尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
INTRODUCTION TO NETWORKS
Firewall
Core SW
Port 6
Gig
1/0/48
Port
1
Port
2
Gig
2/0/48
SLT WAN
Gig
1/0/23
Gig
1/0/23
Gig
1/0/4
Gig
1/0/23
Gig
1/0/24
Gig
2/0/4
Gig
1/0/5
Gig
2/0/5
Gig
1/0/7
Gig
2/0/7
AP POE SW
User Access SW Server SW
Gig
1/0/24
Gig
1/0/24
Access
Point Server
A network is a collection of computers, servers, mainframes, network
devices, peripherals, or other devices connected to allow data sharing.
Types of Networks
 Personal Area Networks (PAN)
 Local Area Networks (LAN)
 Wired LAN
 Wireless LAN
 Campus Area Networks (CAN)
 Metropolitan Area Networks (MAN)
 Wide Area Network (WAN)
BUILDING BLOCKS OF MODERN NETWORK
Network Switches
A network switch is networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device.
Switch Categories
 Layer 2 Switches
 Layer 3 Switches
 POE Switches
 Unmanageable / Manageable Switch
 Modular Switch
BUILDING BLOCKS OF MODERN NETWORK
Network Routers
Router is a physical or virtual internetworking device that is designed to receive, analyze, and forward data
packets between computer networks.
Router Categories
 Edge Routers
 Core Routers
 Virtual Routers
BUILDING BLOCKS OF MODERN NETWORK
Network Firewalls
A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based
on an organization’s previously established security policies.
Firewall Types based on Deployment
 Hardware Firewalls
 Software Firewalls
 Cloud Firewalls
Firewall Types based on Method of Operation
 Packet Filtering Firewalls
 Stateful Filtering Firewall (E.g. Cisco ASA)
 Application Layer Firewall (E.g. WAF)
 Next generation Firewall (E.g. Cisco FTD, FortiGate)
BUILDING BLOCKS OF MODERN NETWORK
Network Cabling
BUILDING BLOCKS OF MODERN NETWORK
Small Form-factor Pluggable (SFP)
An SFP is a compact, hot-pluggable transceiver used for data communication applications over either fiber
optic or copper connection.
TCP/IP MODEL
 A layered framework to allow communication across all types of computers.
 Defines and references a large collection of protocols that allow computers to communicate.
 The model is used as standard and different software and hardware implement it.
 A networking model, breaks the functions into a small number of categories called layers.
 Each layer includes protocols and standards that relate to that category of functions.
 Each layer has a unique function distinct from other layers.
 Specifies the “what” not the “how”.
TCP/IP MODEL
NETWORK ADDRESSES
MAC Address
 MAC address is the physical address, which uniquely identifies each device on a given network.
 It is assigned to the NIC (Network Interface card) of each device that can be connected to the internet.
 It stands for Media Access Control, and also known as Physical address, hardware address, or BIA
(Burned In Address).
 It is globally unique; it means two devices cannot have the same MAC address.
 It is 12-digit, and 48 bits long, out of which the first 24 bits are used for OUI(Organization Unique
Identifier), and 24 bits are for NIC/vendor-specific.
 It is represented in a hexadecimal format on each device.
NETWORK ADDRESSES
IP Address (IPv4)
 IPv4 stands for Internet Protocol
version 4.
 IPv4 could be a 32-Bit IP Address.
 IPv4 produces 4 billion addresses,
which are not enough for each device
connected to the internet on a planet.
NETWORK ADDRESSES
IP Address (IPv6)
 IPv6 stands for Internet Protocol version 6.
 IPv6 is a 128-bit hexadecimal address.
 IPv6 can theoretically allows 2^128 combinations or 340 trillion, trillion, trillion addresses.
SWITCHING: VLANs
 A virtual local area network (VLAN) is a virtualized connection that connects multiple devices and network
nodes from different LANs into one logical network.
 VLANs increase the number of broadcast domains while decreasing their size.
 VLANs reduce security risks by reducing the number of hosts that receive copies of frames that the
