This document provides an overview of IP networking and TCP/IP basics. It discusses the origins of TCP/IP in the ARPANET project and the distributed network design. It describes the OSI model and compares it to the TCP/IP architecture. It also covers IP addressing and numbering, client-server architecture, IP forwarding, and some common network troubleshooting tools.
Layer 3 Protocols
This document provides an overview of various layer 3 protocols and techniques, including routing protocols (BGP, IS-IS, OSPF, RIP), multicasting protocols (IGMP), and loop avoidance techniques. It describes the purpose and key features of each protocol. BGP exchanges routing information between autonomous systems. IS-IS and OSPF are intra-AS routing protocols that use link-state algorithms. RIP is a distance vector protocol best suited to small networks. IGMP manages multicast group membership. NDP provides address resolution and neighbor discovery for IPv6. HIP separates host identity from IP addresses to enable mobility.
- Open Shortest Path First (OSPF) is a link-state routing protocol that can be used for both small and large networks. It uses areas and hierarchical network design to reduce routing overhead and improve performance as the network scales.
- OSPF establishes neighbor relationships to exchange routing information. It elects a Designated Router and Backup Designated Router to optimize this exchange on multi-access networks. Link-state databases are synchronized between neighbors to calculate the shortest paths.
- Basic OSPF configuration involves enabling OSPF on interfaces and networks, setting authentication, and adjusting metrics and timers. Loopback interfaces ensure router IDs remain stable. Verification commands display neighbor relationships and routing tables.
O documento descreve conceitos fundamentais do protocolo OSPF, incluindo objetivos de configuração básica, encapsulamento de mensagens, tipos de pacotes, eleição de DR/BDR, métrica e custo de links.
The document describes the basic BGP configuration of routers R1, R2, and ISPs Airtel, Reliance, and Vodafone. It defines the interfaces of each router and ISP with IP addresses. It also outlines the BGP configuration of each entity with AS numbers, neighbor definitions, and network advertisements. Troubleshooting commands like show ip route, show ip bgp summary, and show ip bgp neighbor are listed.
The “Hands on Experience with IPv6 Routing and Services” Techtorial will provide attendees an opportunity to configure, troubleshoot, design and implement an IPv6 network using IPv6 technologies and features such as: IPv6 addressing, IPv6 neighbor discovery, HSRPv6, static routing, OSPFv3, EIGRPv6 and BGPv6. You will be provided with a scenario made up of an IPv4 network where you will get the opportunity to configure and implement IPv6 based on the requirements on the network, i.e., where would you deploy dual stack, where it make sense to do funneling and how to deploy IPv6 routing protocols without impacting your existing Network infrastructure.
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes OSPF's message encapsulation, packet types, neighbor discovery process using Hello packets, link state database and shortest path first algorithm, metric and cost calculation, and mechanisms for handling multi-access networks like designated router election. The objectives are to describe OSPF configuration and troubleshooting.
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
Layer 3 Protocols
This document provides an overview of various layer 3 protocols and techniques, including routing protocols (BGP, IS-IS, OSPF, RIP), multicasting protocols (IGMP), and loop avoidance techniques. It describes the purpose and key features of each protocol. BGP exchanges routing information between autonomous systems. IS-IS and OSPF are intra-AS routing protocols that use link-state algorithms. RIP is a distance vector protocol best suited to small networks. IGMP manages multicast group membership. NDP provides address resolution and neighbor discovery for IPv6. HIP separates host identity from IP addresses to enable mobility.
- Open Shortest Path First (OSPF) is a link-state routing protocol that can be used for both small and large networks. It uses areas and hierarchical network design to reduce routing overhead and improve performance as the network scales.
- OSPF establishes neighbor relationships to exchange routing information. It elects a Designated Router and Backup Designated Router to optimize this exchange on multi-access networks. Link-state databases are synchronized between neighbors to calculate the shortest paths.
- Basic OSPF configuration involves enabling OSPF on interfaces and networks, setting authentication, and adjusting metrics and timers. Loopback interfaces ensure router IDs remain stable. Verification commands display neighbor relationships and routing tables.
O documento descreve conceitos fundamentais do protocolo OSPF, incluindo objetivos de configuração básica, encapsulamento de mensagens, tipos de pacotes, eleição de DR/BDR, métrica e custo de links.
The document describes the basic BGP configuration of routers R1, R2, and ISPs Airtel, Reliance, and Vodafone. It defines the interfaces of each router and ISP with IP addresses. It also outlines the BGP configuration of each entity with AS numbers, neighbor definitions, and network advertisements. Troubleshooting commands like show ip route, show ip bgp summary, and show ip bgp neighbor are listed.
