SlideShare a Scribd company logo
1 of 26
What is a Network ?





A network is a collection of computers and devices connected by
communications channels that facilitates communications among
users and allows users to share resources with other users.
The connectivity can be wired or wireless.
Networks are built with a mix of computer hardware and
computer software.
Network Classification


By Range:






By Functional Relationship:




Local Area Network ( LAN )
Metropolitan Area Network ( MAN )
Wide Area Network ( WAN )
Personal Area Network ( PAN )
Client-Server
Peer to Peer

By Network Topology:



Bus Networks
Star Networks
Ring Networks
Routing





Routing (or routeing) is the process of selecting
paths in a network along which to send network
traffic.
primarily with routing in electronic data
networks using packet switching technology.
Routing process usually directs forwarding of
packets on the basis of routing tables which
maintain a record of the routes to various
network destinations.
Classification of Routing
Based on the route telling scheme to the router
 Static Routing
Routing tables are manually configured.
 The advantage of this routing type is maximum
computing resources are saved but are conditioned.




Dynamic Routing
Routing tables are constructed automatically, based on
information carried by routing protocols.
 Dynamic routing dominates the Internet because it allows
the network to act nearly autonomous in avoiding
network failures and blockages.

Dynamic Routing


Distance Vector






This approach assigns a number, the cost, to each of the links
between each node in the network.
Nodes will send information from point A to point B via the path
that results in the lowest total cost.

Link State






Each node uses as its fundamental data a map of the network in the
form of a graph.
Each router then independently determines the least-cost path from
itself to every other node using a standard shortest path algorithm
such as Dijkstra's algorithm.
The result is a tree which serves to construct the routing table, which
specifies the best next hop to get from the current node to any other
node.
Major Routing Protocols




Routing Information Protocol ( RIP )
Open Shortest Path First ( OSPF)
External Interior Gateway Routing Protocol
( EIGRP )
RIP
Random Facts:Is a Dynamic Routing Protocol
 Uses Distance Vector Routing algorithm
 RIP updates are used as keep alives and are periodic
 Routing table is sent as updates
 Hello Timer is 30 seconds
 Dead(flush) Timer is 240 seconds i.e. 8 consecutive packets
 Updates are UDP based and uses destination port no. 520
 Hop Count is used as the metric
 RIP v1 does not support subnetting
 RIP v2 supports subnetting

OSPF
Random Facts:Is a Link State Routing Protocol
 OSPF Hello Packets are used as keep alives
 Hello Timer is 10 seconds
 Dead Timers is 40 seconds i.e. 4 consecutive Hello Packets
 Information of networks is sent only during neighbourship
establishment
 Metric = cost = 100/Bandwidth in Mbps
 Linked State Database(LSD) is formed from the Link State
Updates(LSU), from which graph of whole network is created
 Auto-summarization is OFF by default

Access Lists









Is a group of permit/deny statements
The list is scanned from top to bottom--in the exact order that it
was entered for a pattern that matches the incoming packet
Can use a mask, which is like a wild card, to determine how
much of an IP source or destination address to apply to the
pattern match
To make a change, we have to re-enter the entire list
Any packet not processed by the list is dropped by default.
Is associated with an interface of the router, where we want to
filter the traffic.
Can be INBOUND i.e. applied for incoming traffic or
OUTBOUND i.e. applied for outgoing traffic of an interface
Types of Access List


Standard
Operates on the Network Layer (Layer 3)of the OSI model
 Used to block/permit networks from reaching other networks
based on the source ip addresses and mask
 Uses Access List range from 1 to 99




Extended
Operates on both Layer 3 and Layer 4 of OSI model
 Allow us to filter traffic not only by network address but also by
the type of traffic that is being sent or received and also on the
basis of source as well as destination ip addresses and mask
 Uses Access List Range from 100 to 199

Domain Name System( DNS)









Standard technology for managing the names of Web
sites and other Internet domain
DNS server is any computer registered to join the
Domain Name System
DNS server runs special-purpose networking software,
features a public ip address, and contains a database of
network names and addresses for other Internet hosts
DNS servers are organized in a hierarchy
At the top level of the hierarchy, so-called root
servers store the complete database of Internet domain
names and their corresponding IP addresses
DNS networking is based on
the client/serrver architecture
Case Study: College Network
Certain Facts:The concepts of networking used to demonstrate and configure the networks are as
follows: Routing Protocols