switches flood.
SWITCHING: SWITCH PORTS
Access Ports
A port that can be assigned to a single VLAN. This type of interface is configured on switch ports that are
connected to end devices such as workstations, printers, or access points.
Trunk Ports
A port that is connected to another switch. This type of interface can carry traffic of multiple VLANs, thus
enabling you to extend VLANs across your entire network.
SWITCHING: SWITCH PORT SECUIRTY
The switchport security feature offers the ability to configure a switchport so that traffic can be limited to only a
specific configured MAC address or list of MAC addresses.
SWITCHING: STP
Spanning Tree Protocol (STP)
 Spanning Tree Protocol (STP) is a network protocol designed to prevent layer 2 loops.
 It is standardized as IEEE 802.D protocol.
 STP blocks some ports on switches with redundant links to prevent broadcast storms and ensure a loop-
free logical topology.
 With STP in place, you can have redundant links between switches in order to provide redundancy.
With STP
Without
SWITCHING: PORT-CHANNELS
Port channels aggregate multiple physical interfaces into one logical interface to provide higher bandwidth,
load balancing, and link redundancy.
SWITCHING: MAC ADDRESS TABLE
The MAC address table is where the switch stores
information about the other Ethernet interfaces to which it is
connected on a network.
The table enables the switch to send outgoing data (Ethernet
frames) on the specific port required to reach its destination,
instead of broadcasting the data on all ports (flooding).
SWITCHING: STACKING & VPC
Standalone
Switch
Server 2
Server 1
Stacked
Switch
Server 2
Server 1
Nexus-SW-Cluster
Cisco Nexus 93K
mgmt0 mgmt0
Nexus-SW1
172.16.100.226
Nexus-SW1
172.16.100.227
Eth1/47 Eth1/47
Eth1/48 Eth1/48
VPC Peer Link
PO 93
VPC Keep Alive
Link
Server 1 Server 2
VPC Switch
Cluster
ROUTING: STATIC ROUTES
 Static routes are manually added to a routing table through direct configuration.
 Using a static route, a router can learn about a route to a remote network that is not directly attached to
one of its interfaces.
 Static routes are configured in the global configuration mode using the ip route
DESTINATION_NETWORK SUBNET_MASK NEXT_HOP_IP_ADDRESS command.
 The NEXT_HOP_IP_ADDRESS parameter is the IP address of the next-hop router that will receive
packets and forward them to the remote network.
ROUTING: DYNAMIC ROUTES
 Dynamic routing is a mechanism through which routing information is exchanged between routers to
determine the optimal path between network devices.
 A routing protocol is used to identify and announce network paths.
NETWORK SERVICES: DNS
 The domain name system (DNS) is a naming database in which internet domain names are located and
translated into Internet Protocol (IP) addresses.
 DNS maps the name people use to locate a website to the IP address that a computer uses to locate that
website.
NETWORK SERVICES: NAT
 Network Address Translation (NAT) is a process in which one or more local IP address is translated into
one or more Global IP address and vice versa in order to provide Internet access to the local hosts.
 Private network addresses are not allocated to any specific organization.
 Anyone may use these addresses without approval from regional or local Internet registries.
NETWORK SERVICES: DHCP
 Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically
assign an IP address to nay device, or node, on a network.
 DHCP is also used to configure the proper subnet mask, default gateway and DNS server information on
the node or device.
NETWORK SERVICES: NTP
 Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources
in a network.
 NTP is an application layer protocol.
 NTP uses a client-server architecture; one host is configured as the NTP server and all other hosts on the
network are configured as NTP clients.

