Advanced Networking 2024 Revision (Chapters 1-8) PDF
Document Details
Uploaded by IndebtedOwl
2024
Tags
Summary
This document provides an overview of advanced networking concepts, covering topics such as network types, components, security, and emerging trends. Key concepts include LANs, WANs, internet, network components, network security, emerging networking trends, and networking principles.
Full Transcript
[Chapter 1] **1. Introduction to Networks** - Networks connect devices and allow communication, learning, working, and entertainment globally. - Forms of communication include texting, social media, online collaboration, blogs, and gaming. **2. Types of Networks** - **LAN (Local A...
[Chapter 1] **1. Introduction to Networks** - Networks connect devices and allow communication, learning, working, and entertainment globally. - Forms of communication include texting, social media, online collaboration, blogs, and gaming. **2. Types of Networks** - **LAN (Local Area Network):** - Covers a small geographic area (home, office, or campus). - High-speed bandwidth, single administration. - **WAN (Wide Area Network):** - Connects LANs over large geographic areas (cities, countries). - Managed by multiple service providers, slower speeds. - **Internet:** - A global collection of LANs and WANs, connected using copper, fiber optic, and wireless media. **3. Network Components** - **End Devices:** Hosts where messages originate or are received (e.g., computers, phones). - **Intermediary Devices:** Manage data flow (e.g., routers, switches, firewalls). - **Media Types:** Copper cables, fiber optics, wireless. **4. Network Architectures** - Characteristics of a reliable network: - **Fault Tolerance:** Redundancy to minimize failures. - **Scalability:** Ability to grow without performance loss. - **Quality of Service (QoS):** Prioritize data like video and voice. - **Security:** Protect infrastructure and data (confidentiality, integrity, availability). **5. Networking Trends** - **BYOD:** Employees use personal devices to access company resources. - **Cloud Computing:** Storing and accessing data over the internet (public, private, hybrid clouds). - **Online Collaboration and Video Communication:** Tools like Cisco WebEx and TelePresence. - **Smart Homes:** Integration of technology into appliances. **6. Security** - **Threats:** - External: Viruses, hacking, DoS attacks. - Internal: Accidental or intentional breaches by employees. - **Solutions:** - Home networks: Antivirus, firewalls. - Large networks: Access control lists (ACLs), intrusion prevention systems (IPS), VPNs. **7. Key Terms to Remember** - **Topology:** Network layout (physical or logical). - **NIC (Network Interface Card):** Connects a device to a network. - **Packet Switching:** Splits traffic into packets, improving fault tolerance. [Chapter 2/1] **Key Topics on Networking** **1. Rules of Communication:** - All communication requires: - **Sender** (Source), **Receiver** (Destination), and **Medium** (Channel). - Protocols govern: - Message formatting, timing, delivery, and acknowledgment. - Data is encoded and encapsulated: - Encapsulation wraps data in protocol layers like envelopes (Frame, Packet, etc.). **2. Network Protocols and Standards:** - Protocols ensure interoperability and include layers (TCP/IP, OSI). - Common Protocols: - **HTTP**: Web communications. - **TCP**: Manages data segments. - **IP**: Assigns source/destination addresses. - Protocol suites (e.g., TCP/IP) define communication standards across devices. **3. Data Encapsulation:** - Process: - Application data → Segments (Transport Layer) → Packets (Network Layer) → Frames (Data Link Layer). - Data moves through layers in encapsulation (sender) and de-encapsulation (receiver). **4. Addressing:** - **IP Address**: Identifies source and destination for end-to-end delivery. - **MAC Address**: Provides data link