Access-Lists





Link State Routing Protocol ( OSPF )
Distance Vector Routing Protocol ( RIP )
Standard
Extended

Domain Name System

The elements of networks used in the configuration are as follows: Routers ( Cisco 2811)
 Switches ( Cisco 2960 24 TT )
 Network Cables






Serial cables
Straight Ethernet Cables
Crossover Ethernet Cables

Servers
Constraints on the Network:





The DNS server is located in another Autonomous
System. We have to make sure that all users in the
college network get access to the DNS server.
Perform sufficient configuration at appropriate
places so that only the users in Department 1 get
access to the College web server.
Enable internet access for all the clients except
PC5 and PC6 in Department 2
Explanation: College Network








The college network comprises an autonomous system
which uses OSPF which is a Link State Routing
Protocol.
There are 2 routers used in the network.
10.0.0.0/8 network is used for connecting computers of
department 1, thus using class A private addresses.
192.168.21.0/24 network is used for connecting
computers of department 2, thus using class C private
addresses.
The College Server uses 22.0.0.0/8 network
OSPF Network Topology:-
Configuration of OSPF on Routers


To turn ON OSPF process globally on a router

Router# configure terminal
Router(conf)# router OSPF <process id>


Select the interfaces(networks) which we want to advertise

Router 1(conf-router)# network 10.0.0.0 0.255.255.255 area 0

10.0.0.0 – The network which we want to advertise and enable routing on.
0.255.255.255 – Wild Card Mask, allowing certain ip addresses to be
advertised.
Area 0 – The area ID, identifying all the machines in an area.
Routes at the College Router
The result of ‘show ip route’ command on College Router is:R2#show ip route
O 10.0.0.0/8 [110/65] via 20.0.0.1, 00:58:11, Serial0/1/1
C 20.0.0.0/8 is directly connected, Serial0/1/1
C 22.0.0.0/8 is directly connected, FastEthernet0/0
C 23.0.0.0/8 is directly connected, Serial0/1/0
O 30.0.0.0/8 [110/65] via 23.0.0.2, 00:58:11, Serial0/1/0
O E2 34.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0
O E2 35.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0
O E2 45.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0
O E2 56.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0
C 192.168.21.0/24 is directly connected, FastEthernet0/1
O*E2 0.0.0.0/0 [110/1] via 23.0.0.2, 00:58:11, Serial0/1/0
RIP Network Topology
(used by the ISP)
Configuration of RIP on Routers


To turn ON RIP process globally on a router

Router4# configure terminal
Router4(conf)# router RIP


Select the interfaces(networks) which we want to advertise

Router 4(conf-router)# network 34.0.0.0
Router 4(conf-router)# network 45.0.0.0

10.0.0.0 – The network which we want to advertise and enable routing on.
Routes at the ISP Router
The result of ‘show ip route’ command on an ISP Router is:R4#show ip route
R 10.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1
[120/2] via 45.0.0.1, 00:00:00, Serial0/0/0
R 20.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1
[120/2] via 45.0.0.1, 00:00:00, Serial0/0/0
R 22.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1
[120/2] via 45.0.0.1, 00:00:00, Serial0/0/0
R 23.0.0.0/8 [120/2] via 34.0.0.1, 00:00:24, Serial0/1/1
R 30.0.0.0/8 [120/2] via 34.0.0.1, 00:00:24, Serial0/1/1
C 34.0.0.0/8 is directly connected, Serial0/1/1
C 45.0.0.0/8 is directly connected, Serial0/0/0
R 56.0.0.0/8 [120/1] via 45.0.0.1, 00:00:00, Serial0/0/0
R 192.168.21.0/24 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1
[120/2] via 45.0.0.1, 00:00:00, Serial0/0/0
R* 0.0.0.0/0 [120/1] via 45.0.0.1, 00:00:00, Serial0/0/0
The TCP/IP configuration of computers:-
Entries in the DNS Server:-
Entries of Access Lists:

Access List 100 used for applying the second constraint
R2#show ip access-lists 100
Extended IP access list 100
deny tcp host 192.168.21.50 host 60.0.0.60
deny tcp host 192.168.21.60 host 60.0.0.60
deny tcp host 192.168.21.60 host 70.0.0.70
deny tcp host 192.168.21.50 host 70.0.0.70
permit ip any any