The “Hands on Experience with IPv6 Routing and Services” Techtorial will provide attendees an opportunity to configure, troubleshoot, design and implement an IPv6 network using IPv6 technologies and features such as: IPv6 addressing, IPv6 neighbor discovery, HSRPv6, static routing, OSPFv3, EIGRPv6 and BGPv6. You will be provided with a scenario made up of an IPv4 network where you will get the opportunity to configure and implement IPv6 based on the requirements on the network, i.e., where would you deploy dual stack, where it make sense to do funneling and how to deploy IPv6 routing protocols without impacting your existing Network infrastructure.
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes OSPF's message encapsulation, packet types, neighbor discovery process using Hello packets, link state database and shortest path first algorithm, metric and cost calculation, and mechanisms for handling multi-access networks like designated router election. The objectives are to describe OSPF configuration and troubleshooting.
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
Este documento resume las redes GPON (GibabitPassiveOptical Networks). Explica brevemente la historia y tecnologías anteriores de las redes de fibra óptica, la arquitectura y la infraestructura de GPON, y sus aplicaciones para proveer servicios de banda ancha de alta velocidad. GPON usa una estructura de trama escalable desde 622 Mb/s hasta 2,5 Gb/s para soportar múltiples servicios a través de la fibra óptica.
This presentation discusses Segment Routing over IPv6 (SRv6) and the Network Programming Model. It provides an overview of what SRv6 is, how it works, and how the Network Programming Model can be used for applications like VPNs, SD-WANs, and service function chaining. The presentation also covers SRv6 standardization efforts, open source implementations, and areas of ongoing research.
The document discusses configuring OSPF routing on multiple routers. It explains that OSPF configuration involves enabling OSPF on each router, defining the interfaces and networks, and verifying neighbor relationships. It then provides an example of configuring a multi-area OSPF network with area 0, area 1, and an area border router connecting the two areas. The configuration involves specifying the area IDs for each router's interfaces to establish neighbors between routers in different areas.
OSPF es un protocolo de enrutamiento link-state abierto desarrollado para reemplazar a RIP. Utiliza el algoritmo SPF para calcular la mejor ruta hacia cada destino basada en la métrica de costo. OSPF divide las redes en áreas para controlar de manera más eficiente las operaciones de red y calcular rutas sin bucles.
The document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes how OSPF routers exchange link state advertisements to maintain a synchronized topological database. The database allows each router to calculate the shortest path to all destinations within the autonomous system. The document also discusses OSPF packet types, the process of forming adjacencies between neighbors, and the election of designated routers on multi-access networks.
This document provides an overview of free space optics communication (FSO). It begins with an introduction that defines FSO as using visible or infrared light beams through the atmosphere for optical communications. It then describes how FSO works using low power infrared lasers and photon detectors. The document outlines the basic architecture of FSO systems including transmitters, receivers, and modulation techniques. It discusses applications, advantages such as low cost and flexibility, and disadvantages like interference from weather. In conclusion, the document presents FSO as a wireless optical technology alternative to traditional wired networks.
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
El documento describe las tecnologías de redes de fibra óptica, incluyendo los componentes de un enlace de fibra óptica, los tipos de fibras y sus características, las topologías de red como PON, GPON y EPON, y los mecanismos de multiplexación TDMA y TDM utilizados. Explica que las redes de fibra óptica son ampliamente usadas hoy en día para transportar grandes cantidades de datos a largas distancias.
Fiber optic cable and its types including patchcables and connector typesAbhishekGarg269
in this slide i have discussed about fiber cable and its connector (LC,SC,ST) . i am sure after read this slide you have a deep knowledge of fiber optics and all of your doubts will resolve
MPLS provides benefits such as supporting multiple applications, decreasing forwarding overhead on core routers, and supporting forwarding of non-IP protocols. MPLS establishes label switched paths using label distribution protocols like LDP to propagate labels between routers so that packets can be forwarded based on a label lookup rather than a routing table lookup at every hop. During convergence after a link failure, routing protocols first reconverge while MPLS convergence involves repopulating forwarding information based on stored label mappings.
Optical fibers use total internal reflection to transmit light signals along their core. They have a higher refractive index core surrounded by a lower index cladding. Acceptance angle and modal/material dispersion affect signal transmission. Monomode fibers have a small single-path core to eliminate modal dispersion, while multimode fibers have a larger core allowing multiple light paths and more dispersion. Attenuation and noise also impact signal quality during fiber optic transmission.
The document discusses optical fibers, including their evolution, structure, working principles, classification, and applications. Optical fibers first emerged in the late 19th century and were refined over the 20th century. An optical fiber consists of a core and cladding layer that uses total internal reflection to guide light along its path. Fibers are classified based on the number of propagation modes as either single-mode or multi-mode, and also by refractive index profile as step-index or graded-index. Optical fibers have numerous applications in telecommunications, computing, medicine, and other fields due to their advantages over electrical cables.
