You are on page 1of 40

WELCOME TO IP RULERS

www.iprulers.com | training@iprulers.com 1
BASIC NETWORKING

www.iprulers.com | training@iprulers.com 2
Networking

What is a computer network / Networking ?


“ A computer network is a collection of devices connected to each other, in order to allow every device to
share its resources with other devices, and access other device’s shared resources “
 Sharing a printer
 File sharing
 Network users can communicate by email and instant messenger.
 Utilize a Centralized Database
 Improving storage efficiency and volume
 Access flexibility
 Securing valuable information

www.iprulers.com | training@iprulers.com
Basic Requirement of Networking

 Endpoints
 Network Interface Card (NIC)
 Cables and Connectors
 Network Components
 Protocols
 Topology

www.iprulers.com | training@iprulers.com
Endpoints
 PC
 Laptop
 Servers
 Mobile Devices
 Printer
 Phones
 Camera
 IOT Devices

www.iprulers.com | training@iprulers.com
Network Interface Card (NIC)
• It is a circuit board installed in a computer that provides a dedicated network connection to
the computer.
• NIC is a hardware component without which a computer cannot be connected over a network.
• It is also called Network interface controller, Network Adapter ,Ethernet Card or LAN adapter.
• Every NIC has a hardware address that's known as a MAC, for Media Access Control.

www.iprulers.com | training@iprulers.com
Media Access Control address (MAC)
 Media access control address is a unique ID assigned to network interface cards (NICs)

 MAC address is a hardware identification number that uniquely identifies each device on a
network

 It is hardwired or hard-coded onto your computer's network interface card (NIC)

 It is also known as Ethernet Address, Physical address or hardware address

 It identifies the hardware manufacturer and is used for network communication between
devices in a network segment

 The physical address is stored into the NIC by its manufacturer, that is why this address is
also called a burned-in address (BIA) or ethernet hardware address.

 MAC address is a 48 bit address which represent in Hexadecimal format.


www.iprulers.com | training@iprulers.com
https://dnschecker.org/mac-lookup.php

www.iprulers.com | training@iprulers.com
Cables and Connectors

 Coaxial Cable

 Twisted Pair

 Fiber-Optic cable

www.iprulers.com | training@iprulers.com
Coaxial Cable

The most popular cable in cable television industry, a coaxial cable consists of copper conductor which is
surrounded by an insulation material, over the insulation material is copper braid or foil that acts both
as the second wire in the circuit and as a shield for the inner conductor thereby protecting it from
interference.
There are two types of coaxial cable
• Thinnet:. It was used previously used in Ethernet networks
• Thicknet: This cable can carry signal to long distances before the signal quality degrades.

www.iprulers.com | training@iprulers.com
Twisted Pair
 Unshielded Twisted Pair Cable (UTP)
 Shielded Twisted Pair Cable (STP)
RJ45: Connector used for Ethernet cables

www.iprulers.com | training@iprulers.com
Cable Crimping

 Straight through : Used to connect devices on different layers of the OSI Model.

 Cross over : Used to connect devices on the same layer of the OSI Model.

 Rollover cable : Used to connect directly to the console port of Cisco equipment.

www.iprulers.com | training@iprulers.com
Cable Pinout
Crossover cable: If the endpoints transmit on the same pin pair
Straight-through cable: If the endpoints transmit on different pin pairs

www.iprulers.com | training@iprulers.com
The Different Types of Ethernet Cables

UTP Cable maximum distance: 100 Meters


Cisco switches have a feature called automatic medium-dependent interface crossover Auto-MDIX that notices
when the wrong cable is used and automatically changes its logic to make the link work.

https://www.groundcontrol.com/galileo/Making_Ethernet_Cables_Print.pdf

www.iprulers.com | training@iprulers.com
Fiber-Optic cable
Fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. They're
designed for long-distance, high-performance data networking, and telecommunications.
There two types of fiber optic cables
• Single-Mode: It has as single stand of glass fiber, with a small core and supports one mode of
transmission. Single mode fiber optic cable can run longer distances but it is more expensive than multi-
mode fiber.

• Multi-Mode: It has a bigger core and supports multiple propagation paths and modes. Multi-mode fiber
is used for small to medium distances

www.iprulers.com | training@iprulers.com
Fiber Optic Connectors
 ST Connector (Straight Tip)
 SC Connector (Subscriber Connector)
 LC Connector (Local Connector)

Media Converter
Allow the conversions between different types of Fiber Optic or between Fiber and Ethernet.

 Single Mode Fiber to Ethernet


 Multi Mode Fibre to Ethernet
 Fiber to Coaxial
Transceiver
Transceiver is a transmitter and a receiver, a device that both transmits and receives analogue or digital
signals.
www.iprulers.com | training@iprulers.com
Network Topologies
Network topology is the layout of a network. Network topology refers to how various nodes,
devices, and connections on your network are physically or logically arranged in relation to each
other.
It consists of two parts;
 Physical Topology
 Logical Topology

www.iprulers.com | training@iprulers.com
Physical Topology
Physical network topology is the placement of the various components of a network and the different
connectors usually represent the physical network cables, and the nodes represents usually the physical
network devices (like switches, Hub).
Types of Physical Topology:

 Bus Topology
 Star Topology
 Ring Topology
 Mesh Topology
 Hybrid Topology

www.iprulers.com | training@iprulers.com
Bus Topology
 Simplest an easiest to install
 Single cable that runs to all computers which share the same data and address path
 Don’t exist today

www.iprulers.com | training@iprulers.com
Ring Topology

• Ring topology is where nodes are arranged in a circle (or ring). The
data can travel through the ring network in either one direction or
both directions, with each device having exactly two neighbors.

www.iprulers.com | training@iprulers.com
Mesh Topology
 Each device is connected to every other device
 High fault tolerance – message can take an indirect route if cable fails
 Most Complex – rarely found
 Number of cables formula = (y X (y-1)) ÷2 Where y is the number of
computers
 50 computers = (50 X (50-1) ÷2 = 1,225 Cables!!!!!!
 Expensive to install and maintain.

www.iprulers.com | training@iprulers.com
STAR Topology
 In this topology, all computers connect to a centralized networking device.
 Usually, a networking switch or Hub is used as the centralized device.
 If hub/switch goes down it affects the whole network (single point of failure)
 If computer goes down it doesn’t affect the network (fault tolerant)
 Easy to install

www.iprulers.com | training@iprulers.com
Tree Topology
 In this topology, all computers connect to a centralized networking device.
 Usually, a networking switch or Hub is used as the centralized device.
 If hub/switch goes down it affects the whole network (single point of failure)
 If computer goes down it doesn’t affect the network (fault tolerant)
 Easy to install

www.iprulers.com | training@iprulers.com
Hybrid Topology
This topology is a mix of two or more topologies. For example, there are two networks; one is built from the
star topology and another is built from the bus topology. If we connect both networks to build a single
large network, the topology of the new network will be known as the hybrid topology.
You are not restricted to the bus and star topologies. You can combine any topology with another topology.
In modern network implementations, the hybrid topology is mostly used to mix the wired network with the
wireless network.

www.iprulers.com | training@iprulers.com
Network Components
 HUB
 Bridge
 Switch
 Repeater
 Router
 Access point
 Wireless Lan Controller (WLC)
 Firewalls

www.iprulers.com | training@iprulers.com
HUB
 Hub is used in a wired network to connect Ethernet cables from a number of devices together.
 Hubs are legacy devices and should not be used in today’s networks.
 Hubs do not segment network traffic.
 When one device sends traffic, the hub floods that traffic to all other devices connected to the hub
(except the incoming port), and the devices share the bandwidth
 Half duplex: The device must wait to send if it is currently receiving a frame; in other words, it
cannot send and receive at the same time.
 Half-duplex logic actually use a relatively well-known algorithm called carrier sense multiple access
with collision detection (CSMA/CD)

www.iprulers.com | training@iprulers.com
Bridge

 Bridges are used to connect(bridge) LAN’s together


 Bridges were introduced to divide LANs into segments.
 A bridge keeps a record of all the devices on each segment.
 The bridge can then filter network traffic between LAN segments. This helps reduce the amount of traffic
between devices
 Bridges can Connect different type of networks so that they can ac as a one single LAN and thus can
communicate with each other.

