1 / 41

Networking

Areas of Discussion. OSI ModelIP AddressingLocal Area NetworksWide Area NetworksRemote AccessNetwork ManagementVoice and Data ConvergenceAdditional Resources. OSI Model. Application LayerPresentation LayerSession LayerTransport LayerNetwork LayerData Link (MAC) LayerPhysical Layer. Inte

edna
Download Presentation

Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Networking Chapter 12

    2. Areas of Discussion OSI Model IP Addressing Local Area Networks Wide Area Networks Remote Access Network Management Voice and Data Convergence Additional Resources

    3. OSI Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link (MAC) Layer Physical Layer

    4. Internet Protocol Suite What is a protocol? Set of rules and standards that ease the interconnectivity of devices of different platforms and from different vendors. TCP/IP: Transmission control protocol/Internet protocol Application Layer (session, presentation, and application) Transport Layer (transport) Inter-network (network) Link (physical and data link)

    5. IP Addressing IP addressing: 32-bit string 4 eight-bit numbers Each eight-bit number is an octet Can be value of 0 to 255 Network address and host address Subnet masks Class A 1-126 Class B 128-191 Class C 192-223

    6. A Shortage of Addresses American Registry for Internet Numbers (ARIN) 1997 registers and administers IP numbers for North America. Other global regions are managed by RIPE NCC, LACNIC, and APNIC. Running out of numbers Solutions: Network Address Translation IPv6

    7. Network Address Translation Translates your internal network addresses into the public address assigned to your Internet connection. However, there are agreed upon standards for private internal networks: 10.0.0.0 – 10.255.255.255 (1 class – A range) 172.16.0.0. – 172.31.255.255 (16 class – B ranges) 192.168.0.0. – 192.168.255.255 (256 class – C ranges)

    8. IPv6: IP next generation or IPng IPv4 allows for approximately 4 billion addresses IPv6 allows for 340 undicillion (340 followed by 36 zeroes) addresses. Changes from a 32-bit address to a 128-bit address

    9. DNS: Domain Name Server: translates alphanumeric names to IP addresses A DNS allows you to name your servers and devices and translates those names to IP addresses The DNS environment of the Internet allows you and your users to use meaningful names (like browser URLs), as opposed to IP addresses.

    10. DHCP Dynamic Host Configuration Protocol (DHCP): automatically assigns IP addresses. Some devices need to have static addresses such as printers, which recognize MAC addresses Greatly eases the burden of IP administration

    11. Local Area Networks Network that connects the devices in one geographic location. As a general rule, a LAN’s boundary is telecommunication facilities and a router. LAN is dependent on needs, plans for future growth, and changes of use. Ethernet is the de facto standard.

    12. LAN Design Goals of a good LAN design Maximizing the efficiency of network traffic Reliability Manageability: growth and traffic patterns, bottlenecks, and problem areas Flexibility Location of devices Traffic volume

    13. The Core Network Single device or multiple devices Features of Switches Number and types of connections required Total throughput Redundancies Forwarding methods: store and forward, cut-through forward, fragment free Layer 2 and Layer 3 Chassis or Stackable

    14. Wireless LANs WiFi (wireless fidelity) up to 300 feet Eliminates need for running cabling Wireless security Wired equivalent privacy (WEP): the first method developed for securing wireless LANs. “Key” (either 40 or 128 bits in length). Easy to hack. WiFi protected access (WPA): Temporal Key Integrity Protocol (TKIP), developed overcome weakness of WEP. Changes the key with each data frame. Built-in authentication

    15. Wireless security Hidden SSID: Service Set Identifier: Environment with multiple wireless networks, SSID identifies which network is which. MAC Filtering: allow only predetermined devices to connect to it by specifying the MAC address of authorized devices. Internet Access only: connects to Internet only. Must use other remote access solutions to connect to private internet.

    16. Bluetooth: shorter range of typically 30 feet Is considered a wireless alternative for USB-type connections while WiFi is considered a wireless alternative for Ethernet connections.

    17. Wide Area Networks Connects the remote locations via telecommunication facilities (T-1 lines, ISDN, etc.) Span large distances Design based upon geography, traffic flow, and volumes.

    18. Difference between LANs and WANs Majority of LAN costs are up-front capital expenditures of cable installation and hardware. Majority of WAN costs are recurring operating costs of lines.

    19. Considerations for a WAN Need for high-speed transmissions Need for 24/7 operations User needs: locations, travel Backup/fail-over capabilities and facilities: most critical connections need to be most reliable Installation delays: the more sophisticated the line, the more time your telecommunications vendor will need to install it.

    20. Routers: key devices for WANs Forwards data to another network Occurs at Layer 3 of OSI model Acts as transfer point between two networks to pass data packets between them Routing table is used by the routers to determine the best path to use for each data packet

    21. Key WAN Technologies Connectivity Options Point-to-point circuits: leased, dedicated, and private lines T-1 line: 24 channels of 64 Kbps, for an aggregate throughput of 1.544 Mbps T-3 line: (often referred to as DS3) transmission speeds of 44,736 Mbps, via 672 circuits, each of 64 Kbps transmission Fractional T-1 or fractional T-3. See page 329.