This document discusses service logic in carrier Ethernet services. It begins by defining different Ethernet service types, such as E-Line, E-LAN, and E-Tree services. It then provides examples of how these services are implemented in both port-based and virtualized formats. The document also discusses combining multiple services on a single UNI. Finally, it covers the processing of L2CP control protocol frames and the actions that can be taken for different protocols.
This document discusses the different LSA (Link State Advertisement) types in OSPF (Open Shortest Path First) networking. It explains that LSA types 1 and 2 are intra-area and do not leave the area, while type 3 are inter-area and describe routes outside the area. LSA types 5 and 7 describe redistributed routes from other protocols into an OSPF area, with type 5 generated by ASBR (Autonomous System Boundary Router) and type 7 by ASBR within a NSSA (Not-So-Stubby Area).
OSPF is a link-state interior gateway protocol that uses shortest path first algorithm to calculate routes. It elects a designated router that exchanges link-state advertisements and database information with other routers to choose the best routes. OSPF supports equal cost multi-path routing, uses different types of link-state advertisements, and allows dividing networks into areas to reduce routing overhead. It authenticates messages to prevent routing attacks.
This document provides an overview of optical fibers, including their structure, working principles, evolution and applications. It begins with definitions of optical fibers and how they guide light via total internal reflection. It then discusses the history and development of optical fibers, leading to lower attenuation rates. The document describes different types of optical fibers based on modes and refractive indices, and components of optical fiber communication systems. It covers advantages and disadvantages of optical fibers compared to other media. Finally, it lists several applications of optical fibers such as telecommunications, computer networks, medical and more.
These are sample slides taken from my 4 days long "GPON-FTTx" training course. This course has over 380 slides and it is a great source of learning about various topics related to GPON & FTTx. There are tons of exercises and real-world examples provided in teaching material.
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
Border Gateway Protocol (BGP) is the routing protocol that controls how data routes between autonomous systems on the Internet. It works by maintaining a table of IP network prefixes and their accessibility between networks. BGP allows for fully decentralized routing and is used internally by gateways to determine the best route to a given destination network. There are two types of BGP sessions - internal BGP (iBGP) for intra-autonomous system routing and external BGP (eBGP) for inter-autonomous system routing. BGP uses messages like OPEN, UPDATE, KEEPALIVE and NOTIFICATION to establish and maintain sessions between routers to exchange routing information.
1. SONET/SDH is a standard for transmitting digital signals over optical fiber. It uses synchronous multiplexing to combine lower-speed signals into higher-speed signals for transmission.
2. The basic building blocks of SONET/SDH infrastructure are terminal multiplexers, add/drop multiplexers, and digital cross-connects. Terminal multiplexers combine signals, add/drop multiplexers can remove and insert signals, and cross-connects route signals between rings.
3. SONET/SDH uses rings and path protection to provide self-healing networks. Rings allow signals to be rerouted if a fiber is cut. Path protection transmits redundant
This document provides an overview of IP and networking basics. It discusses the origins of TCP/IP which was developed by ARPA to create a distributed and decentralized network. It then covers the OSI model and compares it to the TCP/IP architecture. The networking layer uses IP to provide addressing and routing functions across different underlying networks. IP addressing is hierarchical, using both network and host portions. Special addresses like broadcast and loopback are also defined.
This document provides an introduction to the OSI and TCP/IP network models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains the functions of each layer, such as the transport layer providing reliable data delivery and the network layer providing network-wide addressing and routing. The document also discusses protocols like TCP, UDP, and IP that operate at different layers and how data is encapsulated as it passes through the layers.
Este documento resume las redes GPON (GibabitPassiveOptical Networks). Explica brevemente la historia y tecnologías anteriores de las redes de fibra óptica, la arquitectura y la infraestructura de GPON, y sus aplicaciones para proveer servicios de banda ancha de alta velocidad. GPON usa una estructura de trama escalable desde 622 Mb/s hasta 2,5 Gb/s para soportar múltiples servicios a través de la fibra óptica.
This presentation discusses Segment Routing over IPv6 (SRv6) and the Network Programming Model. It provides an overview of what SRv6 is, how it works, and how the Network Programming Model can be used for applications like VPNs, SD-WANs, and service function chaining. The presentation also covers SRv6 standardization efforts, open source implementations, and areas of ongoing research.
The document discusses configuring OSPF routing on multiple routers. It explains that OSPF configuration involves enabling OSPF on each router, defining the interfaces and networks, and verifying neighbor relationships. It then provides an example of configuring a multi-area OSPF network with area 0, area 1, and an area border router connecting the two areas. The configuration involves specifying the area IDs for each router's interfaces to establish neighbors between routers in different areas.
OSPF es un protocolo de enrutamiento link-state abierto desarrollado para reemplazar a RIP. Utiliza el algoritmo SPF para calcular la mejor ruta hacia cada destino basada en la métrica de costo. OSPF divide las redes en áreas para controlar de manera más eficiente las operaciones de red y calcular rutas sin bucles.
The document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes how OSPF routers exchange link state advertisements to maintain a synchronized topological database. The database allows each router to calculate the shortest path to all destinations within the autonomous system. The document also discusses OSPF packet types, the process of forming adjacencies between neighbors, and the election of designated routers on multi-access networks.
This document provides an overview of free space optics communication (FSO). It begins with an introduction that defines FSO as using visible or infrared light beams through the atmosphere for optical communications. It then describes how FSO works using low power infrared lasers and photon detectors. The document outlines the basic architecture of FSO systems including transmitters, receivers, and modulation techniques. It discusses applications, advantages such as low cost and flexibility, and disadvantages like interference from weather. In conclusion, the document presents FSO as a wireless optical technology alternative to traditional wired networks.
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
El documento describe las tecnologías de redes de fibra óptica, incluyendo los componentes de un enlace de fibra óptica, los tipos de fibras y sus características, las topologías de red como PON, GPON y EPON, y los mecanismos de multiplexación TDMA y TDM utilizados. Explica que las redes de fibra óptica son ampliamente usadas hoy en día para transportar grandes cantidades de datos a largas distancias.
Fiber optic cable and its types including patchcables and connector typesAbhishekGarg269
in this slide i have discussed about fiber cable and its connector (LC,SC,ST) . i am sure after read this slide you have a deep knowledge of fiber optics and all of your doubts will resolve
MPLS provides benefits such as supporting multiple applications, decreasing forwarding overhead on core routers, and supporting forwarding of non-IP protocols. MPLS establishes label switched paths using label distribution protocols like LDP to propagate labels between routers so that packets can be forwarded based on a label lookup rather than a routing table lookup at every hop. During convergence after a link failure, routing protocols first reconverge while MPLS convergence involves repopulating forwarding information based on stored label mappings.
Optical fibers use total internal reflection to transmit light signals along their core. They have a higher refractive index core surrounded by a lower index cladding. Acceptance angle and modal/material dispersion affect signal transmission. Monomode fibers have a small single-path core to eliminate modal dispersion, while multimode fibers have a larger core allowing multiple light paths and more dispersion. Attenuation and noise also impact signal quality during fiber optic transmission.
The document discusses optical fibers, including their evolution, structure, working principles, classification, and applications. Optical fibers first emerged in the late 19th century and were refined over the 20th century. An optical fiber consists of a core and cladding layer that uses total internal reflection to guide light along its path. Fibers are classified based on the number of propagation modes as either single-mode or multi-mode, and also by refractive index profile as step-index or graded-index. Optical fibers have numerous applications in telecommunications, computing, medicine, and other fields due to their advantages over electrical cables.
This document discusses service logic in carrier Ethernet services. It begins by defining different Ethernet service types, such as E-Line, E-LAN, and E-Tree services. It then provides examples of how these services are implemented in both port-based and virtualized formats. The document also discusses combining multiple services on a single UNI. Finally, it covers the processing of L2CP control protocol frames and the actions that can be taken for different protocols.
This document discusses the different LSA (Link State Advertisement) types in OSPF (Open Shortest Path First) networking. It explains that LSA types 1 and 2 are intra-area and do not leave the area, while type 3 are inter-area and describe routes outside the area. LSA types 5 and 7 describe redistributed routes from other protocols into an OSPF area, with type 5 generated by ASBR (Autonomous System Boundary Router) and type 7 by ASBR within a NSSA (Not-So-Stubby Area).
OSPF is a link-state interior gateway protocol that uses shortest path first algorithm to calculate routes. It elects a designated router that exchanges link-state advertisements and database information with other routers to choose the best routes. OSPF supports equal cost multi-path routing, uses different types of link-state advertisements, and allows dividing networks into areas to reduce routing overhead. It authenticates messages to prevent routing attacks.
This document provides an overview of optical fibers, including their structure, working principles, evolution and applications. It begins with definitions of optical fibers and how they guide light via total internal reflection. It then discusses the history and development of optical fibers, leading to lower attenuation rates. The document describes different types of optical fibers based on modes and refractive indices, and components of optical fiber communication systems. It covers advantages and disadvantages of optical fibers compared to other media. Finally, it lists several applications of optical fibers such as telecommunications, computer networks, medical and more.
