980s


• Most WAN connections today are based on packet switching technologies
 Devices transport packets via a virtual point-to-point link across a carrier
network
• Packet switched networks are very reliable
• Most WAN connections have been migrated to VPNs running on one of
the following technologies:
 The MPLS network of a network provider
 The internet using IPsec or SSL
 Dark fiber
• SD-WAN is a software-defined approach to managing a WAN. A major benefit is
a simplification of systems management through automation
Public wireless networks

• Public wireless (mobile) networks are getting more popular every


day
• Public wireless networks are much less reliable than private
wireless networks and have lower bandwidth
• Technologies:
 1G and 2G: GSM, CDMA, GPRS and EDGE
 3G: UMTS and HSDPA
 4G & 5G: LTE
Network layer
The IP protocol

• IP, in combination with TCP, was invented by Robert Kahn and Vinton Cerf
in 1973
• The IP protocol is by far the most used layer 3 protocol in the world
• IPv4 is the dominant protocol on the internet today
• The IP protocol assumes that the network is inherently unreliable and that
it is dynamic in terms of availability of links and nodes
• IP uses data packets that contain:
 Source address
 Destination address
 Payload data (typically an Ethernet packet)
The IP protocol

• IP routing protocols dynamically define the path of IP packets from source


to destination
• Routing issues:
 Due to network disruption, IP packets can get lost or corrupted
 When an error is detected, the IP packet is dropped by the node that found the error
 Since each IP packet is routed individually, IP packets can arrive at the destination out
of order

• The effects of dropped IP packets and IP packets arriving out of order is


handled by upper layer protocols like TCP
IPv4 addresses

• IPv4 addresses are composed of 4 bytes (32 bits), represented by 4


decimal numbers, and divided by a period (like 192.168.0.1)
• An IP address has a network prefix and a host number
• All hosts with the same network prefix can communicate directly to each
other
• Hosts in other networks can only be reached using a router
IPv4 classes

• The first three bits of the first


byte of an IP address define the
class of the address
• Three classes of networks are
defined

Max number of Number of available


Class First byte
hosts networks
A 0– 127 16,777,214 128
B 128– 191 65,534 16,384
C 192– 223 254 2,097,152
IPv4 subnetting
CI DR Available Hosts per subnet
Subnet mask
prefix subnets
/ 24 255.255.255.0 1 254
• Subnetting is used to split up / 25 255.255.255.128 2 126

the host part of an IP network / 26 255.255.255.192 4 62


30
in smaller subnets, each / 27 255.255.255.224 8
/ 28 255.255.255.240 16 14
forming a new IP network / 29 255.255.255.248 32 6
2
• The routing prefix can also be / 30 255.255.255.252 64
2 (only point-to-point)
/ 31 255.255.255.254 128
expressed in CIDR notation
 It is written as the address of
a network, followed by a slash
character (/), and ending with
the bit-length of the network
space
 For example, 255.255.255.0 is
the network mask for the
192.168.1.0/24 CIDR notation.
IPv4 - Private IP ranges

• Private IP addresses should be used for LANs


 The number of unique IP addresses on the internet is limited
 Hosts with public internet IP addresses can reach the internet directly

• Private IP address ranges:


 10.0.0.0 to 10.255.255.255 (class A address range)
 172.16.0.0 to 172.31.255.255 (class B address range)
 192.168.0.0 to 192.168.255.255 (class C address range)

• Private IP addresses:
 Are not used on the internet
 Are not routed by internet routers
IPv6

• IPv6 was introduced in 1998 as a successor of IPv4 to solve the problem of


limited IP address space
• IPv6 uses 128-bit addresses represented in eight groups of four hexadecimal
digits separated by colons. Example:
2001:0bb8:86a2:0000:0000:8b1e:1350:7c34
• The first three groups of numbers (2001:0bb8:86a2) form the network
address. These are used for routing over the internet
• The fourth group (0012) is the subnet mask, used for routing in a private
network
• The last four groups (0000:8b1e:1350:7c34) are the host address. In
Ethernet networks, the host address is derived from the actual physical or MAC
address
IPv6

