You are on page 1of 48

Cyberoam Certified Network & Security Profess

training.cyberoam.com

Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Righ

Introduction > About Myself


Ravi Pithawala
Pre-sales Consultant
Cyberoam India
Email: ravi.pithawala@cyberoam.com

Learning
training.cyberoam.com

Cyberoam Introduction
Established in 1999
650+ Employees
Sales, Distribution Channel and Customers across 125+
Countries
Amongst the top 3 global players for network security
features
Patent for Identity-based Management

Introduction > Please Introduce Yourself


Your Name
Your Expectation From this Course

Learning
training.cyberoam.com

Introduction > Training Kits


Verify your Take Away
CCNSP Guide
Quick Start Guide
Writing pads

Learning
training.cyberoam.com

Introduction > Schedule/Breaks


Sessions starts at 10:00 hours
Breaks
Refreshments (around 11:30 hours)
Lunch (around 13 hours)
Refreshments (around 15:30 hours)
Sessions ends at 17:30 hours

Learning
training.cyberoam.com

Introduction > Training Pre-requisites


There are no Pre-requisites for this course

Learning
training.cyberoam.com

Introduction > Organization of Presentation


Current Learning Module
Topic/Subtopic in the Module

Learning
training.cyberoam.com

Module 1 Interworking Technologies

Learning
training.cyberoam.com

Module 1 > Networking Basics > What is Communication?


a Computer
Message
? Network ?

A network is a data communication system that allows users


and devices to communicate with each other. A network that
contains computers as a part of devices is known as a
Computer Network. When a message is sent across from one
point to another point, we say that communication has taken
place.

A message is a term used for the information and a single unit


of communication transmitted over a network. A message can
be anything like an email (Electronic Mail), a file, an image, or
any piece of information. A PC or any other machine which is
capable of processing information is known as a network node.

In a communication process minimum 2 PCs or devices are


involved. The device which initiates the communication is
known as a sender and the device which receives the message
is a receiver. Sender and Receiver are connected to each other
via a medium or media which is generally in the form of wires
Learning
(nowadays, wireless).
training.cyberoam.com

Module 1 > Networking Basics > Types of Media

Learning
training.cyberoam.com

Module 1 > Networking Basics > Guided Media > Fiber-Optic


Twisted Pair
Co-Axial

Guided Media are those types of media that provide a conduit


from one point to another on the network.
Example

Twisted Pair Cable


Co Axial Cable
Fiber Optic

Learning
training.cyberoam.com

Module 1 > Networking Basics > Unguided Media

The unguided media is usually the wireless medium and it can


be in the form of radio waves and micro waves
Example

Wi-Fi

Learning
training.cyberoam.com

Module 1 > Networking Basics > Modes of Transmission

There are three types of strategies used for data transmission


between two communicating machines

1. Simplex
2. Half Duplex
3. Full Duplex

A
A

B
B

A sends to B only
Data
data can travel in
both
both
the
directions
directions,
but simultaneously.
only one at a time.
AAsend
sendto
toBBthen,
and. B sends to A
Learning
training.cyberoam.com

Module 1 > Networking Basics > Standardization


How systems on different platforms
communicate?

Two systems may be on different types of operating systems, or


may have completely different set of hardwares

Protocols are a set of rules which is followed by each


communicating system on a network

ARP (Address Resolution Protocol) is used to find out the address


of the systems involved in communication

With ARP it is possible to find out the physical address (MAC) of


the sender and receiver
ARP is responsible for converting the address of communicating
systems into machine readable form (i.e. binary)

Standardization is a set of rules laid down by standards


organizations which has to be followed by any vendor relating a
technical standard, specification, a test method, procedure, or
definition, etc.
Learning
training.cyberoam.com

Module 1 > Standards Organizations

ISO

ITU

International Telecommunication Union

IEEE

International Standards Organization

Institute of Electrical and Electronic Engineers

IETF

Internet Engineering Task Force

Learning
training.cyberoam.com

Module 1 > OSI Reference Model

The OSI Reference Model is developed by the ISO

It is a Seven Layered Model showing interconnection between


two communicating systems

Learning
training.cyberoam.com

Module 1 > OSI Reference Model (Continued)

The seven layers of OSI Model

Physical

Data Link

Network

Transport

Session

Presentation

Application

Learning
training.cyberoam.com

Module 1 > TCP/IP Suite

The Five layers

Physical

Data Link

Network

Transport

Application

The Comparision

Learning
training.cyberoam.com

Module 1 > What is Internetwork?

Internetwork is network of networks.

An organizations network is its own private network, On


connecting two or more of these networks, it becomes an
internetwork.
Example:

Learning
training.cyberoam.com

Module 1 > Protocols used in Communication

Protocols are set of rules used for communication.