    22. continued Connectivity Options Dial-up Plain Old Telephone System (POTS) line Based on analog technology 56 Kbps

    23. continued ISDN: Integrated Services Digital Network Digital transmission over standard copper telephone wire Basics Rate Interface (BRI): homes and small businesses Two 64Kbps B channels and one 16 Kbps D channel B channel carries the data and D channel carries signaling Throughput total of 128 Kbps Primary Rate Interface (PRI) larger sites 23 B channels and one 64 Kbps D channel Throughput total of 1.4 Mbps Dial their calls similar to the way POTS lines do Often used for back up of T1-lines

    24. continued Broadband (cable modems and DSL) past definition: connection type that can carry more than one signal at a time Today: high-speed connection to the Internet Offer faster downstream rate than upstream rate Always on DSL: digital subscriber line. Phone company offering to bring high-speed Internet to homes and small businesses over standard copper phone lines. Always on High-speed downstream Must be within few miles of telephone company central office

    25. Continued Broadband (cable modems and DSL) Cable TV companies deliver high-speed Internet access. Speed is often 384 Kbps upstream and 2 Mbps downstream

    26. Continued Packet switching (ATM and frame relay) Breaks up data transmission into small packets Asynchronous Transfer Mode (ATM) and Frame Relay: Frame relay speeds between 56 Kbps and 45 Mbps ATM speeds between 25 to 622 Mbps Used for delay-sensitive applications like voice and video plus data Frame relay and ATM provided by telecom carriers ATM : Sustained Information Rate (SIR) Frame Relay: Committed Information Rate (CIR) Data below this level will be guaranteed delivery; if dropped, will be retransmitted

    27. Continued High-speed Internet Connection to the Internet Point-to-point circuits Broadband Fees for line to your office Fees for Internet access Virtual Private Networks (VPNs): using security and tunneling techniques, establish a VPN via the Internet to connect sites Split tunneling: remote offices connect to the Internet and establish a VPN back to headquarters while local Internet access goes directly to Internet

    28. Remote Access Companies are now available 24/7 The Choices Your connection path Internet access Direct access Handheld device What you Connect to Web-based applications Remote control Remote node Handheld device applications Replication (synchronization)

    29. Questions What are the needs of your customers? Based upon the answer, select your options

    30. The Connection Path Three options for connection Through the Internet Through a direct connection Through the air waves using a handheld device

    31. Continued What You Connect To Web-based applications Microsoft’s outlook Web Access (OWA) or iNotes from Lotus Notes Remote control Establish a connection Establish a remote control session Centralized Remote control Terminal servers Remote node Handheld device applications Replication (Synchronization): use applications and items are saved, when connected, can transmit to main headquarters.

    32. Advantages: reduces time needed for connection Users can work regardless of whether or not they have connectivity Disadvantages: Applications must be same for best results: XP vs. Vista

    33. Continued Security for Remote Access Firewalls VPNs: used for connections that come via the Internet to encrypt the data. Point-to-point Tunneling Protocol: losing popularity L2TP: combines two secure communication protocols: Cisco Systems’ Layer Two Forwarding (L2F) and Microsoft’s PPTP. IPSec: algorithms and a public key to encrypt the data at Layer 3. Also uses Internet Key Exchange (IKE) protocol to authenticate the two end nodes in the communication session. Two modes: transport mode, only the data portion of the packet is encrypted, but not the header In tunnel mode: both the header and the data are encrypted

    34. Continued Radius: Remote Authentication Dial-In User Service (RADIUS) User attempts to dial in to a remove access device, device authenticates, user is routed to network; otherwise; disconnected.

    35. Network Management Finding problems Vendors generally offer management functionality that allows you to collect data about the network Can purchase management tools Management Tools SNMP: Simple Network Management Protocol: works by sending messaged, called protocol data units (PDUs), to various devices on the network. SNMP-compliant devices, called agents, store data about themselves in Management Information Bases (MIBs) and return this data to the SNMP requesters.

    36. Management Tools RMON: remote monitoring takes SNMP to the next level. While SNMP manages devices, RMON can monitor the actual network traffic, collect statistics, and record history.

    37. Quality of Service (QoS) and Bandwidth Management QoS allow you to prioritize types of traffic or applications Gives priority to time-sensitive applications Built into a variety of hardware and software products such as Cisco and Microsoft

    38. Continued You can Classify different types of traffic (video, audio, data) Prioritize mission-critical and time-sensitive traffic Load balance across multiple resources for redundancy and performance.

    39. Voice and Data Convergence Voice Over Internet Protocol (VoIP) Pros Administer and manage one infrastructure Handsets in any location Not really occurring any additional costs Telecommunters use laptops for telephone service Data integration

    40. Cons VoIP relatively new technology Audio-quality problems Interruption of service with network Software upgrades for handheld devices Service in the event of power outage Latency Voice people need to learn about network

    41. Summary Slide OSI Model Internet Protocol Suite IP Addressing Local Area Networks Wide Area Networks Remote Access Network Management Voice and Data Convergence

More Related