Access List 101 used for applying the third constraint
R2#show ip access-lists 101
Extended IP access list 101
permit ip 10.0.0.0 0.255.255.255 host 22.0.0.2
deny ip any any
Different parts of an Access List
deny tcp host 192.168.21.50 host 60.0.0.60
Deny – Specifies the permission whether to permit/deny the access
Tcp – This specifies the type of traffic we want to permit/deny
The type of traffic we can control is:IP – Represents all the traffic flowing on the internet.
TCP – Represents only the packets which use Transmission Control Protocol
UDP - Represents only the packets which use the User Datagram Protocol
ICMP - Represents only the packets which use Internet Control Message Protocol
Host 192.168.21.50 – This section specifies the source machine we want to control
access to
Host 60.0.0.60 - This section specifies the destination machine we want to control
access to
Instead, if we want to control the access to all the machines, we do it by writing ‘any’
like:-

Permit ip any any
Thank You!!!

More Related Content

What's hot

EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTINGMosin A
 
Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016Merima Kulin
 
BIG DATA-Seminar Report
BIG DATA-Seminar ReportBIG DATA-Seminar Report
BIG DATA-Seminar Reportjosnapv
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AIPaul O'Hagan
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranaviVerma
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 

What's hot (20)

Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 
Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
BIG DATA-Seminar Report
BIG DATA-Seminar ReportBIG DATA-Seminar Report
BIG DATA-Seminar Report
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
Cs
CsCs
Cs
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
5G technology
5G technology5G technology
5G technology
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 

Viewers also liked

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111girlfrida
 
Anorexia y Bulimia
Anorexia y BulimiaAnorexia y Bulimia
Anorexia y BulimiaBachicmc1A
 
OpenTouch: the Unified Communication Solution of Choice
OpenTouch: the Unified Communication Solution of ChoiceOpenTouch: the Unified Communication Solution of Choice
OpenTouch: the Unified Communication Solution of ChoiceAlcatel-Lucent Enterprise
 
Excellent Fabrics Used For Compression Tights
Excellent Fabrics Used For Compression TightsExcellent Fabrics Used For Compression Tights
Excellent Fabrics Used For Compression TightsVIE ACTIVE
 
User guide wordpress edisi android
User guide wordpress edisi androidUser guide wordpress edisi android
User guide wordpress edisi androidresarahadian
 
Tecniche di raccomandazione automatica per la sottomissione di articoli scien...
Tecniche di raccomandazione automatica per la sottomissione di articoli scien...Tecniche di raccomandazione automatica per la sottomissione di articoli scien...
Tecniche di raccomandazione automatica per la sottomissione di articoli scien...GiulioPic
 
Multiplication of binomials
Multiplication of binomialsMultiplication of binomials
Multiplication of binomialsDenjie Magrimbao
 
HNC | HND Graphic Design course summary
HNC | HND Graphic Design course summaryHNC | HND Graphic Design course summary
HNC | HND Graphic Design course summarysullivanlaura
 
Union Suisse Spring :: Co-Creation
Union Suisse Spring :: Co-CreationUnion Suisse Spring :: Co-Creation
Union Suisse Spring :: Co-CreationCatalyx
 
Hz study internationalisationaerosuppliers
Hz study internationalisationaerosuppliersHz study internationalisationaerosuppliers
Hz study internationalisationaerosuppliersEugenio Fontán
 
Brand Whiz Digital Presentation
Brand Whiz Digital PresentationBrand Whiz Digital Presentation
Brand Whiz Digital PresentationWhiz Chic
 
BIT 201 Carta Decano y Portada
BIT 201 Carta Decano y PortadaBIT 201 Carta Decano y Portada
BIT 201 Carta Decano y PortadaEugenio Fontán
 
6.2 use proportions to solve geometry problems
6.2 use proportions to solve geometry problems6.2 use proportions to solve geometry problems
6.2 use proportions to solve geometry problemsdetwilerr
 
Angela Low, Social innovation research assignment
Angela Low, Social innovation research assignmentAngela Low, Social innovation research assignment
Angela Low, Social innovation research assignmentAngela Low
 
Features And Types Of Documentaries
Features And Types Of DocumentariesFeatures And Types Of Documentaries
Features And Types Of DocumentariesJoe Toyer
 
