You are on page 1of 4

Network Technology

An Ethernet crossover cable is a type of Ethernet able used to connect


computing devices together directly. It is most often used to connect two devices
of the same type: e.g. two computers (via network interface controller) or two
switches to each other.
Straight-Through wired cables are most commonly used to connect a host to client.
When we talk about cat5e patch cables, the Straight-Through wired cat5e patch
cable is used to connect computers, printers and other network client devices to
the router switch or hub (the host device in this instance).
Rollover cable (also known as Cisco console cableor a Yost cable) is a type of
null-modem cable that is often used to connect a computer terminal to a router's
console port.
A serial cable is a cable used to transfer information between two devices using
a serialcommunication protocol
Importance of Firewall:
Firewalls screen data coming in and out of computer networks, blocking
unauthorized access and halting traffic from unsafe Internet sources. On
shared networks, firewalls may automatically stop all traffic from an "infected"
computer to protect data on any connected computers. Firewalls act as the
first defensive shield against hackers, but they aren't invulnerable and have
limited ability to detect Trojan viruses or malicious software known as malware.
The Difference Between a Hardware Firewall and a Software Firewall
Firewalls, both hardware and software, protect computers from hackers and
other online threats by blocking dangerous pieces of data from reaching the
system. While hardware firewalls offer network-wide protection from external
threats, software firewalls installed on individual computers can more closely
inspect data, and can block specific programs from even sending data to the
Internet. On networks with high security concerns, combining both kinds of
firewalls provides a more complete safety net.
Hardware Firewalls
A hardware firewall sits between your local network of computers and the
Internet. The firewall will inspect all the data that comes in from the Internet,
passing along the safe data packets while blocking the potentially dangerous
packets. In order to properly protect a network without hindering performance,
hardware firewalls require expert setup, and so may not be a feasible solution
for companies without a dedicated IT department. For businesses with many
computers, however, being able to control network security from one single
device simplifies the job.
Software Firewalls
Software firewalls are installed on individual computers on a network. Unlike
hardware firewalls, software firewalls can easily distinguish between programs
on a computer. This lets them allow data to one program while blocking
another. Software firewalls can also filter outgoing data, as well as remote
responses to outgoing requests. The major downside to software firewalls for a
business is their upkeep: they require installation, updating and administration

on each individual computer.


Hubs

A hub receives a signal, regenerates it, and sends the signal over all ports
ports use a shared bandwidth approach
reduces the LAN performance due to collisions and recovery
maintains a single collision domain

Switches
A switch receives a frame and regenerates each bit of the frame on to the appropriate
destination port
Used to segment a network into multiple collision domains
Straight-through UTP cables : are used for connecting different types of
devices, such as a router LAN interface to a switch
Cross-over UTP cables provide connections between same type of devices, such as
a switch to another switch
The ping commandis a Command Prompt command used to test the ability of the source
computer to reach a specified destination computer. The ping command is usually used
as a simple way verify that a computer can communicate over the network with another
computer or network device.
ipconfig Usage
From the command prompt, type 'ipconfig' to run the utility with default options.
The output of the default command contains the IP address, network mask and gateway
for all physical and virtual network adapters.
'ipconfig' supports several command line options as described below. The command
"ipconfig /?" displays the set of available options.
The TRACERT (Trace Route) command is a route-tracing utility used to determine the
path that an IP packet has taken to reach a destination. Note You can run this utitily by
typing tracert IPAddress or tracertHostName at the command prompt.
Usage of ARP Commands: Address Resolution Protocol (ARP)
Displays and modifies address resolution, including ATM (Asynchronous Transfer Mode)
interfaces.
Example: arp -d 192.168.0.1
Removes ARP mappings for 192.168.0.1 on all interfaces.
What is VLAN?
A VLAN is a group of devices on one or more LANs that are configured to communicate
as if they were attached to the same wire, when in fact they are located on a number of
different LAN segments. Because VLANs are based on logical instead of physical
connections, they are extremely flexible.
Advantages of Virtual Local Area Network (VLANs)

*Higher performance and reduced latency.


*users may work on sensitive information which should not be seen by other users.
*VLAN Removes the physical boundary
Disadvantages of VLANs
*Management is complex
*Possible problems in interoperability
*A VLAN cannot forward traffic to another VLAN(need a router to communicate between
VLANs)
VLAN TAGGING
VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help
identify packets traveling through trunk links. When an Ethernet frame traverses a trunk
link, a special VLAN tag is added to the frame and sent across the trunk link.
As it arrives at the end of the trunk link the tag is removed and the frame is sent to the
correct access link port according to the switch's table, so that the receiving end is
unaware of any VLAN information.

Unicast MAC Address:


A unicast MAC address is the unique address used when a frame is sent from a single
transmitting device to a single destination device

Multicast MAC Address:

The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal
The value ends by converting the lower 23 bit of the IP multicast group address into
the remaining 6 hexadecimal characters
the remaining bit in the MAC address is always a 0
Hubs and Collision Domains
Hubs retransmit received signals to all connected devices
Hubs do not direct data traffic based on addresses
Hubs extend the distance that Ethernet cables can reach
Hubs operate at the Physical layer, dealing with signals on the media
Using hubs to provide network access to more users reduces the performance for each
user
fixed capacity of the cable is now shared between more devices
only one device can send data at any one time
the probability of a collision now increases
The connected devices that access a common media, via a hub or a series of
connected hub, make up a collision domain
Telnet:

a network protocol that allows a user on one computer to log into another computer that is
part of the same network.
SSH:

Secure Shell (SSH), sometimes known as Secure Socket Shell, is a


UNIX-based command interface and protocol for securely getting
access to a remote computer

Commands and their Usage:

How to See MAC Address:


C:\> ipconfig /all
this commands will shows the all details MAC, Physical, NIC , DNS etc.
IOS:
Inter Networking System : its type of software which is installed in
switches to operate them like, windows, unix etc. it provides the services of
Switching, routing functions. Its reliable and secure access to network as well.
Promt Command:
Router(config)#
Access User Execution Command : Router>enable
(Once Enter Press it
changed into ) Router#
after changing it shows that router is now in privelleged mode. If password on it
before then it ask first password:
and then change into
Router#
for Disable User Access
Router#disable
it will back to Router>
For Switch running configuration:
Switch#show running-config
Ping Command:
Router>ping
or
Router>ping ip address
Tracroute
Switch>traceroute or Swtich>tracroute ip address
For description
Router(config-if)#description
Clock Set Router Command:
Router>clock set 19:00:05
Showing interface
Router>sh

You might also like