www.iprulers.com | training@iprulers.com
Repeater
 Regenerating weak signals is the primary purpose of a repeater,
 Repeaters are also called extenders because they extend the distance a signal can travel.
 In today’s networks, repeaters are most often used to regenerate signals in fiber-optic cables.
 Also every networking device that receives and sends data regenerates the signal.

www.iprulers.com | training@iprulers.com
Switch
 switch microsegments a LAN.
 Switches are also known as intelligent Hub
 Switches use MAC addresses to forward traffic within a single network.
 Micro segmenting means that switches filter and segment network
 Switch send traffic to specific port based on Mac table or CAM table.
 This provides higher dedicated bandwidth to each device on the network
(100Mbps,1Gb,10Gb,40Gb,100Gb).
 Full duplex: The device does not have to wait before sending; it can send and receive at the same
time.

www.iprulers.com | training@iprulers.com
Router
 A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's
network
 The router is generally located at gateways, the places where two or more networks connect.
 Routers use IP addresses to forward traffic to other networks.
 Routers are working based on routing table which contain destination network, exit interface and metric

www.iprulers.com | training@iprulers.com
Access points
 Wireless access points (Aps) provide network access to wireless devices such as laptops and tablets.
 A wireless AP uses radio waves to communicate with the wireless NIC in the devices and other wireless
access points.
 An access point has a limited range of coverage.
 Large networks require several access points to provide adequate wireless coverage.
 A wireless access point provides connectivity only to the network same like a switch.

www.iprulers.com | training@iprulers.com
Wireless Lan Controller(WLC)

 Wireless LAN Controller, whose purpose is to centralize the control of Access Points (APs).
 A Wireless LAN Controller (WLC) is a centralized device in the network which is used in combination with
the Lightweight Access Point Protocol (LWAPP) to manage lightweight access points in large quantities by the
network administrator or network operations centre.
 While standalone or autonomous ap can mange individually.
 WLAN controller, monitors and manages wireless access points in bulk and allows wireless devices to connect
to WLAN

www.iprulers.com | training@iprulers.com
Firewall and NGFW

 Firewall is a network security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.
 It can be software or hardware based firewall .
 Next Generations Firewalls (NGFW) providing full layer-7 inspection(URL Filtering,Application Filter,SSL
Inspection,Malware protection etc..)
 Be router and switch compatible (L2/L3)
 They must add packet filtering with IPS and Malware inspection capability
 Provide Network Address Translation (NAT)
 Permit stateful inspection
 Permit Virtual Private Networks (VPNs)
 Provide URL and Application filtering
 Implement QoS

www.iprulers.com | training@iprulers.com
Physical components of a network

www.iprulers.com | training@iprulers.com
Physical components of a network

www.iprulers.com | training@iprulers.com
Protocols
“ A protocol is a standard set of rules and regulations that allow
the devices to communicate with each other. “

 Routed protocols
 Routing protocols

www.iprulers.com | training@iprulers.com
Routed protocol
“A routed protocol is a protocol by which data can be routed.”

 A Routed Protocol is a network protocol which can be used to send the user data from one network to
another network.
 Routed Protocol carries user traffic such as e-mails, file transfers, web traffic etc.
 Routed protocols use an addressing system (example IP Address) which can address a particular network
and a host (a computer, server, network printer etc.) inside that network.
 The address which is used by a Routed Protocol has a network address part and a host (a computer
inside a network) part.

 NETBEUI
 IPX/SPX
 AppleTalk3
 TCP/IP

www.iprulers.com | training@iprulers.com
Routing protocols
 A routing protocol is only used between routers
 Its purpose is to help routers building and maintain routing tables.
 Routing Protocols are network protocols used to dynamically advertise and learn the networks
connected, and to learn the routes
 Routing Protocols have capacity to learn about a network when a new network is added and detect when
a network is unavailable.
 Routing Protocols normally run only in Routers, Layer 3 Swithes, Firewalls etc.

 IGP (Interior Gateway protocols) –RIP,EIGRP,IS-IS,OSPF


 EGP (Exterior Gateway Protocols)- BGP

www.iprulers.com | training@iprulers.com
THANK YOU

www.iprulers.com | training@iprulers.com 40

You might also like