14 01 22 madrid aerospace cluster presentation v 2
14 01 22 madrid aerospace cluster presentation v 214 01 22 madrid aerospace cluster presentation v 2
14 01 22 madrid aerospace cluster presentation v 2Eugenio Fontán
 

Viewers also liked (20)

Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111
 
Anorexia y Bulimia
Anorexia y BulimiaAnorexia y Bulimia
Anorexia y Bulimia
 
OpenTouch: the Unified Communication Solution of Choice
OpenTouch: the Unified Communication Solution of ChoiceOpenTouch: the Unified Communication Solution of Choice
OpenTouch: the Unified Communication Solution of Choice
 
Excellent Fabrics Used For Compression Tights
Excellent Fabrics Used For Compression TightsExcellent Fabrics Used For Compression Tights
Excellent Fabrics Used For Compression Tights
 
Guida+n3 08
Guida+n3 08Guida+n3 08
Guida+n3 08
 
Artist case study
Artist case studyArtist case study
Artist case study
 
User guide wordpress edisi android
User guide wordpress edisi androidUser guide wordpress edisi android
User guide wordpress edisi android
 
Rff
RffRff
Rff
 
Magazine analysis
Magazine analysisMagazine analysis
Magazine analysis
 
Tecniche di raccomandazione automatica per la sottomissione di articoli scien...
Tecniche di raccomandazione automatica per la sottomissione di articoli scien...Tecniche di raccomandazione automatica per la sottomissione di articoli scien...
Tecniche di raccomandazione automatica per la sottomissione di articoli scien...
 
Multiplication of binomials
Multiplication of binomialsMultiplication of binomials
Multiplication of binomials
 
HNC | HND Graphic Design course summary
HNC | HND Graphic Design course summaryHNC | HND Graphic Design course summary
HNC | HND Graphic Design course summary
 
Union Suisse Spring :: Co-Creation
Union Suisse Spring :: Co-CreationUnion Suisse Spring :: Co-Creation
Union Suisse Spring :: Co-Creation
 
Hz study internationalisationaerosuppliers
Hz study internationalisationaerosuppliersHz study internationalisationaerosuppliers
Hz study internationalisationaerosuppliers
 
Brand Whiz Digital Presentation
Brand Whiz Digital PresentationBrand Whiz Digital Presentation
Brand Whiz Digital Presentation
 
BIT 201 Carta Decano y Portada
BIT 201 Carta Decano y PortadaBIT 201 Carta Decano y Portada
BIT 201 Carta Decano y Portada
 
6.2 use proportions to solve geometry problems
6.2 use proportions to solve geometry problems6.2 use proportions to solve geometry problems
6.2 use proportions to solve geometry problems
 
Angela Low, Social innovation research assignment
Angela Low, Social innovation research assignmentAngela Low, Social innovation research assignment
Angela Low, Social innovation research assignment
 
Features And Types Of Documentaries
Features And Types Of DocumentariesFeatures And Types Of Documentaries
Features And Types Of Documentaries
 
14 01 22 madrid aerospace cluster presentation v 2
14 01 22 madrid aerospace cluster presentation v 214 01 22 madrid aerospace cluster presentation v 2
14 01 22 madrid aerospace cluster presentation v 2
 

Similar to Networking in college

Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01amit singh
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Wa ns and routers
Wa ns and routersWa ns and routers
Wa ns and routersKevin Bhola
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systemskingGovindi
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questionsrajasekar1712
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayshubham katiyar
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayshubham katiyar
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 

Similar to Networking in college (20)

Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
 
Group 1
Group 1Group 1
Group 1
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Ospf
OspfOspf
Ospf
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Wa ns and routers
Wa ns and routersWa ns and routers
Wa ns and routers
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelay
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelay
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
Presentasi cisco
Presentasi ciscoPresentasi cisco
Presentasi cisco
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Networking in college