More Related Content

Similar to Introduction to Computer Networks and Network Security.pptx

Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
Mohsen Sarakbi
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
Westermo Network Technologies
 
Wan
WanWan
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
RoHit VashIsht
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
adam_merritt
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
sumit dimri
 
networking devices
networking devicesnetworking devices
networking devices
harish pillai
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo Network Technologies
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
Tonny Michael
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
Diwakar Singh
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Gandhibabu8
 
networking devices -161021181705452555
networking   devices -161021181705452555networking   devices -161021181705452555
networking devices -161021181705452555
mercyzyada1999
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
lucita cabral
 
Network switch : Notes
Network switch : NotesNetwork switch : Notes
Network switch : Notes
Subhajit Sahu
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
ssuser86699a
 
Networking devices
Networking devicesNetworking devices
Networking devices
frestoadi
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
okelloerick
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Soumen Santra
 

Similar to Introduction to Computer Networks and Network Security.pptx (20)

Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
 
Wan
WanWan
Wan
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
networking devices
networking devicesnetworking devices
networking devices
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
 
networking devices -161021181705452555
networking   devices -161021181705452555networking   devices -161021181705452555
networking devices -161021181705452555
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Network switch : Notes
Network switch : NotesNetwork switch : Notes
Network switch : Notes
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 

Recently uploaded

QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 

Recently uploaded (20)

QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 

Introduction to Computer Networks and Network Security.pptx

  • 1. INTRODUCTION TO NETWORKS Firewall Core SW Port 6 Gig 1/0/48 Port 1 Port 2 Gig 2/0/48 SLT WAN Gig 1/0/23 Gig 1/0/23 Gig 1/0/4 Gig 1/0/23 Gig 1/0/24 Gig 2/0/4 Gig 1/0/5 Gig 2/0/5 Gig 1/0/7 Gig 2/0/7 AP POE SW User Access SW Server SW Gig 1/0/24 Gig 1/0/24 Access Point Server A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to allow data sharing. Types of Networks  Personal Area Networks (PAN)  Local Area Networks (LAN)  Wired LAN  Wireless LAN  Campus Area Networks (CAN)  Metropolitan Area Networks (MAN)  Wide Area Network (WAN)
  • 2. BUILDING BLOCKS OF MODERN NETWORK Network Switches A network switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. Switch Categories  Layer 2 Switches  Layer 3 Switches  POE Switches  Unmanageable / Manageable Switch  Modular Switch
  • 3. BUILDING BLOCKS OF MODERN NETWORK Network Routers Router is a physical or virtual internetworking device that is designed to receive, analyze, and forward data packets between computer networks. Router Categories  Edge Routers  Core Routers  Virtual Routers
  • 4. BUILDING BLOCKS OF MODERN NETWORK Network Firewalls A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies. Firewall Types based on Deployment  Hardware Firewalls  Software Firewalls  Cloud Firewalls Firewall Types based on Method of Operation  Packet Filtering Firewalls  Stateful Filtering Firewall (E.g. Cisco ASA)  Application Layer Firewall (E.g. WAF)  Next generation Firewall (E.g. Cisco FTD, FortiGate)
  • 5. BUILDING BLOCKS OF MODERN NETWORK Network Cabling
  • 6. BUILDING BLOCKS OF MODERN NETWORK Small Form-factor Pluggable (SFP) An SFP is a compact, hot-pluggable transceiver used for data communication applications over either fiber optic or copper connection.
  • 7. TCP/IP MODEL  A layered framework to allow communication across all types of computers.  Defines and references a large collection of protocols that allow computers to communicate.  The model is used as standard and different software and hardware implement it.  A networking model, breaks the functions into a small number of categories called layers.  Each layer includes protocols and standards that relate to that category of functions.  Each layer has a unique function distinct from other layers.  Specifies the “what” not the “how”.
  • 9. NETWORK ADDRESSES MAC Address  MAC address is the physical address, which uniquely identifies each device on a given network.  It is assigned to the NIC (Network Interface card) of each device that can be connected to the internet.  It stands for Media Access Control, and also known as Physical address, hardware address, or BIA (Burned In Address).  It is globally unique; it means two devices cannot have the same MAC address.  It is 12-digit, and 48 bits long, out of which the first 24 bits are used for OUI(Organization Unique Identifier), and 24 bits are for NIC/vendor-specific.  It is represented in a hexadecimal format on each device.
  • 10. NETWORK ADDRESSES IP Address (IPv4)  IPv4 stands for Internet Protocol version 4.  IPv4 could be a 32-Bit IP Address.  IPv4 produces 4 billion addresses, which are not enough for each device connected to the internet on a planet.
  • 11. NETWORK ADDRESSES IP Address (IPv6)  IPv6 stands for Internet Protocol version 6.  IPv6 is a 128-bit hexadecimal address.  IPv6 can theoretically allows 2^128 combinations or 340 trillion, trillion, trillion addresses.
  • 12. SWITCHING: VLANs  A virtual local area network (VLAN) is a virtualized connection that connects multiple devices and network nodes from different LANs into one logical network.  VLANs increase the number of broadcast domains while decreasing their size.  VLANs reduce security risks by reducing the number of hosts that receive copies of frames that the switches flood.
  • 13. SWITCHING: SWITCH PORTS Access Ports A port that can be assigned to a single VLAN. This type of interface is configured on switch ports that are connected to end devices such as workstations, printers, or access points. Trunk Ports A port that is connected to another switch. This type of interface can carry traffic of multiple VLANs, thus enabling you to extend VLANs across your entire network.
  • 14. SWITCHING: SWITCH PORT SECUIRTY The switchport security feature offers the ability to configure a switchport so that traffic can be limited to only a specific configured MAC address or list of MAC addresses.
  • 15. SWITCHING: STP Spanning Tree Protocol (STP)  Spanning Tree Protocol (STP) is a network protocol designed to prevent layer 2 loops.  It is standardized as IEEE 802.D protocol.  STP blocks some ports on switches with redundant links to prevent broadcast storms and ensure a loop- free logical topology.  With STP in place, you can have redundant links between switches in order to provide redundancy. With STP Without
  • 16. SWITCHING: PORT-CHANNELS Port channels aggregate multiple physical interfaces into one logical interface to provide higher bandwidth, load balancing, and link redundancy.
  • 17. SWITCHING: MAC ADDRESS TABLE The MAC address table is where the switch stores information about the other Ethernet interfaces to which it is connected on a network. The table enables the switch to send outgoing data (Ethernet frames) on the specific port required to reach its destination, instead of broadcasting the data on all ports (flooding).
  • 18. SWITCHING: STACKING & VPC Standalone Switch Server 2 Server 1 Stacked Switch Server 2 Server 1 Nexus-SW-Cluster Cisco Nexus 93K mgmt0 mgmt0 Nexus-SW1 172.16.100.226 Nexus-SW1 172.16.100.227 Eth1/47 Eth1/47 Eth1/48 Eth1/48 VPC Peer Link PO 93 VPC Keep Alive Link Server 1 Server 2 VPC Switch Cluster
  • 19. ROUTING: STATIC ROUTES  Static routes are manually added to a routing table through direct configuration.  Using a static route, a router can learn about a route to a remote network that is not directly attached to one of its interfaces.  Static routes are configured in the global configuration mode using the ip route DESTINATION_NETWORK SUBNET_MASK NEXT_HOP_IP_ADDRESS command.  The NEXT_HOP_IP_ADDRESS parameter is the IP address of the next-hop router that will receive packets and forward them to the remote network.
  • 20. ROUTING: DYNAMIC ROUTES  Dynamic routing is a mechanism through which routing information is exchanged between routers to determine the optimal path between network devices.  A routing protocol is used to identify and announce network paths.
  • 21. NETWORK SERVICES: DNS  The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.  DNS maps the name people use to locate a website to the IP address that a computer uses to locate that website.
  • 22. NETWORK SERVICES: NAT  Network Address Translation (NAT) is a process in which one or more local IP address is translated into one or more Global IP address and vice versa in order to provide Internet access to the local hosts.  Private network addresses are not allocated to any specific organization.  Anyone may use these addresses without approval from regional or local Internet registries.
  • 23. NETWORK SERVICES: DHCP  Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign an IP address to nay device, or node, on a network.  DHCP is also used to configure the proper subnet mask, default gateway and DNS server information on the node or device.
  • 24. NETWORK SERVICES: NTP  Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.  NTP is an application layer protocol.  NTP uses a client-server architecture; one host is configured as the NTP server and all other hosts on the network are configured as NTP clients.
  翻译: