You are on page 1of 33

DEBRE TABOR UNIVERSITY

FACULTY OF TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE

Network and System Administration

Slides by: Wondifraw M. & Gergito K.


CHAPTER-TWO

Fundamental of Sys and Network Admin


Out lines

 Network Operating System


 Network protocols and communication
 IP addressing
 Switch Environment
 VLANs
 Router concepts
Network Operating System (NOS)

 NOS is a computer operating system that is designed primarily to


support workstations, personal computers that are connected on a LAN.
 The software behind a NOS allows multiple devices within a network to
communicate and share resources with each other.
 All end devices and network devices connected to the Internet require an operating
system (OS) to help them for performing their function.
 The operating system on routers is usually called firmware.
 The most common method for configuring a router is through GUI.
 Most routers enable the update of the firmware as new features or security
Cont’d …

 Network devices use a network operating system.


 The network operating system used on Cisco devices is called the Cisco Internetwork
Operating System (IOS).
 Cisco IOS is a generic term for the collection of network operating systems used on
Cisco networking devices.
 Cisco IOS is used for most Cisco devices regardless of the type or size of the device.
 The most common method of accessing these devices is using a CLI.
 IOS file is stored in the flash memory, which provides non-volatile storage.
 In many Cisco devices, the IOS is copied from flash memory into random access
memory (RAM) when the device is powered on.
Getting Basic configuration of IOS

Accessing a Cisco IOS Device(Console, Telnet or SSHs and AUX port)


 Hostnames (name of the device
 Limiting Access to Device (LAD)
 Physically limiting access to network devices by placing them in closets and
locked racks is good practice.
 However, passwords are the primary defense against unauthorized access to
network devices. Every device, even routers, should have locally configured
passwords to limit access.
Enable password - Limits access to the privileged EXEC mode
Enable secret - Encrypted, limits access to the privileged EXEC mode
Console password - Limits device access using the console connection
VTY password - Limits device access over Telnet
Network protocol and Standard

 Networking protocols define a common format and set of rules for exchanging messages
between devices.
 Some common networking protocols are IP, HTTP, DHCP.
 The networking protocols are describing the following processes:
 How the message is formatted or structured
 The process by which networking devices share information about pathways with other
networks,
 How and when error and system messages are passed between devices
 The setup and termination of data transfer sessions.
 An example of using the protocol suite in network communications is the interaction between
Network protocols for the ISO

Layers Protocols in the layers


1. Physical Layer This is the sending a signal along a wire(Cables, and Interface)
2. Data link Layer Checking to makes sure that what was sent from one end of a cable to the other end.
(The Ethernet protocol, MAC addresses)

3. Network Layers IP addressing (Internet protocol)

4. Transport Layers. It builds ‘packets’ or ‘datagrams’ so that the network layer knows what is data and
how to get the data to their destination.(TCP and UDP protocol).

5. Session Layer helps a user program to set up a connection (socket protocols)


6. Presentation Layer How are the data which is sent by the sender was interpreted by the receiver. It uses
External data representation protocol(XDR protocol)

7. Application Layers The program which wants to send data has its own protocol layer, typically FTP or
HTTP protocol
IP addressing

 Every devices which are connected to the Internet needs to have a unique number which is
called IP address.
 In our computer devices to know our IP address (we ipconfig commands in cmd command
promote) if the device is not connected to the internet it shows that “media is disconnected”
other wise shows IP address and the get ways the network.
 Generally there are two types of IP addressing.
 IPv4 (32 bit or 4 bytes number)
 IPv6 (128 bit 16 bytes number)
 To know about the IP address concept numbering system is a mandatory especially about
converting number to the octal.
IPv4

 IPv4 address is 32 bit length address. It has 4 octets(bytes).


 The form of an IP address in IPv4 is a.b.c.m (where a,b,c, and m >= 0,<= 255) why ?
 There are three types of addresses within the address range of each IPv4 network:
1. Network address 2. Host addresses and 3. Broadcast address
 In an IPv4 network, the hosts can communicate one of three different ways:
1.Unicast:-process of sending a packet from one host to an individual host.
2.Broadcast - sending a packet from one host to all hosts in the network
3.Multicast - process of sending a packet from one host to a selected group of hosts.
Class full and Class less IP addressing

 What is the difference between class full and class less IP addressing?
1. Class full IP addressing
 Class full IP addressing is categorized as class A, B, and C.
Class less IP addressing

 Formal name Classless Inter-Domain Routing (CIDR, pronounced “cider”)


 Created a new set of standards that allowed service providers to allocate IPv4
addresses on any address bit boundary instead of only by a class full A, B, or C
address (i.e. different from 8,16,and 24).
 mostly classless address are suitable for the Subnetting networks. How ?
 Example 145.44.34.45/22
Types of IPv4 address

1. Private address: Hosts that do not require access to the Internet can use private addresses.
 A private IP address is the address space allocated by NIC to allow organizations to create their
own private network.
 10.0.0.0 to 10.255.255.255 (10.0.0.0/8)
 172.16.0.0 to 172.31.255.255 (172.16.0.0/12)
 192.168.0.0 to 192.168.255.255 (192.168.0.0/16)
2. A public IP address: address that is assigned to a device to allow direct access over the
Internet. A web server, email server and any server device directly accessible from the Internet are
candidate for a public IP address.
 A public IP address is globally unique, and can only be assigned to a unique device.
Cont’d …
IPv6 addressing

 Why IPv6?
 Because IPv4 has the following limitations:-
 It is running out of address space, because many addresses are bound up in
classes that make them unusable.
 Global routing tables are becoming too large, which making routing slow while
running and memory intensive.
 It is too easy to take control of a connection by guessing sequence numbers.
 There is no native support for encryption
 Less quality of Service (QoS) guarantees for mobile computing.
Cont’d ...

The reason why migrate from IPv4 to IPv6


 Limitation of IPv4 address space has been the motivating factor for moving to
IPv6 address.
 With an increasing Internet population, a limited IPv4 address space, issues with
NAT and an Internet of things (IoT), enforce for transition to IPv6.
 IPv4 has theoretical maximum of 4.3 billion addresses plus private addresses in
combination with NAT.
 IPv6 larger 128-bit address space providing for 340 undecillion addresses
Cont’d ...

The migration techniques can be divided in to three.


 Dual stack: allow IPv4 and IPv6 to coexist on the same network.
 Tunneling: A method of transporting an IPv6 packet over an IPv4 network. (i.e the IPv6
packet is encapsulated inside an IPv4 packet.)
 Translation: NAT allows IPv6-enabled devices to communicate with IPv4-enabled
devices using a translation technique.
IPv6 Address Representation
 128 bits in length and written as a string of hexadecimal values
 In IPv6, 4 bits represents a single hexadecimal digit, 32 hexadecimal values = IPv6
address(128 bits).
 2001:0DB8:0000:1111:0000:0000:0000:0200
 FE80:0000:0000:0000:0123:4567:89AB: CDEF
Cont’d ...

IPv6 Address Rules


 Even after converting into Hexadecimal format, IPv6 address remains long. IPv6
provides some rules to shorten the address. The rules are as follows:
1. Discard leading Zero: In Block 5, 0063, the leading two 0s can be omitted, such as
(5th block). 2001:0000:3238:DFE1:63:0000:0000:FEFB
2. If two of more blocks contain consecutive zeroes, omit them all and replace with
double colon sign(::), such as (6th and 7th block): 2001:0000:3238:DFE1:63 ::
FEFB
3. Consecutive blocks of zeroes can be replaced only once by double colon, so if there
are still blocks of zeroes in the address, they can be shrunk down to a single zero,
Router concepts

The following points describe about the concept of router


 Routers can connect multiple networks.
 Routers have multiple interfaces, each on a different IP network
 Determine the best path to send packets using its routing table.
 Forward packets toward their destination.
 Forwards packet to interface indicated in routing table.
 Encapsulates the packet and forwards out toward destination.
 To enable network access devices must be configured with the following IP address
information.
 IP address - Identifies a unique host on a local network.
 Subnet mask - Identifies the host’s network subnet.
 Default gateway - Identifies the router a packet is sent to when the destination is not
Cont’d ...

Document Network Addressing


 Network Documentation should include at least the following in a topology diagram
and addressing table: -Device names, Interfaces, IP addresses and subnet mask, and
Default gateways.
Configure Basic Router Settings
 Basics tasks that should be first configured on a Cisco Router and Cisco Switch:
o Name the device – Distinguishes it from other routers
o Secure management access – Secures privileged for different users and encrypts
passwords to their highest level.
o Configure a banner – Provides legal notification of unauthorized access.
Subnetting

 What happens if you wanted to take one network address and create six networks from it?
 You would have to perform what is called Subnetting, which allows you to take one larger
network and break it into many smaller networks.
 Reasons to perform Subnetting
 Reduced network traffic
 Optimized network performance
 Simplified management
 Facilitated spanning of large geographical distances
 To create sub networks, you take bits from the host portion of the IP address and reserve
them to define the subnet address.
 This means fewer bits for hosts, so the more subnets, the fewer bits available for defining
hosts.
Cont’d ...

Before you actually implement Subnetting, you need to determine your current requirements
as well as plan for future conditions.
1. Determine the number of required network IDs:
 One for each subnet
 One for each wide area network connection
2. Determine the number of required host IDs per subnet:
 One for each TCP/IP host
 One for each router interface
3.Based on the above requirement, create the following:
 One subnet mask for your entire network
 A unique subnet ID for each physical segment
 A range of host IDs for each subnet
Subnetting Class C Addresses

192.168.10.0 = Network address


255.255.255.192 = Subnet mask
192=11000000
Using the two bits the possible combinations:
00000000=0
01000000=64
10000000=128
11000000=192
Cont’d ...

192.168.10.0 = Network address


255.255.255.192 = Subnet mask (192=11000000)
using the six bits and taking one subnet (10000000) we can identify the valid host
addresses for the subnet.
10000000=128(subnet)
10001001 =137 10010010 =146 10010011 =147
10000001=129 10001010 =138 …………………..
10000010 =130 10001011 =139 ……………………
10000011 =131 10001100 =140 ……………………
10000100 =132 10001101 =141 10111011 =187
10000101 =133 10001110 =142 10111100 =188
10000110 =134 10001111 =143 10111101 =189
10000111 =135 10010000 =144 10111110 =190
Cont’d ...

192.168.10.0 = Network address


255.255.255.192 = Subnet mask (192=11000000)
Number of Subnets = 2bb = 22 = 4.
Number of Hosts = 2hb = 26 – 2 =62
The Subnets are 192.168.10.0(64, 128,192, )

Subnet 192.168.10.64 192.168.10.128

First host 192.168.10.65 192.168.10.129

Last host 192.168.10.126 192.168.10.190

Broadcast 192.168.10.127 192.168.10.191


Subnetting Class B Addresses
Given: 172.16.0.0 = Network address
255.255.192.0 = Subnet mask
11111111.11111111.11000000.00000000
Subnets? 22 = 4.
Hosts? 214 – 2 =16,382
Valid subnets? 256 – 192 = 64. 64 + 64 = 128.

Subnet 172.16.64.0 172.16.128.1

First host 172.16.64.1 172.16.128. 1

Last host 172.16.127.254 172.16.191.254

Broadcast 172.16.127.255 172.16.191.255


Cont’d ...

Exercise
Subnet the following class B Address
172.16.0.0 = Network address
255.255.240.0 = Subnet Mask
11110000.00000000
Number of Subnets? 24=16
Number of Hosts per subnet? 212-2 = 4094
Valid subnets: 256-240=16,
32, 48, 64,80,96, 112,128,144,160,176,192,208,224,240
Subnetting Class A Addresses

Given: 10.0.0.0 = Network address


255.255.0.0 = Subnet mask
11111111.11111111.00000000.00000000
 Subnets? 28 = 256.
 Hosts? 216 – 2 = 65,534.
 Valid subnets? 256 – 255 = 1, 2, 3, etc. (all in the second octet).
 The subnets would be 10.1.0.0, 10.2.0.0, 10.3.0.0, etc., up to 10.254.0.0.
 Broadcast address for each subnet?
 Valid hosts?
VLSM

 VLSM stands for Variable Length Subnet Mask where the subnet design uses more
than one mask in the same network
 which means more than one mask is used for different subnets of a single class A, B, C
or a network.
 It is used to increase the usability of subnets as they can be of variable size. It is also
defined as the process of Subnetting of a subnet.
Sample VLSM Exercise

 In VLSM, subnets use block size based on requirement so Subnetting is required


multiple times. Suppose there is an administrator that has four departments to manage.
 These are sales and purchase department with 120 computers, development
department with 50 computers, accounts department with 26 computers and
management department with 5 computers.
 If the administrator has IP 192.168.1.0/24, department wise.
 How it is possible?
Cont’d ...

1. For each segment select the block size that is greater than or equal to the actual
requirement which is the sum of host addresses, broadcast addresses and network
addresses. Make a list of subnets possible:
2. Arrange all the segments in descending order based on the block size that is from
highest to lowest requirement.
 Sales and Purchase: 120
 Development: 50
 Accounts: 26
 Management: 5
Quiz1(5%)

1. Subnet the network address 192.168.10.0 and subnet mask 255.255.255.224.

A. What is the class of the given IP? Why?

B. Find number of Subnets

C. Find number of valid host addresses

D. What it the first valid IP address in the last Subnet

E. What is the broadcast address of the last subnet


THANK YOU
Q &A
?

You might also like