  • 1. What is a Network ?    A network is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. The connectivity can be wired or wireless. Networks are built with a mix of computer hardware and computer software.
  • 2. Network Classification  By Range:     By Functional Relationship:   Local Area Network ( LAN ) Metropolitan Area Network ( MAN ) Wide Area Network ( WAN ) Personal Area Network ( PAN ) Client-Server Peer to Peer By Network Topology:   Bus Networks Star Networks Ring Networks
  • 3. Routing    Routing (or routeing) is the process of selecting paths in a network along which to send network traffic. primarily with routing in electronic data networks using packet switching technology. Routing process usually directs forwarding of packets on the basis of routing tables which maintain a record of the routes to various network destinations.
  • 4. Classification of Routing Based on the route telling scheme to the router  Static Routing Routing tables are manually configured.  The advantage of this routing type is maximum computing resources are saved but are conditioned.   Dynamic Routing Routing tables are constructed automatically, based on information carried by routing protocols.  Dynamic routing dominates the Internet because it allows the network to act nearly autonomous in avoiding network failures and blockages. 
  • 5. Dynamic Routing  Distance Vector    This approach assigns a number, the cost, to each of the links between each node in the network. Nodes will send information from point A to point B via the path that results in the lowest total cost. Link State    Each node uses as its fundamental data a map of the network in the form of a graph. Each router then independently determines the least-cost path from itself to every other node using a standard shortest path algorithm such as Dijkstra's algorithm. The result is a tree which serves to construct the routing table, which specifies the best next hop to get from the current node to any other node.
  • 6. Major Routing Protocols    Routing Information Protocol ( RIP ) Open Shortest Path First ( OSPF) External Interior Gateway Routing Protocol ( EIGRP )
  • 7. RIP Random Facts:Is a Dynamic Routing Protocol  Uses Distance Vector Routing algorithm  RIP updates are used as keep alives and are periodic  Routing table is sent as updates  Hello Timer is 30 seconds  Dead(flush) Timer is 240 seconds i.e. 8 consecutive packets  Updates are UDP based and uses destination port no. 520  Hop Count is used as the metric  RIP v1 does not support subnetting  RIP v2 supports subnetting 
  • 8. OSPF Random Facts:Is a Link State Routing Protocol  OSPF Hello Packets are used as keep alives  Hello Timer is 10 seconds  Dead Timers is 40 seconds i.e. 4 consecutive Hello Packets  Information of networks is sent only during neighbourship establishment  Metric = cost = 100/Bandwidth in Mbps  Linked State Database(LSD) is formed from the Link State Updates(LSU), from which graph of whole network is created  Auto-summarization is OFF by default 
  • 9. Access Lists        Is a group of permit/deny statements The list is scanned from top to bottom--in the exact order that it was entered for a pattern that matches the incoming packet Can use a mask, which is like a wild card, to determine how much of an IP source or destination address to apply to the pattern match To make a change, we have to re-enter the entire list Any packet not processed by the list is dropped by default. Is associated with an interface of the router, where we want to filter the traffic. Can be INBOUND i.e. applied for incoming traffic or OUTBOUND i.e. applied for outgoing traffic of an interface
  • 10. Types of Access List  Standard Operates on the Network Layer (Layer 3)of the OSI model  Used to block/permit networks from reaching other networks based on the source ip addresses and mask  Uses Access List range from 1 to 99   Extended Operates on both Layer 3 and Layer 4 of OSI model  Allow us to filter traffic not only by network address but also by the type of traffic that is being sent or received and also on the basis of source as well as destination ip addresses and mask  Uses Access List Range from 100 to 199 
  • 11. Domain Name System( DNS)       Standard technology for managing the names of Web sites and other Internet domain DNS server is any computer registered to join the Domain Name System DNS server runs special-purpose networking software, features a public ip address, and contains a database of network names and addresses for other Internet hosts DNS servers are organized in a hierarchy At the top level of the hierarchy, so-called root servers store the complete database of Internet domain names and their corresponding IP addresses DNS networking is based on the client/serrver architecture
