Summer Youth Program: Computer/Network Architecture and Security.

120
Summer Youth Program: Summer Youth Program: Computer/Network Computer/Network Architecture and Architecture and Security Security
  • date post

    21-Dec-2015
  • Category

    Documents

  • view

    217
  • download

    0

Transcript of Summer Youth Program: Computer/Network Architecture and Security.

Page 1: Summer Youth Program: Computer/Network Architecture and Security.

Summer Youth Program: Summer Youth Program: Computer/Network Computer/Network Architecture and SecurityArchitecture and Security

Page 2: Summer Youth Program: Computer/Network Architecture and Security.

Introduction to NetworkingIntroduction to Networking

Objectives:Understand the physical connection that has to take place for a computer to connect to the Internet.Recognize the components that comprise the computer.Install and troubleshoot network interface cards and/or modems.Use basic testing procedures to test the Internet connection.Demonstrate a basic understanding of the use of web browsers and plug-ins.

Page 3: Summer Youth Program: Computer/Network Architecture and Security.

Internet Connection RequirementsInternet Connection RequirementsInternet is the largest data network on earth

Consists of many large and small networks that are interconnected Individual computers are the sources and destinations of information through the Internet

Connection to the Internet can be broken down into three parts:

Physical connection

Logical connection

Applications

Page 4: Summer Youth Program: Computer/Network Architecture and Security.

Computer BasicsComputer BasicsElectronic Components

Transistor, Integrated circuit (IC), Resistor, Capacitor, Connector, and Light emitting diode (LED)

PC SubsystemsPrinted circuit board, CD-ROM drive, Central processing unit (CPU), Floppy drive, Hard drive, Microprocessor, Motherboard, Bus, Random-access memory (RAM), Read-only memory (ROM), System unit, Expansion slot, Power supply,

Backplane componentsNetwork interface card (NIC), Video card, Audio card, Parallel port, Serial port, Mouse port, Power cord

Page 5: Summer Youth Program: Computer/Network Architecture and Security.

Network Interface CardNetwork Interface Card

A NIC, or LAN adapter, provides network communication capabilities to and from a PCThese considerations are importantin the selection of a NIC:

Protocols – Ethernet, Token Ring, or FDDI Types of media – Twisted-pair, coaxial, wireless, or fiber-optic Type of system bus – PCI or ISA

Page 6: Summer Youth Program: Computer/Network Architecture and Security.

NIC’s & ModemsNIC’s & ModemsA modem, or modulator-demodulator,has two main functions:

provides the computer with connectivity toa telephone lineconverts data from a digital signal to an analogsignal that is compatible with a standard phone line

A NIC provides a network interface for each hostSituations that require NIC installation include the following:

Installation of a NIC on a PC that does not already have one Replacement of a malfunctioning or damaged NIC Upgrade from a 10-Mbps NIC to a 10/100/1000-Mbps NIC Change to a different type of NIC, such as wireless Installation of a secondary, or backup, NIC for network security reasons

Page 7: Summer Youth Program: Computer/Network Architecture and Security.

Internet Connections for ConsumersInternet Connections for Consumers

Requires use of a Modem

Dial-up – slow

Always on High Speed Connections

DSL – Verizon

Cable – Comcast, Charter, Road-Runner

Page 8: Summer Youth Program: Computer/Network Architecture and Security.

TCP/IPTCP/IP

TCP/IP

The operating system tools must be used to configure TCP/IP on a workstation

Page 9: Summer Youth Program: Computer/Network Architecture and Security.

Testing Connectivity with PingTesting Connectivity with PingPing is a basic program that verifies a particular IP address exists and can accept requests.Ping stands for Packet Internet or Inter-Network Groper.How can ping be used?

ping 127.0.0.1 - loopback test. It verifies the operation of the TCP/IP stack and NIC transmit/receive function.ping host computer IP address - verifies the TCP/IP address configuration for the local host and connectivity to the host.ping default-gateway IP address - verifies whether the router that connects the local network to other networks can be reached.ping remote destination IP address - verifies connectivity to a remote host.

Page 10: Summer Youth Program: Computer/Network Architecture and Security.

Information & TestingInformation & Testing

NIC MAC Address Verificationhttp://standards.ieee.org/regauth/oui/index.shtml

Traceroute Site:http://www.traceroute.orghttp://www.traceroute.org

Page 11: Summer Youth Program: Computer/Network Architecture and Security.

Web Browsers and Plug-insWeb Browsers and Plug-insA Web browser is software that interprets HTML, which is one of the languages used to code Web page content.

Two of the most popular Web browsers are Internet Explorer (IE), Netscape Communicator, and FireFox

Plug-ins are applications that work with the browser to launch the programsrequired to view special files:

Flash – Plays multimedia files created by Macromedia Flash

Quicktime – Plays video files created by Apple

Real Player – Plays audio files

Page 12: Summer Youth Program: Computer/Network Architecture and Security.