• IPv6 has the following benefits over IPv4:


 Expanded address space
 Better support for mobile IP
 Fixed header length
 Auto configuration
 Quality of Service
 Security
 MTU discovery

• IPv6 is not backwards compatible with IPv4


IPv6

• Deployment models for IPv6:


 Use IPv6 on the LAN and on dedicated WAN links
 Protocol translation
 Dual stack
 IPv6 over IPv4 tunnels

• Dual stack is the simplest way to begin deploying IPv6


ICMP

• The Internet Control Message Protocol (ICMP) is an integral part


of the IP protocol
• The best-known use of ICMP:
 'ping‘
 'traceroute‘
Routing

• A router copies IP packages between


(sub)networks
• Routers compile routing tables to make
IP packet forwarding decisions
• Routing and switching functionality may
be combined in one device
 A switch capable of handling routing protocols
is also known as a layer 3 switch
Routing protocols

• Dynamic routing protocols automatically create routing tables


 Based on information exchange with neighboring routers

• When a network connection experiences problems, the routing


protocol automatically reconfigures the routing tables to use
alternative routes
• LAN and WAN routing protocols can be divided in three classes:
 Distance vector protocols (like RIP and IGRP)
 Link state protocols (like OSPF and IS-IS)
 Path vector routing (like BGP)
MPLS

• Multiprotocol Label Switching (MPLS) routes data from one


network node to the next with the help of labels
• MPLS allows setting up end-to-end circuit
 Across any type of physical transport medium
 Using any protocol

• In practice, MPLS is mainly used to forward IP and Ethernet traffic


Transport layer
Transport layer

• The transport layer can maintain flow control, and can provide
error checking and recovery of data between network devices
• The most used transport layer protocols are TCP and UDP
TCP

• Transmission Control Protocol (TCP) uses the IP protocol to create


reliable transmission of so-called TCP/IP packets
 TCP provides reliable, ordered delivery of a stream of data between
applications
 TCP introduces much overhead
UDP

• User Datagram Protocol (UDP) emphasizes reduced latency over


reliability
 It sends data without checking if the data arrived
 Reduces much overhead
 UDP is typically used when some packet loss is acceptable
 Real-time voice and video streams
 When only small amounts of data are transmitted, that fit in one IP packet
TCP and UDP ports

• TCP and UDP use logical port numbers


• Each side of a TCP or UDP connection uses an associated port number
between 0 and 65,535
• Received TCP or UDP packets are identified as belonging to a specific
connection by its combination of the IP address, and the TCP or UDP port
number
 For instance: 192.168.1.2:80, the number after the colon represents the port number
(80 in this case)

• Servers running a specific service listen to well-known ports:


 FTP (port 21)
 SSH (port 22)
 SMTP (port 25)
 DNS (port 53)
 HTTP (port 80)
Network Address Translation (NAT)

• As a packet passes a NAT enabled


router from its internal network
interface to its internet interface, NAT
replaces the packet’s private IP
address with its public IP address
• NAT allows the use of a private
addressing space within an
organization, while using globally
unique addresses for routing data to
the internet
Session layer
Session layer

• The session layer provides mechanisms for opening, closing and


managing a session between end-user application processes
Virtual Private Network (VPN)

• A Virtual Private Network (VPN) uses a public network to


interconnect private sites in a secure way
 Also known as a VPN tunnel

• VPN uses "virtual" connections based on IPsec/SSL


• Most network providers also offer private VPNs based on MPLS
Virtual Private Network (VPN)

• VPNs use strong encryption and strong user authentication


 Using the internet for transmitting sensitive data is considered safe

• VPN tunnels are often used for remote access to the LAN by users
outside of the organization's premises
• Most common VPN communications protocol standards:
 Point-to-Point Tunneling Protocol (PPTP) for individual client to server
connections
 Layer 2 Tunneling Protocol (L2TP) for individual client to server connections
 IPsec for network-to-network connectivity

• IPsec is built into IPv6 standard and is implemented as an add-on


to IPv4

You might also like