  • 13. Certain Facts:The concepts of networking used to demonstrate and configure the networks are as follows: Routing Protocols    Access-Lists    Link State Routing Protocol ( OSPF ) Distance Vector Routing Protocol ( RIP ) Standard Extended Domain Name System The elements of networks used in the configuration are as follows: Routers ( Cisco 2811)  Switches ( Cisco 2960 24 TT )  Network Cables     Serial cables Straight Ethernet Cables Crossover Ethernet Cables Servers
  • 14. Constraints on the Network:   The DNS server is located in another Autonomous System. We have to make sure that all users in the college network get access to the DNS server. Perform sufficient configuration at appropriate places so that only the users in Department 1 get access to the College web server. Enable internet access for all the clients except PC5 and PC6 in Department 2
  • 15. Explanation: College Network      The college network comprises an autonomous system which uses OSPF which is a Link State Routing Protocol. There are 2 routers used in the network. 10.0.0.0/8 network is used for connecting computers of department 1, thus using class A private addresses. 192.168.21.0/24 network is used for connecting computers of department 2, thus using class C private addresses. The College Server uses 22.0.0.0/8 network
  • 17. Configuration of OSPF on Routers  To turn ON OSPF process globally on a router Router# configure terminal Router(conf)# router OSPF <process id>  Select the interfaces(networks) which we want to advertise Router 1(conf-router)# network 10.0.0.0 0.255.255.255 area 0 10.0.0.0 – The network which we want to advertise and enable routing on. 0.255.255.255 – Wild Card Mask, allowing certain ip addresses to be advertised. Area 0 – The area ID, identifying all the machines in an area.
  • 18. Routes at the College Router The result of ‘show ip route’ command on College Router is:R2#show ip route O 10.0.0.0/8 [110/65] via 20.0.0.1, 00:58:11, Serial0/1/1 C 20.0.0.0/8 is directly connected, Serial0/1/1 C 22.0.0.0/8 is directly connected, FastEthernet0/0 C 23.0.0.0/8 is directly connected, Serial0/1/0 O 30.0.0.0/8 [110/65] via 23.0.0.2, 00:58:11, Serial0/1/0 O E2 34.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0 O E2 35.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0 O E2 45.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0 O E2 56.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0 C 192.168.21.0/24 is directly connected, FastEthernet0/1 O*E2 0.0.0.0/0 [110/1] via 23.0.0.2, 00:58:11, Serial0/1/0
  • 20. Configuration of RIP on Routers  To turn ON RIP process globally on a router Router4# configure terminal Router4(conf)# router RIP  Select the interfaces(networks) which we want to advertise Router 4(conf-router)# network 34.0.0.0 Router 4(conf-router)# network 45.0.0.0 10.0.0.0 – The network which we want to advertise and enable routing on.
  • 21. Routes at the ISP Router The result of ‘show ip route’ command on an ISP Router is:R4#show ip route R 10.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0 R 20.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0 R 22.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0 R 23.0.0.0/8 [120/2] via 34.0.0.1, 00:00:24, Serial0/1/1 R 30.0.0.0/8 [120/2] via 34.0.0.1, 00:00:24, Serial0/1/1 C 34.0.0.0/8 is directly connected, Serial0/1/1 C 45.0.0.0/8 is directly connected, Serial0/0/0 R 56.0.0.0/8 [120/1] via 45.0.0.1, 00:00:00, Serial0/0/0 R 192.168.21.0/24 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0 R* 0.0.0.0/0 [120/1] via 45.0.0.1, 00:00:00, Serial0/0/0
  • 22. The TCP/IP configuration of computers:-
  • 23. Entries in the DNS Server:-
  • 24. Entries of Access Lists: Access List 100 used for applying the second constraint R2#show ip access-lists 100 Extended IP access list 100 deny tcp host 192.168.21.50 host 60.0.0.60 deny tcp host 192.168.21.60 host 60.0.0.60 deny tcp host 192.168.21.60 host 70.0.0.70 deny tcp host 192.168.21.50 host 70.0.0.70 permit ip any any  Access List 101 used for applying the third constraint R2#show ip access-lists 101 Extended IP access list 101 permit ip 10.0.0.0 0.255.255.255 host 22.0.0.2 deny ip any any
  • 25. Different parts of an Access List deny tcp host 192.168.21.50 host 60.0.0.60 Deny – Specifies the permission whether to permit/deny the access Tcp – This specifies the type of traffic we want to permit/deny The type of traffic we can control is:IP – Represents all the traffic flowing on the internet. TCP – Represents only the packets which use Transmission Control Protocol UDP - Represents only the packets which use the User Datagram Protocol ICMP - Represents only the packets which use Internet Control Message Protocol Host 192.168.21.50 – This section specifies the source machine we want to control access to Host 60.0.0.60 - This section specifies the destination machine we want to control access to Instead, if we want to control the access to all the machines, we do it by writing ‘any’ like:- Permit ip any any