IE vs. FireFoxIE vs. FireFoxFireFox and all other Mozilla-based products are FireFox and all other Mozilla-based products are generally more secure than IEgenerally more secure than IE

Reasons:Reasons: It is not integrated with Windows, which helps It is not integrated with Windows, which helps prevent viruses and hackers from causing prevent viruses and hackers from causing damage if they somehow manage to compromise damage if they somehow manage to compromise FireFox.FireFox.There is no support for VBScript and ActiveX, two There is no support for VBScript and ActiveX, two technologies which are the reasons for many IE technologies which are the reasons for many IE security holes.security holes.No spyware/adware software can automatically No spyware/adware software can automatically install in FireFox just by visiting a web site.install in FireFox just by visiting a web site.FireFox doesn't use Microsoft's Java VM, which FireFox doesn't use Microsoft's Java VM, which has a history of more flaws than other Java VMs.has a history of more flaws than other Java VMs.You have complete control over cookies.You have complete control over cookies.

Page 13: Summer Youth Program: Computer/Network Architecture and Security.

Data Networks CreationData Networks CreationData networks developed as a result of businesses and Data networks developed as a result of businesses and governments agencies needing to exchange electronic governments agencies needing to exchange electronic information across long distances.information across long distances.

Businesses needed solution to:Businesses needed solution to:

How to avoid duplication of equipment and How to avoid duplication of equipment and resourcesresources

How to communicate efficientlyHow to communicate efficiently

How to set up and manage a networkHow to set up and manage a network

Page 14: Summer Youth Program: Computer/Network Architecture and Security.

The Creation of StandardsThe Creation of Standards One solution to incompatibility was to One solution to incompatibility was to

create standards within Local Area create standards within Local Area Neworks (LANs)Neworks (LANs)

LANs limitations prompted (Metropolitan LANs limitations prompted (Metropolitan Area Networks) MANs and (Wide Area Area Networks) MANs and (Wide Area Networks) WANsNetworks) WANs

Page 15: Summer Youth Program: Computer/Network Architecture and Security.

Data Networks with Respect to Data Networks with Respect to DistancesDistances

Page 16: Summer Youth Program: Computer/Network Architecture and Security.

Networking DevicesNetworking Devices

Page 17: Summer Youth Program: Computer/Network Architecture and Security.

Networking Devices:Networking Devices:Repeaters and HubsRepeaters and Hubs

Repeaters

Hubs

Page 18: Summer Youth Program: Computer/Network Architecture and Security.

Networking Devices:Networking Devices:NICs and BridgesNICs and Bridges

Bridges

NICS

Page 19: Summer Youth Program: Computer/Network Architecture and Security.

Networking Devices: Networking Devices: SwitchesSwitches

                  

Switches

Page 20: Summer Youth Program: Computer/Network Architecture and Security.

Networking Devices - RoutersNetworking Devices - Routers

Routers

Page 21: Summer Youth Program: Computer/Network Architecture and Security.

Network TopologyNetwork Topology

Page 22: Summer Youth Program: Computer/Network Architecture and Security.

Network Topology:Network Topology:Bus & Star TopologyBus & Star Topology

BUS TOPOLOGY

STAR TOPOLOGY

Page 23: Summer Youth Program: Computer/Network Architecture and Security.

Network Topology: Network Topology: Ring TopologyRing Topology

RING TOPOLOGY

Page 24: Summer Youth Program: Computer/Network Architecture and Security.

Network Topology Cont:Network Topology Cont:Partial & Full MeshPartial & Full Mesh

Partial Mesh Full Mesh

Page 25: Summer Youth Program: Computer/Network Architecture and Security.

MS VISIO MS VISIO Creating Network DiagramsCreating Network Diagrams

Page 26: Summer Youth Program: Computer/Network Architecture and Security.

MS Visio MS Visio Network ExampleNetwork Example

MaxProLABORATORIES, INC. S ilico n G ra p h ics

C om put er S y s t em s

XL SERIES

POWE

R

1 2 3

5 64

987

#0*

ABC DEF

GHI JKL MNO

PRS TUV WXY

1 2 3

4 5 6

A4 LTR

TONE

ALARM

OPER SYMBOLSSTOP

START/COPY

CODED DIAL

REDIAL/PAUSE RECEIVE MODE RESOLUTION

FUNCTION CARTRIDGE RESUME

PRINTERRESET

< >

Designed by:

Microsof tWindows NTWindows 95

ÒÒ

ÒÒ P R O C S S OE R

Ò

MMXä

Ò

Back Space

NumLock

CapsLock

ScrollLock

Enter

Shift

CtrlAltCtrl A lt

Shift

CapsLock

Tab

Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 PrintScroll

SysRq

ScrollLock Pause

Break

NumLock

Enter

+

_*

Designed by:

Microsof tWindows NTWindows 95

ÒÒ

ÒÒ P R O C S S OE R

Ò

MMXä

Ò

Back Space

NumLock

CapsLock

ScrollLock

Enter

Shift

CtrlAltCtrl A lt

Shift

CapsLock

Tab

Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 PrintScroll

SysRq

ScrollLock Pause

Break

NumLock

Enter

+

_*

3645 Main StreetHigh Capacity Bandwidth Manager

NEWBRIDGE

ON

OFF

ON

OFF

PS110A

PS110A

Critical Alarm

Major Alarm

Minor Alarm

FILE SERVER

OMNI SWITCH

EMAIL SERVER

AUTHENTICATION SERVER

PRINTER

AV-CLIENT TELNET CLIENT

Michigan Tech University’sCNSA Progam

CONFIDENTIAL CONFIDENTIALNetwork Diagam

GCH_v.1.47/5/05

Page 27: Summer Youth Program: Computer/Network Architecture and Security.

MS VisioMS VisioNetwork Example #2Network Example #2

IP Cloud

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

SY ST EM S, IN C .ä

Glass-hopper

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

N C X 3E6 Next Generation Networks

System Status

TELECOM

Ethernet Status

Circuit Status

N C X 3E6 Next Generation Networks

System Status

TELECOM

Ethernet Status

Circuit Status

N C X 3E6 Next Generation Networks

System Status

TELECOM

Ethernet Status

Circuit Status

N C X 3E6 Next Generation Networks

System Status

TELECOM

Ethernet Status

Circuit Status

LINE OUT

SYNC

LINE IN

SYNCSTATUS

Technologies Group, Inc.

ISDN Basic Rate InterfaceProtocol Analyzer

Model ISDN 1000PA

LINE OUT

SYNC

LINE IN

SYNCSTATUS

Technologies Group, Inc.

ISDN Basic Rate InterfaceProtocol Analyzer

Model ISDN 1000PA

Glass-hopper

hopperUTP-

SuperStack IISwitch 93 00

SUPERSTACK

3Com

C onsole10 00Base -SX

10 00Base -SX

10 00Base -SX

3C9 30 11

SuperStack IISwitch 93 00

SUPERSTACK

3Com

C onsole10 00Base -SX

10 00Base -SX

10 00Base -SX

3C9 30 11

SuperStack IISwitch 93 00

SUPERSTACK

3Com

C onsole10 00Base -SX

10 00Base -SX

10 00Base -SX

3C9 30 11

SuperStack IISwitch 93 00

SUPERSTACK

3Com

C onsole10 00Base -SX

10 00Base -SX

10 00Base -SX

3C9 30 11

Ethernet Switch

Ethernet Switch Ethernet Switch

Ethernet Switch

Fiber Splitter

Fiber Splitter

Fiber SplitterFiber Splitter

Fiber Splitter

Fiber Splitter

Fiber Splitter

ATM Switch ATM Switch

ATM Switch

ATM Switch

LAN Analyzer LAN Analyzer

Michigan Tech University’sCNSA Progam

Network DiagamCONFIDENTIAL CONFIDENTIAL

GCH_v.2.77/5/05

Page 28: Summer Youth Program: Computer/Network Architecture and Security.

MS VisioMS VisioWAN Architecture ExampleWAN Architecture Example

PORT 3 PORT 4

PORT 2PORT 1

SYN

ALM

PORT 1 PORT 2 PORT 3 PORT 4

MODULE EXPANSION SLOT

Model Serial No. MAC Address10/100 ETH CONSOLE

SYN

ALM

SYN

ALM

SYN

ALM

SYN

ALM

Gateway

Ò

SETUP

OPERATE

1 2ABC

3DEF

4GHI

5JKL

6MNO

7PRS

8TUV

9WXY

* 0OPER

#

EN

TE

R

Ò

CONSOLE ETHERNET ISDN U TEL1 TEL2POWER

PORT 3 PORT 4

PORT 2PORT 1

SYN

ALM

PORT 1 PORT 2 PORT 3 PORT 4

MODULE EXPANSION SLOT

Model Serial No. MAC Address10/100 ETH CONSOLE

SYN

ALM

SYN

ALM

SYN

ALM

SYN

ALM

Gateway

CONSOLE ETHERNET ISDN U TEL1 TEL2POWER

Ò

SETUP

OPERATE

1 2ABC

3DEF

4GHI

5JKL

6MNO

7PRS

8TUV

9WXY

* 0OPER

#

EN

TE

R

Ò

CONSOLE ETHERNET ISDN U TEL1 TEL2POWER

PORT 3 PORT 4

PORT 2PORT 1

SYN

ALM

PORT 1 PORT 2 PORT 3 PORT 4

MODULE EXPANSION SLOT

Model Serial No. MAC Address10/100 ETH CONSOLE

SYN

ALM

SYN

ALM

SYN

ALM

SYN

ALM

Ò

SETUP

OPERATE

1 2ABC

3DEF

4GHI

5JKL

6MNO

7PRS

8TUV

9WXY

* 0OPER

#

EN

TE

R

Ò

PSTN

Data Network

PSTN

1 2ABC

JKLGHI

4 5TUVPRS

7 8

0OPER

3DEF

MNO

6WXY

#

9

1 2 3

4 5 6

7 8 9

* 0 #

ABC DEF

GHI JKL MNO

PQRS TUV WXYZ

Hold Cancel Forward Redial

Super Key Message

1 2ABC

JKLGHI

4 5TUVPRS

7 8

0OPER

3DEF

M NO

6W XY

#

9

PSTN (Auto-switch)Japan to New York

VoIP (On net call)Japan to New York

PSTN (Hop-off call)Japan to United States,Domestic long distance call

Japan New York

California

Router Router

PBX PBX

WAN DIAGRAMCONFIDENTIAL CONFIDENTIAL

Legend

GCH_v.1.27/2/05

Page 29: Summer Youth Program: Computer/Network Architecture and Security.