Various protocols are used at all levels of the OSI Reference


Model
Example:

IP

ICMP

TCP

UDP

Learning
training.cyberoam.com

Module 1 > Types of Network

Based on the geographical area covered by a network, there are


three basic types of network

LAN

MAN

WAN

Learning
training.cyberoam.com

Module 1 > Types of Network > LAN

A Local Area Network is a very high speed network that covers a


small area like a home, school, computer laboratory, or an office
building. A LAN is used to connect workstations, printers,
servers, and other devices. The basic advantage offered by a
LAN is the sharing of resources.

Over the period of time, to access a LAN there are two access
methods
1.

Ethernet

2.

Token Passing

Learning
training.cyberoam.com

Module 1 > Types of Network > Types of Transmission

Unicast

Multicast

Broadcast

Learning
training.cyberoam.com

Module 1 > Types of Network > Types of Topologies

There are many different ways of connecting the computers


together in a network, which is also known as a Topology

Mesh

Star

Tree

Bus

Ring

Learning
training.cyberoam.com

Module 1 > Types of Network > Interconnecting Devices

Interconnecting devices are used to connect multiple devices


working on same or different environment (hardware &
software)
Gateways
Gateways
Routers
Bridges
Repeaters
operate
operate
operate
at at
at
thethe
the
data
network
link
Session,
layer
physical
(Layer
layer
Presentation,
3)(Layer
2)
of the 1)
OSI
and
of the
Routers
Application
Reference
OSI
Reference
Model.
layers
Model.
They
of the
Repeaters
connect
OSI
Bridges
Reference
network
a
receive
similarthe
to
type
Model.
internetworks
transmission
of network
The major
in
which
form
task
are
environment
of
raw
physically
of bits
the and
gateway
into
unified.
regenerate
logical
is On
to and
them
Repeaters
connect
successful
physical
by
boosting
different
internetworks.
connection,
the level
networking
the
Bridges
Relating with OSI
environments.
(Amplitude)
so Gateways
as
to increase
can be
identity
are
usedoftoeach
store
network
and
forward
is
application
the
geographical
specific
or points.
network
of
retained
frames
as to
a separate
the coverage
end
configuration
the
network
because
dependent,
physical
and
networking
Bridges
alsoenvironment.
inspect
the
frames
A
theydecide
routers
and
signals
may
can
primary
use
whether
only
a protocol
span
purpose
toaforward
limited
is to
convertor
find
or
distance
discard.
the best
before
for path
translating
thebetween
quality
a set
of
theof
protocols
internetwork
service
is to
affected.
another.
to forward and
store packets.
Learning
training.cyberoam.com

Module 1 > Types of Network (Revisited)

What is LAN, MAN, and WAN ?


Local Area Network
(LAN)

Metropolitan Area
Network (MAN)

Wide Area Network


(WAN)

Learning
training.cyberoam.com

Module 1 > Types of Network > WAN > Types of WAN

Point to Point WAN

Circuit Switching WAN

Packet Switching WAN

Original
message

Broken
into
packets

Routed access
a
network path
that
can be
modified
as needed

Reassembl
ed
to from
original
message

Learning
training.cyberoam.com

Module 1 > IP Addressing

Every device on the Internetwork is assigned a unique address.

These devices may be personal computers, communications


servers, ports on a communications server, internetwork
routers, or network control servers.

Some devices, such as routers, have physical connections to


more than one network, and they must normally be assigned a
unique internet address for every network connection

There are two Types of IP Addresses

IPv4; and

IPv6

Learning
training.cyberoam.com

Module 1 > IP Addressing > IPv4

Each internetworking address has a 32 bit address field which is


split into two parts.

The first part identifies the network on which the


communicating host is located

The second specifies identifies the communication host itself

The hosts attached to same network share a common prefix


which designates their network number

IP Addresses are divided into classes

There are five classes of IP Addresses

Learning
training.cyberoam.com

Module 1 > IP Addressing > IPv4 Classes

Class A

Class B

Class C

Class D

Class E

A Class E
A address
B
C
D
address has
has the
the order
order of
of the
the
highest bit set to 1-1-1-1-0
zeroand
1-0
1-1-0
1-1-1-0
and
and
itithas
ithas
has
aa16
a24
8bit
bit
bitlocal
local
local address.
host
host address.
It
They
is reserved
are usedfor
to future
identify
use
group of computers
a common
application
or
running
No. Of bits
to Identify
Network :program
7
14
21
software
7
14
No. of networks : 221
==128
16,384
2,097,152
24
No. of hosts : 2816
==256
16,777,216
65,536

Learning
training.cyberoam.com

Module 1 > IP Addressing > IPv4


Understanding
Address Range
IPv4 Notation

IP Addresses are specified in four sets of decimal numbers


separated by a dot.

This format is also known as a dotted decimal notation

The notation hence divides the 32 bit IP Address into 4 groups of


8 bits also known as octets.