These are sample slides taken from my 4 days long "GPON-FTTx" training course. This course has over 380 slides and it is a great source of learning about various topics related to GPON & FTTx. There are tons of exercises and real-world examples provided in teaching material.
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
Border Gateway Protocol (BGP) is the routing protocol that controls how data routes between autonomous systems on the Internet. It works by maintaining a table of IP network prefixes and their accessibility between networks. BGP allows for fully decentralized routing and is used internally by gateways to determine the best route to a given destination network. There are two types of BGP sessions - internal BGP (iBGP) for intra-autonomous system routing and external BGP (eBGP) for inter-autonomous system routing. BGP uses messages like OPEN, UPDATE, KEEPALIVE and NOTIFICATION to establish and maintain sessions between routers to exchange routing information.
1. SONET/SDH is a standard for transmitting digital signals over optical fiber. It uses synchronous multiplexing to combine lower-speed signals into higher-speed signals for transmission.
2. The basic building blocks of SONET/SDH infrastructure are terminal multiplexers, add/drop multiplexers, and digital cross-connects. Terminal multiplexers combine signals, add/drop multiplexers can remove and insert signals, and cross-connects route signals between rings.
3. SONET/SDH uses rings and path protection to provide self-healing networks. Rings allow signals to be rerouted if a fiber is cut. Path protection transmits redundant
This document provides an overview of IP and networking basics. It discusses the origins of TCP/IP which was developed by ARPA to create a distributed and decentralized network. It then covers the OSI model and compares it to the TCP/IP architecture. The networking layer uses IP to provide addressing and routing functions across different underlying networks. IP addressing is hierarchical, using both network and host portions. Special addresses like broadcast and loopback are also defined.
This document provides an introduction to the OSI and TCP/IP network models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains the functions of each layer, such as the transport layer providing reliable data delivery and the network layer providing network-wide addressing and routing. The document also discusses protocols like TCP, UDP, and IP that operate at different layers and how data is encapsulated as it passes through the layers.
1. The document discusses basic networking concepts including protocols, protocol layers, and network interconnection. It provides details on network addressing, the Domain Name System, and port numbers.
2. Key protocol layers are examined, including the OSI 7-layer model and the TCP/IP 4-layer model. The roles and functions of each layer are defined.
3. Types of networks like WANs, LANs, Ethernet, Token Ring, and FDDI are introduced along with examples of interconnection devices like bridges, routers, and gateways.
The document discusses layered network models including OSI and TCP/IP. It provides details on the layers of each model, the functions of each layer, and examples of protocols used. Key points covered include how data is encapsulated as it moves through the layers, with each layer adding header information, and how the layers allow for standardization and modularity in network communication.
The document provides information about the Data Communication Network course syllabus including course objectives, outcomes, topics covered, textbooks, and reference books. The syllabus is divided into 6 units that cover data communication network fundamentals, data link control protocols, network layer addressing and routing, transport layer protocols, application layer protocols, and network security. The document also includes summaries of the Open Systems Interconnection (OSI) model and TCP/IP reference model explaining their layered architectures and functions.
The document provides an overview of computer networking, including definitions of key terms like computer network and network topology. It discusses why networks are needed, how they work, common network models like OSI and TCP/IP. It also covers topics like IP addressing, different network types (LAN, MAN, WAN), common network devices, applications, and security concerns.
This document provides an overview of network models, specifically comparing the OSI reference model and the TCP/IP model. It explains that both models are based on layering with different layers performing distinct functions. The seven layers of the OSI model and four layers of the TCP/IP model are defined along with examples of protocols used in each layer. Key concepts like encapsulation, addresses, broadcasts, and the client-server model are also summarized.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It also explains the four layers of the TCP/IP model and some of the common protocols used in each layer such as IP, TCP, UDP, HTTP, FTP etc. Additionally, it summarizes the Address Resolution Protocol (ARP), which maps IP addresses to MAC addresses when a host needs to deliver a packet on a local network.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer. It then explains the five layers of the TCP/IP model and how encapsulation works. The document also covers topics such as addressing, fragmentation, segmentation, and IP addressing and subnetting.
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
Networking involves connecting electronic devices like computers to share resources and communicate. It allows devices to share internet access, hardware like printers, files and folders, and play multiplayer games. Networks use various topologies like star, bus or mesh to connect devices via physical cables or wireless links, and network protocols allow the connected devices to communicate according to shared rules.
The document discusses network reference models and the OSI and TCP/IP models. It provides details on each layer of the OSI model and its functions. The key points are that reference models divide network communication into simpler components, provide standardization, and prevent changes in one layer from affecting others. The OSI model has 7 layers and separates network functions into upper layers for applications and lower layers for data transmission. The TCP/IP model is based on widely used TCP and IP protocols.
The document provides information about the CCNA (Cisco Certified Network Associate) certification exam, including its introduction, syllabus, fees, number of questions, passing marks, and exam structure over two exams. It also includes summaries of the OSI reference model and TCP/IP model, which define standards for network communication and how data is packaged and transmitted between devices.
The document provides notes on networking fundamentals from CCENT/CCNA ICND1 Official Exam Certification Guide. It discusses the TCP/IP and OSI networking models, including their layers and functions. It also covers fundamentals of local area networks (LANs) such as Ethernet standards, speeds, cable types and maximum lengths. Common Ethernet standards include 10BASE-T, 100BASE-TX, 1000BASE-SX, 1000BASE-LX and 1000BASE-T.
The document discusses the OSI model and TCP/IP protocol stack. It describes the seven layers of the OSI model and the functions of each layer, including the physical, data link, network, transport, session, presentation, and application layers. It then maps the layers of the TCP/IP protocol stack to the OSI model, describing the functions of the physical network, data link, internet, transport, and application layers. It provides examples of protocols that operate at each layer, such as IP, TCP, UDP, ARP, and ICMP.
This document provides an overview of networking and internetworking concepts. It defines what a network is and some common network protocols like TCP/IP. It discusses how network speed is measured by bit rate and latency. It then covers local area networks, wide area networks, and the internet. The document explains the purpose of networks for file sharing, communication, and remote program execution. It also discusses network messaging and different network service models like the OSI reference model and TCP/IP model. Finally, it provides a simplified example of how the TCP/IP protocol functions to route a packet from a source to destination across multiple routers.
This document contains summaries of key topics related to Windows Server management:
1. It describes the seven layers of the OSI model and provides examples of the functions of each layer.
2. It also discusses common networking terms like hubs, bridges, routers, and gateways and explains how they relate to the OSI model layers.
3. Finally, it briefly introduces the concept of subnet masks and their role in defining the network and host portions of an IP address.
This document discusses computer networking and the OSI model. It provides an overview of how computers communicate at different layers, from the physical layer up to the application layer. It also discusses protocols like TCP/IP and how they map to the OSI model. The document compares OSI to the TCP/IP protocol suite and provides examples of protocols that operate at each layer.
The document discusses fundamentals of computer networking, including definitions of key terms like networks, protocols, and packet switching. It explains networking concepts such as the layered OSI model and TCP/IP stacks. Examples of different types of networking devices, protocols, and technologies are provided such as Ethernet, IP addressing, DNS, WiFi, and Bluetooth.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
2. Outline
Origins of TCP/IP
OSI Stack & TCP/IP Architecture
Client Server Architecture
IP Addressing & Numbering Rules
IP Forwarding and default route
Network Troubleshooting Tools
3. Origins of TCP/IP
1950’s – 1960’s – US Govt. requirement for
“rugged” network that would continue to work
in case of a nuclear attack
RAND Corporation (America’s leading think
thank) & DoD formed ARPA (Advanced
Research Project Agency)
1968 – ARPA engineers proposed Distributed
network design for ARPANET Network
4. Distributed Network Design
Pre-ARPANET networks
– “connection oriented”
– Management & control was centralized
“New” Network – ARPANET
– Connectionless
– Decentralised
Modern Internet has evolved from the
ARPANET
6. Internetworks
Start with lots of little networks
Many different types
– Ethernet, dedicated leased lines, dialup, ATM, Frame Relay,
FDDI
Each type has its own idea of addressing and protocols
Want to connect them all together and provide a
unified view of the whole lot (i.e. act as a single large
network)
8. The unifying effect of the network
layer
Define a protocol that works in the same way
with any underlying network
Call it the network layer (IP)
IP routers operate at the network layer
There are defined ways of using:
» IP over Ethernet
» IP over ATM
» IP over FDDI
» IP over serial lines (PPP)
» IP over almost anything
10. What is TCP/IP?
In simple terms is a language that enables
communication between computers
A set of rules (protocol) that defines how two
computers address each other and send data to
each other
Is a suite of protocols named after the two most
important protocols TCP and IP but includes
other protocols such as UDP, RTP, etc
11. Open Systems & TCP/IP
TCP/IP formed from standardized communications
procedures that were platform independent and open
Open systems
– open architecture - readily available to all
What is open system networking?
– network based on well known and standardized protocols
– standards readily available
– networking open systems using a network protocol
12. OSI - Layered Model Concept
Divide-and-conquer approach
Dividing requirements into groups, e.g transporting of
data, packaging of messages, end user applications
Each group can be referred to as a layer
– Upper layers are logically closer to the user and deal with
more abstract data, relying on lower layer protocols to
translate data into forms that can eventually be physically
transmitted.
Open Systems Interconnection Reference Model (OSI-
RM) adopted as a standard for networking
14. OSI Model
APPLICATION
• Upper Layers
• Application oriented
• Independent of layers below
TRANSPORT
• Lower Layers
• Transmission of data
• No differentiation of upper layers
1
3
2
4
5
6
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
15. Layers 7, 6, 5
7: Application layer
– Provides different services to the applications
– Uses the underlying layers to carry out work
» e.g. SMTP (mail), HTTP (web), Telnet, FTP, DNS
6: Presentation layer
– Converts data from applications into common
format and vice versa
5: Session layer
– organizes and synchronizes the exchange of data
between application processes
16. Layer 4
4: Transport layer
– Provides end to end transportation of segments
– E.g. TCP
» encapsulates TCP segments in network layer packets
» adds reliability by detecting and retransmitting lost
packets
» uses acknowledgements and sequence numbers to keep
track of successful, out-of-order, and lost packets
» timers help differentiate between loss and delay
– UDP is much simpler: no reliability features
17. Layer 3
3: Network layer
– Routes the information in the network
– E.g. IP is a network layer implementation which
defines addresses in such a way that route selection
can be determined.
» Single address space for the entire internetwork
» adds an additional layer of addressing, e.g. IP address,
which is different from MAC address.
18. Layer 3
3: Network layer (e.g. IP)
– Unreliable (best effort)
» if packet gets lost, network layer doesn’t care for higher layers can
resend lost packets
– Forwards packets hop by hop
» encapsulates network layer packet inside data link layer frame
» different framing on different underlying network types
» receive from one link, forward to another link
» There can be many hops from source to destination
19. Layer 3
3: Network layer (e.g. IP)
– Makes routing decisions
» how can the packet be sent closer to its destination?
» forwarding and routing tables embody “knowledge” of
network topology
» routers can talk to each other to exchange information
about network topology
20. Layer 2
2: Data Link layer
– Provides reliable transit of data across a physical
network link
– bundles bits into frames and moves frames between
hosts on the same link
– a frame has a definite start, end, size
– often also a definite source and destination link-layer
address (e.g. Ethernet MAC address)
– some link layers detect corrupted frames while other
layers re-send corrupted frames (NOT Ethernet)
21. Layer 1
1: Physical layer
– moves bits using voltage, light, radio, etc.
– no concept of bytes or frames
– bits are defined by voltage levels, or similar
physical properties
1101001000
22. OSI and TCP/IP
TCP/UDP – end to end reliability
IP - Forwarding (best-effort)
Framing, delivery
Raw signal
Mail, Web, etc.
1
3
2
4
5
6
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Transport
Network
Data Link &
Physical
OSI TCP/IP
24. Protocol Layers:
The TCP/IP Hourglass Model
Network layer
Token
Ring
ATM X.25 PPP
Frame
Relay
HDLC
Ethernet
IP
UDP
TCP
HTTP FTP Telnet DNS
SMTP Audio Video
RTP
Data link layer
Transport layer
Application layer
25. Layer Interaction
Application, Presentation and Session protocols are
end-to-end
Transport protocol is end-to-end
– encapsulation/decapsulation over network protocol on end
systems
Network protocol is throughout the internetwork
– encapsulation/decapsulation over data link protocol at each
hop
– Link and physical layers may be different on each hop
26. Layer Interaction:
OSI 7-Layer Model
Host Router Router Host
Application
Presentation
Session
Transport
Network
Link
Physical
Network
Link Link
Network
Link Link
Application
Presentation
Session
Transport
Network
Link
Physical
Physical
Hop
by
hop
End
to
end
27. Layer Interaction:
TCP/IP Model
Host Router Router Host
Application
TCP or UDP
IP
Link
Physical
IP
Link Link
IP
Link Link
Application
TCP or UDP
IP
Link
Physical
Physical
Hop
by
hop
End
to
end
No session or presentation layers in TCP/IP model
28. Encapsulation & Decapsulation
Lower layers add headers (and sometimes
trailers) to data from higher layers
Application
Transport
Network
Data Link
Data Link
Network
Data
Transport Layer Data
Header
Network Layer Data
Header
Data
Header
Header
Link Layer Data
Data
Header
Header
Header
Header
Trailer
Trailer
29. Frame, Datagram, Segment, Packet
Different names for packets at different layers
– Ethernet (link layer) frame
– IP (network layer) datagram
– TCP (transport layer) segment
Terminology is not strictly followed
– we often just use the term “packet” at any layer
30. Destination and source are 48-bit MAC
addresses
Type 0x0800 means that the data portion of the
Ethernet frame contains an IP datagram. Type
0x0806 for ARP.
Layer 2 - Ethernet frame
Preamble Dest
6 bytes
Source
6 bytes
Length
2 bytes
Data
46 to 1500
bytes
CRC
4 bytes
Type
2 bytes
31. Protocol = 6 means data
portion contains a TCP
segment. Protocol = 17
means UDP.
Layer 3 - IP datagram
IHL Type of Service Total Length
Version
Fragment Offset
Identification Flags
Time to Live Protocol Header Checksum
Source Address
Destination Address
Version = 4
If no options, IHL = 5
Source and Destination
are 32-bit IP addresses
Data
Padding
Options
32. Source and Destination are 16-bit TCP port numbers (IP
addresses are implied by the IP header)
If no options, Data Offset = 5 (which means 20 octets)
Layer 4 - TCP segment
Source Port Destination Port
Sequence Number
Acknowledgement Number
Data
Offset
Window
Reserved A
C
K
U
R
G
E
O
L
R
S
T
S
Y
N
F
I
N
Checksum Urgent Pointer
Data
Padding
Options
33. Client Server Architecture
simple example layer 7 protocol: HTTP
Client makes requests, Server serves requests – e.g
HTTP for transferring “websites”. This is the easiest
way to provide services on demand and provides a
means of sharing resources more effectively.
Example: Mimicking the browser with telnet (client)
talking to a web server (server)
– telnet www.google.com 80
– GET / HTTP/1.1
– Host: www.google.com
35. Purpose of an IP address
Unique Identification of
– Source
Sometimes used for security or policy-based
filtering of data
– Destination
So the networks know where to send the data
Network Independent Format
– IP over anything
36. Purpose of an IP Address
Identifies a machine’s connection to a network
Physically moving a machine from one network
to another requires changing the IP address
TCP/IP uses unique 32-bit addresses
37. Basic Structure of an IP Address
133 27 162 125
10000101 00011011 10100010 01111101
85 1B A2 7D
32 bit number (4 octet number):
(e.g. 133.27.162.125)
Decimal Representation:
Binary Representation:
Hexadecimal Representation:
38. IP Address Allocation
Private IP address ranges:
– 10/8 (10.0.0.0 – 10.255.255.255)
– 192.168/16 (192.168.0.0 – 192.168.255.255)
– 172.16/12 (172.16.0.0 – 172.31.255.255)
Public IP address space
– Assigned by an appropriate authority such as RIPE, ARIN, AFRINIC,
etc. or Local Internet Registries (LIRs)
– Public Address space for the Africa Region available from AfriNIC
Choose a small block from whatever range you have, and
subnet your networks (to avoid problems with broadcasts)
39. Addressing in Internetworks
The problem we have
– More than one physical network
– Different Locations
– Larger number of computers
Need structure in IP addresses
– network part identifies which network in the
internetwork (e.g. the Internet)
– host part identifies host on that network
40. Address Structure Revisited
Hierarchical Division in IPAddress:
– Network Part (Prefix)
» describes which physical network
– Host Part (Host Address)
» describes which host on that network
– Boundary can be anywhere
» very often NOT at a multiple of 8 bits
Network Host
205 . 154 . 8 1
11001101 10011010 00001000 00000001
41. Network Masks
Network Masks help define which bits are used to
describe the Network Part and which for hosts
Different Representations:
– decimal dot notation: 255.255.224.0
– binary: 11111111 11111111 11100000 00000000
– hexadecimal: 0xFFFFE000
– number of network bits: /19
Binary AND of 32 bit IP address with 32 bit netmask
yields network part of address
42. Classless Addressing
IP address with the subnet mask defines the
range of addresses in the block
– E.g 10.1.1.32/28 (subnet mask 255.255.255.240)
defines the range 10.1.1.32 to 10.1.1.47
– 10.1.1.32 is the network address
– 10.1.1.47 is the broadcast address
– 10.1.1.33 ->46 assignable addresses
43. Forwarding
Computers can only send packets directly to other
computers on their subnet
If the destination computer is not on the same subnet,
packets are sent via a “gateway”
defaultrouter option in /etc/rc.conf sets the default
gateway for this system.
IP forwarding on a FreeBSD box
– turned on with the gateway_enable option in /etc/rc.conf
otherwise the box will not forward packets from one
interface to another.
44. How DNS fits
Computers use IP Addresses but Humans find
names easier to remember
DNS provides a mapping of IP Addresses to
names and vice versa
Computers may be moved between networks,
in which case their IP address will change BUT
their names can remain the same