MS VisioMS VisioSwitch Architecture ExampleSwitch Architecture Example

S il iconG raph ics

O R I G I N 2000

S il iconG raph ics

O R I G I N 2000

N Y X 2O

S il iconG raph ics

S il iconG raph ics

ALARM

CONSOLE

1518 IAD

1 2 3 4 5 6 7 8 9 10 11 12

OutputGood

OutputGood

OutputGood

OutputGood

OutputGood

OutputGood

CHASSIS STATUS

TEMPERATURE FAN POWER SUPPORT SYSTEM

1 2 3 4 5 6

LMPTEST

S1

S2

S3

L1

L2

N

B41

B

S1

S2

L1

L2

H

BCP

8

S1

S2

L1

L2

H

BCP

8

ALARM

CONSOLE

1518 IAD

4200

4200 4200

N Y X 2O

S il iconG raph ics

S il iconG raph ics

N Y X 2O

S il iconG raph ics

S il iconG raph ics

S il iconG raph ics

O R I G I N 2000

S il iconG raph ics

O R I G I N 2000

S il iconG raph ics

O R I G I N 2000

S il iconG raph ics

O R I G I N 2000

Private Intranet

PBXPBX

OMNI SWITCH

PublicT1/E1 TDM

or ATM Network

OmniAccess OmniAccess

Ethernet Network Ethernet Network

PBX

BRANCH OFFICE BRANCH OFFICE

CENTRAL OFFICE

CONFIDENTIAL CONFIDENTIALSWITCHED ETHERNET NETWORK

Public Internet

Page 30: Summer Youth Program: Computer/Network Architecture and Security.

MS VisioMS VisioClient Architecture ExampleClient Architecture Example

ATM

R7

R8

ISDN

R5

R2

S0/0

S0/1

S0/0

S0/2

R6

R9

controller T1 0

controller T1 0

R4

S0

S0/0

S1/1

S0/0

R1

Sw2Sw1

VLAN_B

VLAN_A

VLAN_D

BB1

Frame Relay

VLAN_E

VLAN_C

ATM 138.10.78.0/24

RIP v2

OSPF

EIGRP

EBGP

10/100 Ethernet

ISDN Connection

ATM Connection

Frame Relay Connection

Legend

BB3

Fiber Optic

CONFIDENTIAL CONFIDENTIALSyrex Network Architecture

GCH_ver3.76/11/05

Page 31: Summer Youth Program: Computer/Network Architecture and Security.

Network ProtocolsNetwork Protocols

Page 32: Summer Youth Program: Computer/Network Architecture and Security.

Local-area Networks (LANs)Local-area Networks (LANs)

Page 33: Summer Youth Program: Computer/Network Architecture and Security.

Wide-area Networks (WANs)Wide-area Networks (WANs)

Page 34: Summer Youth Program: Computer/Network Architecture and Security.

MetropolitanMetropolitan--Area Network (MANs)Area Network (MANs)

Page 35: Summer Youth Program: Computer/Network Architecture and Security.

StorageStorage--Area Networks (SANS)Area Networks (SANS)

Page 36: Summer Youth Program: Computer/Network Architecture and Security.

Virtual Private Networks (VPNVirtual Private Networks (VPNss))

Page 37: Summer Youth Program: Computer/Network Architecture and Security.

VPN ArchitecturesVPN Architectures

Client-Initiated Access VPN

NAS-Initiated Access VPN

Page 38: Summer Youth Program: Computer/Network Architecture and Security.

Intranet and Extranet VPNIntranet and Extranet VPN

Page 39: Summer Youth Program: Computer/Network Architecture and Security.

Benefits of VPNsBenefits of VPNs

Page 40: Summer Youth Program: Computer/Network Architecture and Security.

Importance of BandwidthImportance of Bandwidth

• Why is Bandwidth Important?

• What are Bandwidth’s limitations?

• What is Bandwidth’s effect on network performance?

Page 41: Summer Youth Program: Computer/Network Architecture and Security.

Bandwidth Pipe AnalogyBandwidth Pipe Analogy

Page 42: Summer Youth Program: Computer/Network Architecture and Security.

Bandwidth Highway AnalogyBandwidth Highway Analogy

Page 43: Summer Youth Program: Computer/Network Architecture and Security.

Bandwidth MeasurementsBandwidth Measurements

Page 44: Summer Youth Program: Computer/Network Architecture and Security.

Bandwidth LimitationsBandwidth Limitations

Page 45: Summer Youth Program: Computer/Network Architecture and Security.

Bandwidth ThroughputBandwidth Throughput

Page 46: Summer Youth Program: Computer/Network Architecture and Security.

Digital Transfer CalculationDigital Transfer Calculation

Page 47: Summer Youth Program: Computer/Network Architecture and Security.

CablingCablingLANs and WANsLANs and WANs

Page 48: Summer Youth Program: Computer/Network Architecture and Security.

LAN Physical LayerLAN Physical Layer

Page 49: Summer Youth Program: Computer/Network Architecture and Security.

LAN Physical Layer LAN Physical Layer SymbolsSymbols

Page 50: Summer Youth Program: Computer/Network Architecture and Security.

Ethernet on a CampusEthernet on a CampusThere are several ways that Ethernet There are several ways that Ethernet technologies can be used in a campus technologies can be used in a campus network: network:

10Mbps can be used at the user level10Mbps can be used at the user levelClients or servers that require more bandwidth Clients or servers that require more bandwidth can use 100-Mbps Ethernetcan use 100-Mbps EthernetFast Ethernet is used as the link between user Fast Ethernet is used as the link between user and network devices. Fast Ethernet can be used and network devices. Fast Ethernet can be used to connect enterprise servers. to connect enterprise servers. Fast Ethernet or Gigabit Ethernet should be Fast Ethernet or Gigabit Ethernet should be implemented between backbone devices, based implemented between backbone devices, based on affordability. on affordability.

Page 51: Summer Youth Program: Computer/Network Architecture and Security.

Connection MediaConnection Media

Page 52: Summer Youth Program: Computer/Network Architecture and Security.

UTP ImplementationUTP Implementation

Patch Panels used for Organization in Wiring Closets. Sometimes referred to as punch downs.

UTP Cable •8 colored wires•2 twisted pair

Page 53: Summer Youth Program: Computer/Network Architecture and Security.

UTP Implementation ContinuedUTP Implementation Continued

Note: Only 4 wires being used for Tx and

Rx

EIA/TIA T568-A or T568-B Standards

Page 54: Summer Youth Program: Computer/Network Architecture and Security.

UTP ImplementationUTP Implementation

Page 55: Summer Youth Program: Computer/Network Architecture and Security.

Straight-Through and Straight-Through and Cross-Over ComparisonCross-Over Comparison

Page 56: Summer Youth Program: Computer/Network Architecture and Security.

Console ConnectionsConsole Connections Used to manage a device, such as Used to manage a device, such as

switch or router, locallyswitch or router, locally Uses a DB-9 to RJ45 adapterUses a DB-9 to RJ45 adapter Uses Rollover cableUses Rollover cable

Page 57: Summer Youth Program: Computer/Network Architecture and Security.

Straight-Through and Cross-Straight-Through and Cross-Over Comparison ContinuedOver Comparison Continued

Page 58: Summer Youth Program: Computer/Network Architecture and Security.

Summer Youth Program: Summer Youth Program: Computer/Network Computer/Network Architecture and SecurityArchitecture and Security

Page 59: Summer Youth Program: Computer/Network Architecture and Security.

Using Layers to Analyze Using Layers to Analyze ProblemsProblems

Page 60: Summer Youth Program: Computer/Network Architecture and Security.

Using Layers to Describe Data Using Layers to Describe Data CommunicationCommunication

Page 61: Summer Youth Program: Computer/Network Architecture and Security.

OSI Model OSI Model

Page 62: Summer Youth Program: Computer/Network Architecture and Security.

Layer 1Layer 1

Page 63: Summer Youth Program: Computer/Network Architecture and Security.

Layer 2 Layer 2

•Provides reliable transit of data across a physical link

•Provides physical address

•Error correction, best effort delivery.

Page 64: Summer Youth Program: Computer/Network Architecture and Security.

Layer 3Layer 3

Page 65: Summer Youth Program: Computer/Network Architecture and Security.

Layer 4Layer 4

Page 66: Summer Youth Program: Computer/Network Architecture and Security.

Layer 5 Layer 5

Page 67: Summer Youth Program: Computer/Network Architecture and Security.

Layer 6Layer 6

Page 68: Summer Youth Program: Computer/Network Architecture and Security.

Layer 7 Layer 7

Page 69: Summer Youth Program: Computer/Network Architecture and Security.

Peer-to-Peer CommunicationPeer-to-Peer Communication

Page 70: Summer Youth Program: Computer/Network Architecture and Security.

TCP/IP Model TCP/IP Model

Page 71: Summer Youth Program: Computer/Network Architecture and Security.

Encapsulation & DecapsulationEncapsulation & Decapsulation

Page 72: Summer Youth Program: Computer/Network Architecture and Security.

Names for Data at Each Names for Data at Each Layer Layer

Page 73: Summer Youth Program: Computer/Network Architecture and Security.

Network EnvironmentsNetwork Environments

Page 74: Summer Youth Program: Computer/Network Architecture and Security.

Peer-to-Peer NetworksPeer-to-Peer Networks

All Peers are equalAll Peers are equal

10 Host max (recommended)10 Host max (recommended)

Page 75: Summer Youth Program: Computer/Network Architecture and Security.

Client/Server EnvironmentClient/Server Environment

network services are located on a network services are located on a dedicated computer called a serverdedicated computer called a server

Page 76: Summer Youth Program: Computer/Network Architecture and Security.

Peer-to-Peer vs. Client/ServerPeer-to-Peer vs. Client/ServerAdvantagesAdvantages

Advantages of a Peer-to-Peer Advantages of a Peer-to-Peer NetworkNetwork

Advantages of a Advantages of a Client/Server NetworkClient/Server Network

Less expensive to Less expensive to implementimplement

Provides for better Provides for better securitysecurity

Does not require Does not require additional specialized additional specialized network administration network administration softwaresoftware

Easier to administer when Easier to administer when the network is large due the network is large due to centralized to centralized administrationadministration

Does not require a Does not require a dedicated network dedicated network administratoradministrator

All data can be backed up All data can be backed up on one central locationon one central location

Page 77: Summer Youth Program: Computer/Network Architecture and Security.

Peer-to-Peer vs. Client/ServerPeer-to-Peer vs. Client/ServerDisadvantagesDisadvantages

Disadvantages of a Peer-to-Disadvantages of a Peer-to-Peer NetworkPeer Network

Disadvantages of a Disadvantages of a Client/Server NetworkClient/Server Network

Does not scale well to a Does not scale well to a large networks and large networks and administration becomes administration becomes unmanageableunmanageable

Requires expensive Requires expensive specialized network specialized network administrative and administrative and operational softwareoperational software

Each user must be trained Each user must be trained to perform administrative to perform administrative taskstasks

Requires expensive, more Requires expensive, more powerful hardware for the powerful hardware for the server machineserver machine

Less secureLess secure Requires a professional Requires a professional administratoradministrator

All machines sharing All machines sharing resources negatively resources negatively impacts performanceimpacts performance

Has a single point of Has a single point of failure. User data is failure. User data is unavailable if the server unavailable if the server is downis down

Page 78: Summer Youth Program: Computer/Network Architecture and Security.

Ethernet SwitchingEthernet Switching

Page 79: Summer Youth Program: Computer/Network Architecture and Security.

Layer 2 BridgingLayer 2 Bridging

What is a Bridge? What is a Bridge?

What is the Bridging process?What is the Bridging process?

Page 80: Summer Youth Program: Computer/Network Architecture and Security.

Bridge TypesBridge Types

Page 81: Summer Youth Program: Computer/Network Architecture and Security.

Bridge OperationsBridge Operations

Page 82: Summer Youth Program: Computer/Network Architecture and Security.

SwitchesSwitches

Page 83: Summer Youth Program: Computer/Network Architecture and Security.

Switching TableSwitching Table

Page 84: Summer Youth Program: Computer/Network Architecture and Security.

LatencyLatency

What is Latency?What is Latency?

How does it affect a network?How does it affect a network?

Page 85: Summer Youth Program: Computer/Network Architecture and Security.

Switch ModesSwitch Modes

Store-and-forward Store-and-forward switchingswitching

Cut-through switching Cut-through switching

Fragment-free switchingFragment-free switching

Page 86: Summer Youth Program: Computer/Network Architecture and Security.

Collision Domains and Collision Domains and Broadcast DomainsBroadcast Domains

How to reduce the impact of broadcasts and collisions on the performance of the network?

Page 87: Summer Youth Program: Computer/Network Architecture and Security.

Types of NetworksTypes of Networks

Page 88: Summer Youth Program: Computer/Network Architecture and Security.

Data CollisionsData Collisions

When two bits are propagated at the same time on the same network, a collision will occur.

Page 89: Summer Youth Program: Computer/Network Architecture and Security.

Collisions and Collision Collisions and Collision DomainsDomainsExtended by a huband repeater

Page 90: Summer Youth Program: Computer/Network Architecture and Security.

SegmentationSegmentation

Page 91: Summer Youth Program: Computer/Network Architecture and Security.

Breaking Up Collision Breaking Up Collision Domains Using SegmentationDomains Using Segmentation

Page 92: Summer Youth Program: Computer/Network Architecture and Security.

Segmenting with BridgesSegmenting with Bridges

Page 93: Summer Youth Program: Computer/Network Architecture and Security.

Segmenting with SwitchesSegmenting with Switches

Page 94: Summer Youth Program: Computer/Network Architecture and Security.

Segmenting with RoutersSegmenting with Routers

Page 95: Summer Youth Program: Computer/Network Architecture and Security.

Layer 2 BroadcastsLayer 2 Broadcasts

Layer 2 devices must flood all broadcast Layer 2 devices must flood all broadcast and multicast traffic. and multicast traffic.

The accumulation of broadcast and The accumulation of broadcast and multicast traffic from each device in the multicast traffic from each device in the network is referred to as broadcast network is referred to as broadcast radiation.radiation.

Page 96: Summer Youth Program: Computer/Network Architecture and Security.

Broadcast DomainsBroadcast Domains

A group of collision domains that are A group of collision domains that are connected by Layer 2 devicesconnected by Layer 2 devices

Controlled at Layer 3 (router)Controlled at Layer 3 (router) Routers do not forward broadcastsRouters do not forward broadcasts

Page 97: Summer Youth Program: Computer/Network Architecture and Security.

Data FlowData Flow

Page 98: Summer Youth Program: Computer/Network Architecture and Security.

Network SegmentNetwork Segment If the segment is used in TCP, it would be If the segment is used in TCP, it would be

defined as a separate piece of the data. defined as a separate piece of the data. If segment is being used in the context of If segment is being used in the context of

physical networking media in a routed physical networking media in a routed network, it would be seen as one of the parts network, it would be seen as one of the parts or sections of the total network.or sections of the total network.

Page 99: Summer Youth Program: Computer/Network Architecture and Security.

Routing Fundamentals Routing Fundamentals And SubnetsAnd Subnets

Page 100: Summer Youth Program: Computer/Network Architecture and Security.

Routable and Routed Routable and Routed ProtocolsProtocols

A routed protocol allows the router to forward data A routed protocol allows the router to forward data between nodes on different networks. between nodes on different networks.

In order for a protocol to be routable, it must provide the In order for a protocol to be routable, it must provide the ability to assign a network number and a host number to ability to assign a network number and a host number to each individual device. each individual device.

These protocols also require a network mask in order to These protocols also require a network mask in order to differentiate the two numbers. differentiate the two numbers.

The reason that a network mask is used is to allow groups The reason that a network mask is used is to allow groups of sequential IP addresses to be treated as a single unit. of sequential IP addresses to be treated as a single unit.

Page 101: Summer Youth Program: Computer/Network Architecture and Security.

IP as a Routed Protocol IP as a Routed Protocol IP is a connectionless, IP is a connectionless, unreliable, best-effort unreliable, best-effort delivery protocol. delivery protocol.

As information flows As information flows down the layers of the down the layers of the OSI modelOSI model;; the data is the data is processed at each layer.processed at each layer.

IP accepts whatever data IP accepts whatever data is passed down to it from is passed down to it from the upper layers. the upper layers.

Page 102: Summer Youth Program: Computer/Network Architecture and Security.

Packet Propagation and Switching Packet Propagation and Switching Within a RouterWithin a Router

Page 103: Summer Youth Program: Computer/Network Architecture and Security.

Packet Propagation and Switching Packet Propagation and Switching Within a RouterWithin a Router

As a frame is received at a router interface. As a frame is received at a router interface. The MAC address is checked to see if the frame is The MAC address is checked to see if the frame is directly addressed to the router interface, or a broadcast. directly addressed to the router interface, or a broadcast. The frame header and trailer are removed and the The frame header and trailer are removed and the packet is passed up to Layer 3. packet is passed up to Layer 3. The destination IP address is compared to the routing The destination IP address is compared to the routing table to find a match.table to find a match.The packet is switched to the outgoing interface and The packet is switched to the outgoing interface and given the proper frame header.given the proper frame header.The frame is then transmitted. The frame is then transmitted.

Page 104: Summer Youth Program: Computer/Network Architecture and Security.

Internet Protocol (IP): Internet Protocol (IP): Connectionless Connectionless

The Internet is a gigantic, connectionless network The Internet is a gigantic, connectionless network in which all packet deliveries are handled by IP. in which all packet deliveries are handled by IP. TCP adds Layer 4, connection-oriented reliability TCP adds Layer 4, connection-oriented reliability

services to IP. services to IP.

Page 105: Summer Youth Program: Computer/Network Architecture and Security.

A connection is established between the sender and the recipient before any data is transferred.

Telephone Calls: Telephone Calls: Connection-OrientedConnection-Oriented

Page 106: Summer Youth Program: Computer/Network Architecture and Security.

Anatomy of an IP Packet Anatomy of an IP Packet While the IP source and destination addresses While the IP source and destination addresses are important, the other header fields have are important, the other header fields have made IP very flexible. made IP very flexible. The header fields are the information that is The header fields are the information that is provided to the upper layer protocols defining provided to the upper layer protocols defining the data in the packet. the data in the packet.

Page 107: Summer Youth Program: Computer/Network Architecture and Security.

Routing OverviewRouting OverviewA router is a network layer device that uses one or more A router is a network layer device that uses one or more routing metrics to determine the optimal path.routing metrics to determine the optimal path.Routing metrics are values used in determining the Routing metrics are values used in determining the advantage of one route over another.advantage of one route over another.Routing protocols use various combinations of metrics Routing protocols use various combinations of metrics for determining the best path for data. for determining the best path for data.

Page 108: Summer Youth Program: Computer/Network Architecture and Security.

Routing Versus SwitchingRouting Versus Switching This distinction is routing and switching This distinction is routing and switching

use different information in the process of use different information in the process of moving data from source to destination. moving data from source to destination.

Page 109: Summer Youth Program: Computer/Network Architecture and Security.

Routing Versus SwitchingRouting Versus Switching

Page 110: Summer Youth Program: Computer/Network Architecture and Security.

