Professional Documents
Culture Documents
training.cyberoam.com
Learning
training.cyberoam.com
Cyberoam Introduction
Established in 1999
650+ Employees
Sales, Distribution Channel and Customers across 125+
Countries
Amongst the top 3 global players for network security
features
Patent for Identity-based Management
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Wi-Fi
Learning
training.cyberoam.com
1. Simplex
2. Half Duplex
3. Full Duplex
A
A
B
B
A sends to B only
Data
data can travel in
both
both
the
directions
directions,
but simultaneously.
only one at a time.
AAsend
sendto
toBBthen,
and. B sends to A
Learning
training.cyberoam.com
ISO
ITU
IEEE
IETF
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Physical
Data Link
Network
Transport
Session
Presentation
Application
Learning
training.cyberoam.com
Physical
Data Link
Network
Transport
Application
The Comparision
Learning
training.cyberoam.com
Learning
training.cyberoam.com
IP
ICMP
TCP
UDP
Learning
training.cyberoam.com
LAN
MAN
WAN
Learning
training.cyberoam.com
Over the period of time, to access a LAN there are two access
methods
1.
Ethernet
2.
Token Passing
Learning
training.cyberoam.com
Unicast
Multicast
Broadcast
Learning
training.cyberoam.com
Mesh
Star
Tree
Bus
Ring
Learning
training.cyberoam.com
Metropolitan Area
Network (MAN)
Learning
training.cyberoam.com
Original
message
Broken
into
packets
Routed access
a
network path
that
can be
modified
as needed
Reassembl
ed
to from
original
message
Learning
training.cyberoam.com
IPv4; and
IPv6
Learning
training.cyberoam.com
Learning
training.cyberoam.com
Class A
Class B
Class C
Class D
Class E
A Class E
A address
B
C
D
address has
has the
the order
order of
of the
the
highest bit set to 1-1-1-1-0
zeroand
1-0
1-1-0
1-1-1-0
and
and
itithas
ithas
has
aa16
a24
8bit
bit
bitlocal
local
local address.
host
host address.
It
They
is reserved
are usedfor
to future
identify
use
group of computers
a common
application
or
running
No. Of bits
to Identify
Network :program
7
14
21
software
7
14
No. of networks : 221
==128
16,384
2,097,152
24
No. of hosts : 2816
==256
16,777,216
65,536
Learning
training.cyberoam.com
Eg. 11111111.11111111.11111111.11111111
HTTP
HTTPS
SMTP
POP/POP3
IMAP
FTP
Learning
training.cyberoam.com
Local Bridge
Remote Bridge
Learning
training.cyberoam.com
Advantages:
More devices can communicate on a bridged network than the
number of devices that would be communicating on a single LAN
Bridges extend the geographical length of a LAN
Bridges are simple to install and transparent
Bridges connect LAN segments and so devices can be moved from
one segment to another without the change of IP Address.
Disadvantages
Bridges cannot understand the redundant network paths and so no
advantage of splitting the load over network segments.
Bridges can overload the network by increasing the traffic when it
receives a frame with unknown address.
Process the MAC address and hence are slower than repeaters
Learning
training.cyberoam.com
LAN Switching
VLAN
MPLS
Learning
training.cyberoam.com
VLAN
Learning
training.cyberoam.com
MPLS
Learning
training.cyberoam.com
Routing Concepts
Learning
training.cyberoam.com
Routing Tables
Cost
Learning
training.cyberoam.com
Routing Metrics
Path Length
Reliability
Delay
Bandwidth
Load
Communication Cost
Learning
training.cyberoam.com
Static
Router
A
Router
B
Router
C
Router
D
Learning
training.cyberoam.com
Dynamic
Learning
training.cyberoam.com
RIP
Learning
training.cyberoam.com
OSPF
Documented in RFC
Learning
training.cyberoam.com
BGP
IGRP
Compares two routers with all metrics and then selects best
route
Learning
training.cyberoam.com
Learning
training.cyberoam.com