Eg. 11111111.11111111.11111111.11111111

Range for IP Address by class can be seen below

Class A : 001.xxx.xxx.xxx to 126.xxx.xxx.xxx

Class B : 128.001.xxx.xxx to 191.254.xxx.xxx

Class C : 192.000.000.xxx to 223.255.254.xxx

Class D : 224.000.000.000 to 239.255.255.255


Learning
training.cyberoam.com

Module 1 > Application Protocols

HTTP

HTTPS

SMTP

POP/POP3

IMAP

FTP

Learning
training.cyberoam.com

Module 1 > Bridging

Extends the area of network by connecting adjacent LANs

Bridges the GAP between two LANs (so called a Bridge)

Local Bridge

Remote Bridge

Learning
training.cyberoam.com

Module 1 > Bridging Advantages / Disadvantages

Advantages:
More devices can communicate on a bridged network than the
number of devices that would be communicating on a single LAN
Bridges extend the geographical length of a LAN
Bridges are simple to install and transparent
Bridges connect LAN segments and so devices can be moved from
one segment to another without the change of IP Address.
Disadvantages
Bridges cannot understand the redundant network paths and so no
advantage of splitting the load over network segments.
Bridges can overload the network by increasing the traffic when it
receives a frame with unknown address.
Process the MAC address and hence are slower than repeaters

Learning

training.cyberoam.com

Module 1 > Switching Internetwork Communication > LAN


Switching

LAN Switching

Uses MAC address from the sender to decide where to


forward frames.

Maintains MAC address tables

L2 Switch can be used to connect different types of media


like Ethernet & Fiber because it does not change any
information

VLAN

MPLS

Learning
training.cyberoam.com

Module 1 > Switching Internetwork Communication > VLAN

VLAN

Group of computers logically into same network

Same as LAN but allows computers to be grouped even if


they are not on the same interconnecting device

Can be used to segregate computers on the same


interconnecting device into different networks

Learning
training.cyberoam.com

Module 1 > Switching Internetwork Communication > MPLS

MPLS

MPLS (Multi Protocol Label Switching) is introduced as a


faster mechanism to transfer data.

Works at layer 3 (Network Layer) of the OSI Reference


Model.

Forwards packets from host to destination.

IP packets are encapsulated with a label, so instead of


looking for the tables in the devices, the nodes on the
network are labeled.

Works on switching technology and hence the devices that


work on MPLS terminology are known as Label Switched
Devices.

Learning
training.cyberoam.com

Module 1 > Routing Internetwork Communication > Routing


Concepts

Routing Concepts

Requires more information than bridging.

A router will receive only those packets which are addressed


to it. A router has more decisions to make than a bridge and
therefore they need more information than a bridge
contains.

The primary information contained in a router is the routing


tables

Must create and maintain the routing tables.

Must select the next shortest path to the next network or


router based on the information contained in the packet.

Learning
training.cyberoam.com

Module 1 > Routing Internetwork Communication > Routing Tables

Routing Tables

A routing table contains data which contains the routes to


any network attached to that router.

A router makes and stores the routing table so that it knows


exactly where to deliver the packets when they arrive. A
routing table consists of minimum three fields.

Network id (destination network)

Cost

Next hop (this is the address of the next router on the


network)

Learning
training.cyberoam.com

Module 1 > Routing Internetwork Communication > Routing Metrics

Routing Metrics

Path Length

Reliability

Delay

Bandwidth

Load

Communication Cost

Learning
training.cyberoam.com

Module 1 > Routing Algorithms

Static

Router
A

Router
B

Router
C

Router
D

Learning
training.cyberoam.com

Module 1 > Routing Algorithms

Dynamic

Single Path and Multi Path

Link State and Distance Vector

Learning
training.cyberoam.com

Module 1 > Routing Protocols > RIP

RIP

It is a dynamic protocol and used by IP.

Informs the addresses of all routers to other routers.

Uses hop count

Runs on UDP port number 521.

Available in two versions RIPv1 and RIPv2

Documented in RFC 1058.

Learning
training.cyberoam.com

Module 1 > Routing Protocols > OSPF

OSPF

Open Shortest Path First link state dynamic protocol

Documented in RFC

Gathers link state and media information from all available


routers and constructs table of the network

Decision of forwarding is made on destination IP address

Being Link State protocol, can easily detect changes in


network

Does not use TCP/IP (TCP,UDP).

Directly integrated in IP datagram protocol number 89

Learning
training.cyberoam.com

Module 1 > Routing Protocols > BGP

BGP

Border Gateway Protocol, used for routing decision on the


Internet

Distance vector protocol

Routing decisions are made on path, network policies and


rules

More known as reach-ability protocol, and not a routing


protocol

Creates redundancy in larger networks giving maximum


efficiency

Works on TCP port 179

Each BGP router sends a message to all other routers to


check availability periodically
Learning
training.cyberoam.com

Module 1 > Routing Protocols > IGRP

IGRP

Interior Gateway Routing Protocol Proprietary protocol

Created to overcome limitations of RIP which can work only


till 15 hops and single routing metric

Is a distance vector protocol

Compares two routers with all metrics and then selects best
route

Learning
training.cyberoam.com

Next > Module 2 (Internetworking Technologies)

Learning
training.cyberoam.com

You might also like