delivery between devices on the same network. **5. Local and Remote Network Access:** - Local: Data link frames sent directly between devices. - Remote: Frames sent via a default gateway (router) for IP packets. **6. Reference Models:** - **OSI Model Layers**: - Application, Presentation, Session, Transport, Network, Data Link, Physical. - **TCP/IP Model Layers**: - Application, Transport, Internet, Network Access. **7. Network Security:** - Goals: - **Confidentiality**: Ensure only authorized access. - **Integrity**: Prevent data alteration. - **Availability**: Provide reliable access for authorized users. - Threats: - External: Viruses, attacks, data theft. - Internal: Human errors or malicious activity. **8. Network Types:** - **LAN (Local Area Network)**: - Small geographic area, high speed. - **WAN (Wide Area Network)**: - Large geographic area, slower speed. **9. Emerging Trends:** - **BYOD** (Bring Your Own Device): Flexibility in accessing the network. - **Cloud Computing**: Access to resources remotely via public, private, or hybrid clouds. - **Online Collaboration and Video Communication**: Tools for virtual teamwork. **10. Internet Structure:** - **LANs and WANs**: Connect through ISPs to form the Internet. - **Intranet/Extranet**: Private networks for internal or external authorized users. **Study Focus:** - **Understand Protocol Layers**: OSI vs. TCP/IP. - **Encapsulation Process**: How data travels across the network. - **Security Practices**: Identify threats and mitigation strategies. - **Network Types and Topologies**: Differences between LANs and WANs. - **Emerging Trends**: BYOD, Cloud, and Collaboration. [Chapter 2/2] **Key Points: Configure a Network Operating System (Chapter 2)** **1. Cisco IOS Overview:** - **Purpose:** - Cisco IOS is the operating system for network devices (routers, switches, etc.). - Provides CLI (Command-Line Interface) for device management. - **Access Methods:** - **Console Port:** Direct physical access. - **Secure Shell (SSH):** Encrypted remote access. - **Telnet:** Remote access (not secure; avoid using). **2. Cisco IOS Command Modes:** - **User EXEC Mode:** Basic commands (view-only). Prompt: Switch\>. - **Privileged EXEC Mode:** Advanced commands for configuration and management. Prompt: Switch\#. - **Global Configuration Mode:** Device-wide settings. Prompt: Switch(config)\#. - **Sub-configuration Modes:** - Interface Mode: Configure specific ports. - Line Mode: Configure console, Telnet, or SSH access. **3. Important Commands:** - Move Between Modes: - enable → Enter privileged EXEC mode. - configure terminal → Enter global config mode. - exit → Move to the previous mode. - end or Ctrl-Z → Exit to privileged EXEC mode. - Save Configuration: - copy running-config startup-config: Save changes to NVRAM. - erase startup-config: Remove saved configuration. **4. Security Configuration:** - **Passwords:** - Secure privileged EXEC access: enable secret \[password\]. - Secure console access: [Chapter 3] **1. Network Layer Overview:** - **Purpose:** - Provides end-to-end communication. - Handles **addressing**, **encapsulation**, **routing**, and **de-encapsulation**. - **Protocols:** IPv4 and IPv6 are the most commonly implemented. **2. Characteristics of IP:** - **Connectionless Protocol:** - No prior connection is established before sending packets. - **Best Effort Delivery:** - Does not guarantee packet delivery or order. - Upper layers handle errors. - **Media Independent:** - Operates over various media (e.g., copper, fiber, wireless). **3. IPv4 and IPv6 Packets:** - **IPv4 Header Fields:** - **Version:** Indicates IPv4. - **TTL:** Limits the packet lifetime. - **Source/Destination IP:** Identifies sender and receiver. - **IPv6 Header Enhancements:** - Simplified structure for faster processing. - Larger address space (128-bit addresses). - Eliminates the need for NAT. **4. Host Routing Decisions:** - Hosts use the network layer to: - **Send packets locally:** Devices on the same network. - **Send packets remotely:** Uses a **default gateway** when the destination is on a different network. - **Default Gateway:** - The router that connects a local network to external networks. - Automatically assigned via DHCP or configured manually. **5. Routing Tables:** - **Host Routing Table:** Contains the default gateway and known routes. - **Router Routing Table:** - **Directly Connected Routes (C):** Active interfaces. - **Local Routes (L):** IP addresses assigned to interfaces. - **Remote Routes:** Learned via manual configuration or dynamic protocols. **6. Anatomy of a Router:** - **Key Components:** - CPU, RAM, ROM, NVRAM, Flash memory. - **Memory Types:** - **RAM:** Stores the running configuration. - **NVRAM:** Stores the startup configuration. - **Flash:** Stores the IOS. - **ROM:** Contains the bootstrap program. - **Interfaces:** - Console: Used for initial configuration. - LAN/WAN: Provides connectivity. **7. Router Boot-up Process:** 1. **POST:** Runs diagnostics. 2. **Load Bootstrap Program:** Copies from ROM to RAM. 3. **Load IOS:** Typically from Flash to RAM. 4. **Load Configuration:** Startup config from NVRAM to RAM or enter setup mode. **8. Configuring a Router:** 1. **Initial Setup:** - Assign a device name. - Secure access (passwords for console, SSH, and Telnet). - Save configurations: [Chapter 4] **1. IPv4 Addressing Basics:** - **Structure:** - IPv4 addresses are 32-bit binary numbers divided into 4 octets (e.g., 192.168.1.1). - Composed of: - **Network Portion:** Identifies the network. - **Host Portion:** Identifies the device. - **Subnet Mask:** Determines the boundary between network and host portions. - Example: /24 equals 255.255.255.0. **2. Address Types:** - **Unicast:** One-to-one communication. - **Broadcast:** One-to-all communication (e.g., 255.255.255.255). - **Multicast:** One-to-a-group communication (e.g., 224.0.0.0 - 239.255.255.255). **3. IPv4 Address Categories:** 1. **Public Addresses:** - Routable on the internet. 2. **Private Addresses:** - Not routable externally; used internally. - Ranges: - 10.0.0.0/8 - 172.16.0.0/12 - 192.168.0.0/16 3. **Special Use Addresses:** - **Loopback (127.0.0.0/8):** Tests local stack. - **Link-Local (169.254.0.0/16):** Auto-configured when DHCP fails. - **Test-Net (192.0.2.0/24):** Reserved for teaching. **4. IPv4 Address Classes:** - **Class A:** Large networks (0.0.0.0 - 127.255.255.255). - **Class B:** Medium networks (128.0.0.0 - 191.255.255.255). - **Class C:** Small networks (192.0.0.0 - 223.255.255.255). **5. CIDR and Subnetting:** - **CIDR (Classless Inter-Domain Routing):** - Allows flexible subnetting (e.g., /20). - **Subnetting:** Divides a large network into smaller sub-networks to optimize IP usage. **6. ICMP and Connectivity Verification:** - **ICMP (Internet Control Message Protocol):** - Used for diagnostic tools like ping and traceroute. - Common ICMP messages: - Host confirmation. - Destination unreachable. - Time exceeded. - **Testing Tools:** - **Ping:** Tests connectivity to local and remote hosts. - **Traceroute:** Displays the path and delay for packets. **7. Conversions Between Binary and Decimal:** - **Binary to Decimal:** - Calculate each bit's value using powers of 2. - **Decimal to Binary:** - Subtract the largest power of 2 less than the number and repeat. **8. Practical Usage:** - Static IP: Fixed IP for devices like servers or printers. - Dynamic IP: Assigned automatically by DHCP with lease expiration. **Study Focus:** - Understand how to calculate subnet masks and prefixes. - Differentiate between address types (private, public, unicast, etc.). - Practice testing connectivity using ping and traceroute. - Learn how subnetting optimizes IP allocation. [Chapter 5] **1. What is Subnetting?** - Subnetting divides a larger network into smaller **broadcast domains** (subnets) to: - Reduce network congestion. - Improve performance and manageability. - Enhance security by isolating devices. **2. Subnetting Principles:** - **Network Portion vs. Host Portion:** - The **subnet mask** defines how many bits are used for the network portion. - Example: /24 subnet mask means 24 bits are used for the network. - **Borrowing Host Bits:** - More bits borrowed → More subnets but fewer hosts per subnet. **3. Subnetting Formulas:** 1. **Number of Subnets:**\ 2n2\^n2n, where nnn = number of borrowed bits. 2. **Number of Hosts per Subnet:**\ 2h−22\^h - 22h−2, where hhh = remaining host bits (subtract 2 for network and broadcast addresses). **4. Subnetting Examples:** - **/25 Subnet (2 Subnets):** - Borrow 1 bit from /24 → 2 subnets. - Subnets: 192.168.1.0/25 and 192.168.1.128/25. - Hosts per subnet: 27−2=1262\^7 - 2 = 12627−2=126. - **/26 Subnet (4 Subnets):** - Borrow 2 bits from /24 → 4 subnets. - Subnets: 192.168.1.0/26, 192.168.1.64/26, 192.168.1.128/26, 192.168.1.192/26. - Hosts per subnet: 26−2=622\^6 - 2 = 6226−2=62. - **/27 Subnet (8 Subnets):** - Borrow 3 bits from /24 → 8 subnets. - Subnets: 192.168.1.0/27, 192.168.1.32/27, \..., 192.168.1.224/27. - Hosts per subnet: 25−2=302\^5 - 2 = 3025−2=30. **5. Variable Length Subnet Masking (VLSM):** - **VLSM allows subnets of different sizes** to optimize IP usage. - Example: For 200 hosts, use a subnet mask of /24. - For 50 hosts, use a subnet mask of /26. - **Benefits:** - Efficient use of IP addresses. - Supports hierarchical addressing and scalable network designs. **6. Structured Addressing:** - **Devices that Need IP Addresses:** - End-user devices (use DHCP for dynamic assignment). - Servers (static IP for reliability). - Routers and gateways (static IP for management). - **Documentation:** Proper planning and documentation are critical for managing and scaling networks. **7. Practical Tools for Subnetting:** - **Magic Number Technique:** - The magic number helps calculate subnet ranges. - Example: For /26, magic number = 64 (subnet intervals). **8. Address Planning:** - Assign IP addresses logically: - Group by location or department. - Separate device types (e.g., printers, servers). **Study Focus:** - Practice subnetting calculations for /24, /16, and /8 networks. - Understand VLSM and how to design flexible addressing schemes. - Learn to apply subnetting for network optimization and addressing specific requirements. - **Definition:** Manually configured routes in the routing table. - **Advantages:** - Enhanced security (not advertised over the network). - Resource-efficient (no bandwidth or CPU usage for route calculations). - Predictable and known data paths. - **Disadvantages:** - Time-consuming to configure and maintain. - Error-prone in large networks. - Not scalable for growing networks. 1. **Standard Static Route:** - Defines a route to a specific network. 2. **Default Static Route (Gateway of Last Resort):** - Forwards all packets without a more specific match. Example: 0.0.0.0/0. 3. **Floating Static Route:** - Backup route activated when the primary route fails (configured with a higher administrative distance). - Small networks with minimal growth. - Stub networks (a network with a single route and no neighbors). - Default routes to handle undefined destinations. - **Basic Command:** - **Definition:** Dynamic routing protocols automatically discover and maintain routing information. - **Purpose:** - Discover remote networks. - Maintain up-to-date routing tables. - Determine the best path to a destination. - Adjust to network changes by finding new paths. - **Advantages:** - Reduces administrative overhead. - Automatically adapts to topology changes. - Suitable for large and complex networks. - **Disadvantages:** - Requires router resources (CPU and bandwidth). - Slower convergence compared to static routing. - Adds complexity to troubleshooting. 1. **Distance-Vector Protocols:** - Share routing updates with neighbors (e.g., RIP, EIGRP). - Do not have a complete view of the network topology. - Metrics: Hops, cost, or delay. 2. **Link-State Protocols:** - Build a full topology map of the network (e.g., OSPF, IS-IS). - Use algorithms like Dijkstra\'s to compute the shortest path. 3. **Hybrid Protocols:** - Combine elements of both types (e.g., EIGRP). - **Classful vs. Classless:** - Classful protocols (e.g., RIPv1, IGRP) do not send subnet mask information. - Classless protocols (e.g., RIPv2, EIGRP, OSPF) support VLSM and CIDR. - **Interior Gateway Protocols (IGP):** - Used within an Autonomous System (e.g., RIP, EIGRP, OSPF). - **Exterior Gateway Protocols (EGP):** - Used between Autonomous Systems (e.g., BGP). - Metrics determine the best path and include: - **Hops:** Number of routers to a destination. - **Bandwidth:** Available capacity of a link. - **Delay:** Time taken to traverse a link. - **Reliability:** Link stability. - **Load:** Network usage. - **RIP:** - Updates every 30 seconds. - Max hop count: 15. - Uses the Bellman-Ford algorithm. - **EIGRP:** - Uses DUAL algorithm for fast convergence. - Supports multiple network layer protocols. - Sends updates only when topology changes. - **OSPF:** - Builds a topology map using Link-State Advertisements (LSAs). - Faster convergence and uses Dijkstra\'s algorithm. - **IS-IS:** - Commonly used in provider networks. - Similar to OSPF in functionality. - **Route Types:** - Directly connected, static, or dynamically learned routes. - **Lookup Process:** - Searches for the **longest prefix match** for a destination IP. - Prefers routes with the lowest administrative distance. - Determines the trustworthiness of a routing source: - Directly connected: **0** (most preferred). - Static routes: **1**. - RIP: **120**, OSPF: **110**, EIGRP: **90**. - A network converges when all routers have complete and accurate routing information. - **Speed of Convergence:** - Distance-vector protocols like RIP are slower. - Link-state protocols like OSPF converge faster. - **Understand Protocols:** Know the features and differences between RIP, EIGRP, and OSPF. - **Metrics and Administrative Distance:** Learn how routes are selected based on these values. - **Routing Table Analysis:** Practice interpreting routing tables and tracing packet paths. - **Definition:** OSPF (Open Shortest Path First) is a **link-state routing protocol** used within an Autonomous System. - **Features:** - Fast convergence and scalability. - Supports VLSM and CIDR. - Uses cost as a metric to determine the best path. 1. **Link-State Operation:** - Routers exchange Link-State Advertisements (LSAs) containing link state and cost information. - LSAs are flooded to all routers in the area, ensuring all have the same topology information. - Routers build a **topology table** and calculate the best paths using Dijkstra's algorithm. - Best paths are added to the routing table. 2. **Neighbor Adjacencies:** - Routers discover and establish adjacencies using **Hello packets**. - OSPF routers elect a **Designated Router (DR)** and **Backup DR (BDR)** in multi-access networks. 3. **OSPF Metrics:** - **Cost = Reference Bandwidth / Interface Bandwidth** - Default reference bandwidth: 108 bps10\^8 \\text{ bps}108 bps (can be adjusted). - Accumulated cost determines the best route. - **Router ID (RID):** - Uniquely identifies each OSPF router. - Determined by: 1. Manually assigned value. 2. Highest IP address on a loopback interface. 3. Highest IP address on an active physical interface. - **OSPF Packets:** - **Hello Packets:** Discover neighbors and elect DR/BDR. - **Link-State Update (LSU):** Exchange routing information. - **Areas:** - Single-Area OSPF (Area 0): Simplifies design by using one area for all routers. 1. Enable OSPF on the router: