Training Course on Network Administration

Size: px
Start display at page:

Download "Training Course on Network Administration"

Transcription

1 Training Course on Network Administration 03-07, March 2014 National Centre for Physics Presentation_ID 1

2 Course Outline Day-1 Exploring Networking world. Network Communication Models. OSI and TCP/IP Architecture. Application Layer Transport Layer Day-2 Network Layer IP addressing and Planning Data Link Layer Day-3 Switched Networks VLANs Routing Inter-VLAN Routing Day-4 Dynamic Routing RIP OSPF Day-5 Access Control Lists Network Address Translation Network Monitoring Presentation_ID 2

3 About Course Theoretical portion of this course is customized version of Cisco curriculum, where many different topics are added. First two days will cover the Fundamental concepts of Networking, which will be mostly theoretical. Remaining Three days will include lectures along with hand on labs to give practical experience. Keep it interactive to get maximum out of it. Presentation_ID 3

4 Exploring the Network Network Basics Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4

5 Interconnecting our Lives Networks in Our Past and Daily Lives Presentation_ID 5

6 Interconnecting our Lives Networking impacts in our daily lives Learn Communicate Work Play Presentation_ID 6

7 Converged Networks Traditional Service Networks Presentation_ID 7

8 Converged Networks Current Service Networks Presentation_ID 8

9 Reliable Network Supporting Network Architecture As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance Scalability Quality of Service (QoS) Security Presentation_ID 9

10 Reliable Network Fault Tolerance in Circuit Switched Network Presentation_ID 10

11 Reliable Network Fault Tolerance in Packet Switched Network Presentation_ID 11

12 Reliable Network Scalability Presentation_ID 12

13 Reliable Network Quality of Service (QoS) Presentation_ID 13

14 Reliable Network Network Security Presentation_ID 14

15 LANs, WANs, and Internets Components of a Network There are three categories of network components: End devices Intermediary devices Network media Presentation_ID 15

16 Network Representations The symbols used to represent the different devices and connections that make up a network. Presentation_ID 16

17 Components of a Network Network Topology Diagrams Presentation_ID 17

18 LANs and WANs Types of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN) Presentation_ID 18

19 LANs and WANs Presentation_ID 19

20 LANs, WANs, and Internets The Internet Presentation_ID 20

21 Connecting to the Internet Connecting Businesses to the Internet Presentation_ID 21

22 Network Trends New trends Some of the top trends include: Bring Your Own Device (BYOD) Online collaboration Video Cloud computing Presentation_ID 22

23 Network Trends Bring Your Own Device (BYOD) BYOD is about end users having the freedom to use personal tools to access information and communicate across a business or campus network. Presentation_ID 23

24 Network Trends Online Collaboration and Considerations Presentation_ID 24

25 Network Trends Video Communications - Video is becoming a key requirement for effective collaboration as organizations extend across geographic and cultural boundaries. Video users now demand the ability to view any content, on any device, anywhere. Presentation_ID 25

26 Network Trends Cloud Computing. Cloud Computing - Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network. A company uses the hardware and software in the cloud and a service fee is charged. Presentation_ID 26

27 Network Trends Data Centers - Cloud computing is possible because of data centers. A data center is a facility used to house computer systems and associated components including: Redundant data communications connections Redundant storage systems (typically uses SAN technology) Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire suppression) Security devices Presentation_ID 27

28 Network Protocols and Communications Network Basics Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28

29 Protocols Network Communications Presentation_ID 29

30 Rules of Communications Establishing Rules Protocols in human communications account for the following requirements: An identified sender and receiver Common language and grammar Speed and timing of delivery Confirmation or acknowledgement requirements Common computer protocols include: Message encoding Message formatting and encapsulation Message size Message timing Message delivery options Presentation_ID 30

31 How network are designed and built? Networks are complex with many pieces of Hosts, routers, links, applications, protocols, hardware, software. Can we organize it, somehow? Let s consider a Web page request: Browser requests Web page from server Server should determine if access is privileged Reliable transfer page from server to client Physical transfer of bits from server to client Presentation_ID 31

32 Organization of air travel a series of steps ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing airplane routing Presentation_ID 32

33 Layering of airline functionality ticket (purchase) ticket (complain) ticket baggage (check) baggage (claim baggage gates (load) gates (unload) gate runway (takeoff) runway (land) takeoff/landing airplane routing airplane routing airplane routing airplane routing airplane routing departure airport intermediate air-traffic control centers arrival airport layers: each layer implements a service via its own internal-layer actions relying on services provided by layer below Presentation_ID 33

34 Reference Models Network Layered Model Presentation_ID 34

35 OSI Model Initially the OSI model was designed by the ISO to provide a framework on which to build a suite of open systems protocols. Ultimately, the speed at which the TCP/IP-based Internet was adopted, and the rate at which it expanded, caused the development and acceptance of the OSI protocol suite to lag behind. Often referred to by the number of the layer. Presentation_ID 35

36 TCP/IP Model Alternative model. The architecture of the TCP/IP protocol suite follows the structure of this model. Similar to OSI Model Presentation_ID 36

37 Peer-to-Peer Communications Hosts (all layers) Hosts (all layers) Routers Switches/NICs Repeaters, Hubs, Cables, etc. Routers Switches/NICs Repeaters, Hubs, Cables, etc. Presentation_ID 37

38 Communicating the Messages Segmentation Better approach segmentation. Multiplexing: Different conversations can be interleaved. Presentation_ID 38

39 Disadvantage of Segmentation Disadvantage added level of complexity. Analogy: 100 page letter one page at a time Separate envelopes Sequencing Presentation_ID 39

40 Data Encapsulation Application Upper-Layer Data Presentation Session PDU TCP Header Upper-Layer Data Transport Segmen IP Header Data Network Packet LLC Header MAC Header Data Data FCS FCS Data-Link Frame Physical Bits Presentation_ID 40

41 The Communication Process - Encapsulation Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Server HTTP Data Encapsulation Process of adding control information as it passes down through the layered model. Presentation_ID 41

42 The Communication Process - Decapsulation Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Client HTTP Data Decapsulation Process of removing control information as it passes upwards through the layered model. Presentation_ID 42

43 Devices and their layers Transceiver Hosts and servers operate at Layers 2-7; they perform the encapsulation process. Routers: Layers 1 through 3, make decisions at layer 3 Switches and NICs: Layers 1 and 2, make decisions at layer 2 Hubs and transceivers: Layer 1, no decisions to make Presentation_ID 43

44 Data Flow Through a Network Presentation_ID 44

45 Accessing Local Resources Network Address Contains information required to deliver the IP packet from the source device to the destination device. Has two parts, the network prefix and the host part. An IP packet contains two IP addresses: Source IP address - The IP address of the sending device. Destination IP address - The IP address of the receiving device. The destination IP address is used by routers to forward a packet to its destination. Presentation_ID 45

46 Accessing Local Resources Data Link Address Different role. The purpose of the data link address is to deliver the data link frame from one network interface to another network interface on the same network. IP packet encapsulated in a data link frame so it can be transmitted over the physical medium, the actual network. Ethernet LANs and wireless LANs are two examples of networks Presentation_ID 46

47 Accessing Local Resources Data Link Address The source and destination data link addresses are added: Source data link address - The physical address of the device that is sending the packet. Initially this is the NIC that is the source of the IP packet. Destination data link address - The physical address of the network interface of either: Next hop router or Network interface of the destination device Presentation_ID 47

48 Communicating on same Network Presentation_ID 48

49 Learning the MAC Address Presentation_ID 49 49

50 Accessing Remote Devices Presentation_ID 50

51 Accessing Remote Devices Presentation_ID 51 51

52 Accessing Remote Resources Using Wireshark to View Network Traffic Presentation_ID 52

53 Application Layer Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53

54 The TCP/IP Application Layer There are many TCP/IP application layer protocols and new protocols are always being developed. HTTP Hypertext Transfer Protocol DNS - Domain Name System SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol IMAP - Internet Message Access Protocol FTP - File Transfer Protocol TFTP - Trivial File Transfer Protocol DHCP - Dynamic Host Configuration Protocol Presentation_ID 54

55 Two Networking Models Networked computers take on different roles or functions in relation to each other. Peer-to-Peer (P2P) network. Variations: P2P networks and P2P applications. Client / Server network: Requires central servers responding to client requests. Presentation_ID 55

56 Application Layer Protocols HTTP (WWW) We will examine HTTP in detail. DHCP (IP address resolution) FTP (file transfer) DNS (domain name resolution) SMTP ( ) SMB (file sharing) P2P (file sharing) Telnet (remote login) Presentation_ID 56

57 Reminder of encapsulation/decapsulation Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Presentation_ID 57

58 Focus on Application Header and/or Data HTTP HTTP We will examine how the application (header) and/or data communication with each other between the client and the server. Later we will look at what roles the other layers, protocols (TCP, IP, etc.) play. Presentation_ID 58

59 HTTP (Hypertext Transfer Protocol) NCP HTTP Server HTTP Client HTTP REQUEST HTTP RESPONSE HTTP The Web s application layer protocol. Implemented in Client/ Server Model Client-Request Web objects (Browser) Server-Send objects in response to request (Web Server) RFC HTTP 1.0 RFC HTTP 1.1 Stateless Protocol Presentation_ID 59

60 HTTP (Hypertext Transfer Protocol) Web page (also called a html document) Web page consists of objects Objects (examples): HTML file JPEG image GIF image JAVA applet Audio file The base HTML file references other objects in the page. <html> <head> <title>ncp-centre of Excellence, National Centre for Physics,Islamabad,Pakistan</title> </head> <body topmargin="0" leftmargin="0" rightmargin="0" style="text-align: left"> <table border="0" cellpadding="0" style="border-collapse: collapse" bordercolor="#111111" width="99%" id="autonumber1" height="373"> <tr> <td width="79%" height="105" colspan="4"> <img border="0" src="images/banner.jpg" width="100%" height="120"></td> </tr> Presentation_ID 60

61 HTTP Request Message Some data omitted for brevity GET /index.html / HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1;.NET CLR ; Media Center PC 5.0;.NET CLR ; InfoPath.1) Host: Connection: Keep-Alive HTTP Server HTTP Client Request Message Request line Header lines ASCII Text Request line: Method field GET, POST and HEAD The great majority of Requests are GETs Presentation_ID 61

62 HTTP Request Message GET /index.html/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1;.NET CLR ; Media Center PC 5.0;.NET CLR ; InfoPath.1) Host: Connection: Keep-Alive Request Line GET - Browser/client is requesting an object /index.html/ - Browser is requesting this object in this directory (default is index.html) HTTP/1.1 - Browser implements the HTTP/1.1 (1.1 is backwards compatible with 1.0) Presentation_ID 62

63 HTTP Request Message GET /~rgraziani/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1;.NET CLR ; Media Center PC 5.0;.NET CLR ; InfoPath.1) Host: Connection: Keep-Alive Request Line GET: - Used by browser/client to request an object. POST: - Used when user has filled out a form and sending information to the server. (Forms do not have to use POST.) - Example: words in a search engine HEAD: - Similar to a GET, but the server will responds with a HTTP message but leaves out the requested object. PUT: - Used with Web publishing tools, upload objects. DELETE: - Used with Web publishing tools, delete objects. Presentation_ID 63

64 HTTP Request Message GET /~rgraziani/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1;.NET CLR ; Media Center PC 5.0;.NET CLR ; InfoPath.1) Host: Connection: Keep-Alive Header Lines Accept-Language:- User prefers this language of the object User-Agent: - The browser type making the request Host: - Host on which the object resides Connection: - Client/browser is telling the server to keep this TCP connection Open, known as a persistent connection. - We will talk about this later in TCP (transport layer) Presentation_ID 64 64

65 HTTP Response Message HTTP/ OK Date: Fri, 22 Feb :34:18 GMT Server: Apache/ (Red Hat) Last-Modified: Thu, 15 Nov :33:12 GMT Content-Length: Connection: close Content-Type: text/html Some data omitted for brevity <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" " <html xmlns=" HTTP Server HTTP Client 65 Presentation_ID 65

66 HTTP Response Message HTTP/ OK Date: Fri, 22 Feb :34:18 GMT Server: Apache/ (Red Hat) Last-Modified: Thu, 15 Nov :33:12 GMT Content-Length: Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" " <html xmlns=" Response message: Status line Header lines Entity body Presentation_ID 66

67 Telnet Telnet Telnet Server Telnet provides a standard method of emulating text-based terminal devices over the data network. 67 Presentation_ID 67

68 Telnet Telnet Telnet Server Allows a user to remotely access another device (host, router, switch). A connection using Telnet is called a Virtual Terminal (VTY) session, or connection. Telnet uses software to create a virtual device that provides the same features of a terminal session with access to the server command line interface (CLI). Telnet clients: Putty Teraterm Presentation_ID 68

69 Telnet Telnet supports user authentication, but does not encrypt data. All data exchanged during a Telnet sessions is transported as plain text. Secure Shell (SSH) protocol offers an alternate and secure method for server access. Stronger authentication Encrypts data 69 Presentation_ID 69

70 Common Application Layer Protocols SMTP and POP Presentation_ID 70

71 Everyday Application Layer Protocols SMTP and POP (Continued) Presentation_ID 71

72 DNS Domain Name System DNS allows users (software) to use domain names instead of IP addresses 72 Presentation_ID 72

73 Name Resolution Need the IP address Resolver DNS client programs used to look up DNS name information. Name Resolution The two types of queries that a DNS resolver (either a DNS client or another DNS server) can make to a DNS server are the following: Recursive queries Queries performed by Host to Local DNS Server Iterative queries Queries performed Local DNS server to other servers Presentation_ID 73 73

74 DNS Name Resolution 1 User types Step 1. The DNS resolver on the DNS client sends a recursive query to its configured Local DNS server. Requests IP address for " The DNS server for that client is responsible for resolving the name Cannot refer the DNS client to another DNS server. 74 Presentation_ID 74

75 DNS Name Resolution Step 2. Local DNS Server forwards the query to a Root DNS server. Step 3. Root DNS server Makes note of.com suffix Returns a list of IP addresses for TLD (Top Level Domain Servers) responsible for.com. 75 Presentation_ID 75

76 DNS Name Resolution Root DNS Servers There are 13 Root DNS servers (labeled A through M) TLD Servers Responsible for domains such as.com, edu, org,.net,.uk, jp, fr Network Solutions maintains TLD servers for.com Educause maintains TLD servers for.edu There are redundant servers throughout the world. Presentation_ID 76 76

77 DNS Name Resolution Step 4. The local DNS server sends query for to one of the TLD servers. Step 5. TLD Server Makes note of example.com Returns IP address for authoritative server example.com (such as dns.example.com server) Presentation_ID 77

78 DNS Name Resolution Step 6. Local DNS server sends query for directly to DNS server for example.com Step 7. example.com DNS server responds with its IP address for Presentation_ID 78

79 DNS Name Resolution 8 7 Step 8. Local DNS server sends the IP address of to the DNS client. DNS Caching When a DNS server receives a DNS reply (mapping hostname to an IP address) it can cache the information in its local memory. DNS servers discard cached information after a period of time (usually 2 days) A local DNS server can cache TLD server addresses, bypassing the root DNS servers in the query chain. Presentation_ID 79

80 DNS Name Resolution In the worst cases, you'll get a dialog box that says the domain name doesn't exist - even though you know it does. This happens because the authoritative server is slow replying to the first, and your computer gets tired of waiting so it times-out (drops the connection) or the domain name does not exist. But if you try again, there's a good chance it will work, because the authoritative server has had enough time to reply, and your name server has stored the information in its cache. Presentation_ID 80

81 nslookup nslookup Displays default DNS server for your host Can be used to query a domain name and get the IP address Presentation_ID 81 81

82 DNS Name Resolution ipconfig /displaydns After a certain amount of time, specified in the Time to Live (TTL) associated with the DNS resource record, the resolver discards the record from the cache. ipconfig /flushdns Manually deletes entries The default TTL for positive responses is 86,400 seconds (1 day). The default TTL for negative responses is 300 seconds. Presentation_ID 82 82

83 Providing IP Addressing Services Dynamic Host Configuration Protocol DHCP allows a host to obtain an IP address dynamically DHCP Information can include: IP address Subnet mask Default gateway Domain name DNS Server DHCP servers can be: Server on LAN Router Server at ISP Presentation_ID 83

84 Providing IP Addressing Services DHCP Operation Presentation_ID 84

85 DHCP Dynamic Host Configuration Protocol IP addresses and other information can be obtained: Statically Dynamically (DHCP) Presentation_ID 85

86 Providing File Sharing Services File Transfer Protocol FTP allow data transfers between a client and a server FTP client is an application that runs on a computer that is used to push and pull data from a server running an FTP daemon To successfully transfer data, FTP requires two connections between the client and the server, one for commands and replies, the other for the actual file transfer Presentation_ID 86

87 Providing File Sharing Services Server Message Block Clients establish a long term connection to servers After the connection is established, the user can access the resources on the server as if the resource is local to the client host Presentation_ID 87

88 Providing File Sharing Services Server Message Block Presentation_ID 88

89 Transport Layer Network Fundamentals Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89

90 Transport Layer Presentation_ID 90

91 Encapsulation DATA SEGMENT S.P / D.P. / S.N. / Ack # / DATA IPv / HLEN / Flag / S. IP / D. IP / PACKET FRAME DATA (SEGMENT) Frame Header DATA (PACKET) Trailer Presentation_ID 91

92 Reminder of encapsulation/decapsulation Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Packet Data Link Trailer Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer Presentation_ID 92

93 Focus on Transport Layer TCP TCP Presentation_ID 93

94 Transport Layer Responsibility TCP Segment TCP Segment TCP Segment TCP Segment 1. Tracking the individual communication between applications on the source and destination hosts 2. Segmenting data for manageability and reassembling segmented data into streams of application data at the destination 3. Identifying the proper application for each communication stream Presentation_ID 94

95 Transport Layer Protocols TCP/IP uses two transport layer protocols: Transmission Control Protocol (TCP) Provides reliable delivery ensuring that all of the data arrives at the destination. Uses acknowledged delivery and other processes to ensure delivery. Makes larger demands on the network more overhead. User Datagram Protocol (UDP) Provides just the basic functions for delivery no reliability. Less overhead. TCP or UDP Presentation_ID 95

96 Introducing TCP and UDP TCP and UDP TCP UDP bit Source Port Number 16-bit Destination Port Number 32-bit Sequence Number 32 bit Acknowledgement Number 4-bit Header Length 6-bit (Reserved) U R G A C K P S H R S T S Y N F I N 16-bit Window Size 16-bit TCP Checksum 16-bit Urgent Pointer Options (if any) Data (if any) Presentation_ID 96

97 Introducing TCP and UDP Introducing TCP Transmission Control Protocol (TCP) RFC 793 Connection-oriented creating a session between source and destination Reliable delivery retransmitting lost or corrupt data Ordered data reconstruction numbering and sequencing of segments Flow control - regulating the amount of data transmitted Stateful protocol keeping track of the session Presentation_ID 97

98 Introducing TCP and UDP Introducing UDP User Datagram Protocol (UDP) RFC 768 Connectionless Unreliable delivery No ordered data reconstruction No flow control Stateless protocol Applications that use UDP: Domain Name System (DNS) Video Streaming Voice over IP (VoIP) Presentation_ID 98

99 Introducing TCP and UDP Separating Multiple Communications Port Numbers are used by TCP and UDP to differentiate between applications.. Presentation_ID 99

100 Introducing TCP and UDP TCP and UDP Port Addressing Presentation_ID 100

101 Introducing TCP and UDP TCP and UDP Port Addressing Netstat Used to examine TCP connections that are open and running on a networked host Presentation_ID 101

102 TCP Communication TCP Server Processes Presentation_ID 102

103 TCP Communication TCP Connection, Establishment and Termination Three-Way Handshake Establishes that the destination device is present on the network Verifies that the destination device has an active service and is accepting requests on the destination port number that the initiating client intends to use for the session Informs the destination device that the source client intends to establish a communication session on that port number Presentation_ID 103

104 TCP Communication TCP Three-Way Handshake Step 1 Step 1: The initiating client requests a client-toserver communication session with the server. Presentation_ID 104

105 TCP Communication TCP Three-Way Handshake Step 2 Step 2: The server acknowledges the client-toserver communication session and requests a server-to-client communication session. Presentation_ID 105

106 TCP Communication TCP Three-Way Handshake Step 3 Step 3: The initiating client acknowledges the server-to-client communication session. Presentation_ID 106

107 Protocol Data Units??? Is this correct title?? TCP Reliability Ordered Delivery Sequence numbers used to reassemble segments into original order Presentation_ID 107

108 TCP Reliability Acknowledgement and Window Size The sequence number and acknowledgement number are used together to confirm receipt. Window Size - The amount of data that a source can transmit before an acknowledgement must be received. Presentation_ID 108

109 Protocol Data Units TCP Reliability and Flow Control Data Loss and Retransmission When TCP at the source host has not received an acknowledgement after a predetermined amount of time, it will go back to the last acknowledgement number that it received and retransmit data from that point forward Flow Control Uses the window size field in the TCP header to specify the amount of data that can be transmitted before an acknowledgement must be received. Adjusts the effective rate of data transmission to the maximum flow that the network and destination device can support without loss. Manages the rate of transmission so that all data will be received and retransmissions will be minimized. Presentation_ID 109

110 Protocol Data Units TCP Flow Control Congestion Avoidance Using Dynamic Window Sizes Presentation_ID 110

111 TCP and UDP TCP Reliability - Acknowledgements TCP uses a combination of sequence numbers and acknowledgements to ensure all requested data has been received. Can be inefficient when there is loss of one or more segments Selective Acknowledgements (SACK) implementation of TCP that overcomes the inefficiency of TCP acknowledgements Presentation_ID 111

112 UDP Communication UDP Low Overhead vs. Reliability UDP Simple protocol that provides the basic transport layer function Used by applications that can tolerate small loss of data Used by applications that cannot tolerate delay Used by Domain Name System (DNS) Simple Network Management Protocol (SNMP) Dynamic Host Configuration Protocol (DHCP) Trivial File Transfer Protocol (TFTP) IP telephony or Voice over IP (VoIP) Online games Presentation_ID 112

113 UDP Communication Datagram Reassembly Presentation_ID 113

114 UDP Communication UDP Server and Client Processes UDP-based server applications are assigned wellknown or registered port numbers. UDP client process randomly selects port number from range of dynamic port numbers as the source port. Presentation_ID 114

115 TCP or UDP Applications that use TCP Presentation_ID 115

116 TCP or UDP Applications that use UDP Presentation_ID 116

117 Day 1 End Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 117

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Computer Networks CCNA Module 1

Computer Networks CCNA Module 1 Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The

More information

How To Understand The Internet Of S (Netware)

How To Understand The Internet Of S (Netware) Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

TCP/IP Networking An Example

TCP/IP Networking An Example TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Understanding Layer 2, 3, and 4 Protocols

Understanding Layer 2, 3, and 4 Protocols 2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

TCP/IP Basis. OSI Model

TCP/IP Basis. OSI Model TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Chakchai So-In, Ph.D.

Chakchai So-In, Ph.D. Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Layered protocol (service) architecture

Layered protocol (service) architecture Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Using MIS 3e Chapter 6A Appendix

Using MIS 3e Chapter 6A Appendix Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

NETWORK DRIVE MAPPING, SHARING,TESTING AND AN IMPLEMENTATION BY WRITING A PROGRAM TO RETRIEVE THE DATA FILE FROM A NETWORK DRIVE OF ANOTHER COMPUTER.

NETWORK DRIVE MAPPING, SHARING,TESTING AND AN IMPLEMENTATION BY WRITING A PROGRAM TO RETRIEVE THE DATA FILE FROM A NETWORK DRIVE OF ANOTHER COMPUTER. NETWORK DRIVE MAPPING, SHARING,TESTING AND AN IMPLEMENTATION BY WRITING A PROGRAM TO RETRIEVE THE DATA FILE FROM A NETWORK DRIVE OF ANOTHER COMPUTER. BY SAKIL AHMED ID: 102 33 205 This Report Presented

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

The TCP/IP Protocol Suite

The TCP/IP Protocol Suite The TCP/IP Protocol Suite Tutorial December 20, 2006 Trademarks and Copyrights Microsoft, Windows, Outlook, and Internet Explorer are registered trademarks or trademarks of Microsoft Corporation in the

More information

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)

More information

CS101 Lecture 19: Internetworking. What You ll Learn Today

CS101 Lecture 19: Internetworking. What You ll Learn Today CS101 Lecture 19: Internetworking Internet Protocol IP Addresses Routing Domain Name Services Aaron Stevens (azs@bu.edu) 6 March 2013 What You ll Learn Today What is the Internet? What does Internet Protocol

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners

More information

Cisco Data Centre: Introducing Cisco Data Center Networking

Cisco Data Centre: Introducing Cisco Data Center Networking coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â

More information

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Data Communication I

Data Communication I Data Communication I Urban Bilstrup (E327) 090901 Urban.Bilstrup@ide.hh.se www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal

More information

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of

More information

Network Programming TDC 561

Network Programming TDC 561 Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

The TCP/IP Reference Model

The TCP/IP Reference Model The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was

More information

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers. Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson) Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Computer Networks - Xarxes de Computadors

Computer Networks - Xarxes de Computadors Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information