Classes of Network IP Classes of Network IP AddressesAddresses

Page 111: Summer Youth Program: Computer/Network Architecture and Security.

Introduction to SubnettingIntroduction to Subnetting Host bits must Host bits must

are reassigned are reassigned (or “borrowed”) (or “borrowed”) as network bits. as network bits.

The starting The starting point is always point is always the leftmost the leftmost host bit. host bit.

3 bits borrowed allows 23-2 or 6 subnets

5 bits borrowed allows 25-2 or 30 subnets

12 bits borrowed allows 212-2 or 4094 subnets

Page 112: Summer Youth Program: Computer/Network Architecture and Security.

Reasons for SubnettingReasons for SubnettingProvides addressing flexibility for the network Provides addressing flexibility for the network administrator.administrator.

Each LAN must have its own network or subnetwork Each LAN must have its own network or subnetwork address.address.

Provides broadcast containment and low-level security Provides broadcast containment and low-level security on the LAN. on the LAN.

Provides some security since access to other subnets is Provides some security since access to other subnets is only available through the services of a router. only available through the services of a router.

Page 113: Summer Youth Program: Computer/Network Architecture and Security.

Establishing the Subnet Mask Establishing the Subnet Mask AddressAddress

Determines which part of an IP address is the network field Determines which part of an IP address is the network field and which part is the host fieldand which part is the host field..

Follow these steps to determine the subnet mask:Follow these steps to determine the subnet mask:

1. Express the subnetwork IP address in binary form.1. Express the subnetwork IP address in binary form.

2. Replace the network and subnet portion of the 2. Replace the network and subnet portion of the address with all 1s.address with all 1s.

3. Replace the host portion of the address with all 0s.3. Replace the host portion of the address with all 0s.

4. Convert the binary expression back to dotted-decimal 4. Convert the binary expression back to dotted-decimal notation.notation.

Page 114: Summer Youth Program: Computer/Network Architecture and Security.

Establishing the Subnet Mask Establishing the Subnet Mask AddressAddress

To determine the number of bits to be used, the network To determine the number of bits to be used, the network designer needs to calculate how many hosts the largest designer needs to calculate how many hosts the largest subnetwork requires and the number of subnetworks subnetwork requires and the number of subnetworks needed. needed. The “slash format” is a shorter way of representing the The “slash format” is a shorter way of representing the subnet mask:subnet mask:

/25 represents the 25 one bits in the subnet mask /25 represents the 25 one bits in the subnet mask 255.255.255.128255.255.255.128

Page 115: Summer Youth Program: Computer/Network Architecture and Security.

Establishing the Subnet Mask Establishing the Subnet Mask AddressAddress

Page 116: Summer Youth Program: Computer/Network Architecture and Security.

Subnetting Class A and B Subnetting Class A and B NetworksNetworks

The available bits for assignment to the subnet The available bits for assignment to the subnet field in a Class A address is 22 bits while a field in a Class A address is 22 bits while a Class B address has 14 bits. Class B address has 14 bits.

Page 117: Summer Youth Program: Computer/Network Architecture and Security.

Calculating the Subnetwork Calculating the Subnetwork With ANDingWith ANDing

ANDing is a binary process by which the router ANDing is a binary process by which the router calculates the subnetwork ID for an incoming packet. calculates the subnetwork ID for an incoming packet.

1 AND 1 = 1; 1 AND 0 = 0; 0 AND 0 = 01 AND 1 = 1; 1 AND 0 = 0; 0 AND 0 = 0

The router then uses that information to forward the The router then uses that information to forward the packet across the correct interface. packet across the correct interface.

Packet AddressPacket Address 192.168.10.65192.168.10.6511000000.10101000.00001011000000.10101000.00001010.01010.010

0000000011

Subnet MaskSubnet Mask255.255.255.22255.255.255.2244

11111111.11111111.11111111111111.11111111.11111111.11111.111

0000000000

Subnetwork Subnetwork AddressAddress

192.168.10.64192.168.10.6411000000.10101000.00001011000000.10101000.00001010.01010.010

0000000000

Page 118: Summer Youth Program: Computer/Network Architecture and Security.

Routed Versus RoutingRouted Versus RoutingA routed protocol: A routed protocol:

Includes any network protocol suite that provides Includes any network protocol suite that provides enough information in its network layer address to enough information in its network layer address to allow a router to forward it to the next device and allow a router to forward it to the next device and ultimately to its destination. ultimately to its destination. Defines the format and use of the fields within a Defines the format and use of the fields within a packet. packet.

A routing protocol: A routing protocol: Provides processes for sharing route information.Provides processes for sharing route information.Allows routers to communicate with other routers to Allows routers to communicate with other routers to update and maintain the routing tables.update and maintain the routing tables.

Page 119: Summer Youth Program: Computer/Network Architecture and Security.

Path DeterminationPath DeterminationPath determination enables a router to compare the Path determination enables a router to compare the destination address to the available routes in its routing destination address to the available routes in its routing table, and to select the best path. table, and to select the best path.

Page 120: Summer Youth Program: Computer/Network Architecture and Security.

End of PresentationEnd of Presentation