Networking Essentials
Networking Essentials
WHAT IS NETWORK?
DIFFERENT BETWEEN NETWORK & NETWORKING
BENEFITS OF NETWORKING
TYPES OF NETWORKS
NETWORK MODELS
NETWORK TOPOLOGIES
COMMUNICATION MEDIA
NETWORKING DEVICES
OSI MODEL
PROTOCOLS
IP ADDRESSES
WHAT IS NETWORK?
Network:-
Is a collection of computers connected together.
Networking:-
Is a process of communication between the
interconnected computers.
Systems connected together Process of communication b/w
the interconnected systems.
BENEFITS OF NETWORKING
Speed: Sharing and transferring files within Networks can be done
through process rate of @ 1Gbps which saves our time.
Building-2
LAN2
Building-3
Building-1 LAN3
LAN1
Web DC,
server DNS
Switch WAN
Router
Router
Switch
NETWORK MODELS
There are two types of network models:
1) Work-Group Model
2) Domain Model
Work-Group Model:-
Client
A Client is a computer which uses the resources of the server in
which the client sends the request to the server and the server responds to
the client’s request on security basis.
IP : 172.16.0.3 IP : 172.16.0.4 IP : 172.16.0.5
IP : 172.16.0.2
Sub: 255.0.0.0 Sub: 255.0.0.0 Sub: 255.0.0.0
Sub: 255.0.0.0
G.WAY : 172.16.0.1 G.WAY : 172.16.0.1 G.WAY : 172.16.0.1
G.WAY : 172.16.0.1
P.DNS: 172.16.0.2 P.DNS: 172.16.0.2 P.DNS: 172.16.0.2
P.DNS: 172.16.0.2
172.16.0. 192.168.19.25
1
172.16.0. 192.168.19.25
1
BUS TOPOLOGY
RING TOPOLOGY
STAR TOPOLOGY
MESH TOPOLOGY
HYBRID TOPOLOGY
Bus Topology:
The way of cabling held in this topology is single
cable where multiple computers and network devices are
connected in a single line. It is shown as,
Terminator Terminator
Ring Topology:-
-If any one station is down, the entire ring will get disturbed.
-In this network , it uses a special type of device called Media
Access Control which receives data through one port and
transmits data through another port.
Star Topology:-
In this topology each system is connected to a centralized network
device i.e. Hub, Switch. This is the most common network setup where the
central device joins all the different nodes together and controls the
communication b/w the systems on network.
-Easy to implement and expands our network.
-Security can be implemented in the switch used.
Clients
File
server
Clients
Network Printer
Mesh Topology:-
-If one of the connection breaks, still the network will operate .
-A high-speed exchange of information is possible b/w the source
and destination.
-This type of topology is mainly used in Defense.
-It has a complex physical layout.
Hybrid Topology:-
-It is expensive and also carry additional data like voice, video with
the
help of BNC which is a connector used for data transfer in co-axial
cabling.
This Fiber optic cable has been classified into two types:
1)Single-mode.
2)Multi-mode.
TYPES OF MEDIA CONNECTORS
RJ-11
RJ-45
SC connector
LC connector
BNC
Cabling Methods
1.Straight-through Cable.
2.Cross-over cable.
Non-Intelligent Intelligent
1)HUBS 1)SWITCHES
2)REPEATERS 2)ROUTERS
3)BRIDGES
Non-Intelligent Devices
HUBS:-
Hub is a centralized device used for communication b/w the
computers interconnected.
As per the OSI model, network switches are As per the OSI model, a hub is a Physical
classified as Data Link Layer devices, i.e. they Layer device, i.e. it operates at Layer 1.
operate at Layer 2.
In switch MAC address is fixed, if switch goes Where as hub is centralized device
off network is going to failure.
In switch there are two types manageable, Non- In hub there are two types active and passive.
manageable.
IOS
A router works on the principle of IP addresses. A switch works on the basis of MAC
addresses.
A router's inbuilt hardware makes use of A switch does not perform any such activities.
routing algorithms to compute the best possible
path for routing data packets across different
computer networks.
Routers have their own inbuilt operating Most switches do not require any prior
systems and they need to be configured before configuration and are usually 'ready-to-use'.
use.
OSI MODEL
Transport TCP,UDP
w.x.y.z
MAC Address:-
MAC Address is the address burnt in the NIC card by
the manufacturer. It contains 48-bits in the form of
hexadecimal, which determines the physical location of a
system. It can be written as,
MM-MM-MM-SS-SS-SS
IMPORTANT PORT NUMBERS
- HTTP ---- 80
- FTP ---- 20,21
- TelNet ---- 23
- SMTP ---- 25
- DNS ---- 53
- TFTP ---- 69
- SNMP ---- 161
- RIP ---- 520
- IMAP 4 ---- 143
- IMAP 3 ---- 220
- RPC ---- 135
- LDAP ---- 389
- Net Stat ---- 15
- WINS ---- 42
- BootP ---- 67
- DHCP ---- 68
- POP2 ---- 109
- POP3 ---- 110
- Net BIOS ---- 139
- SSL(HTTPS) ---- 443
- SQL Server ---- 1433
- NFS ---- 2049
- SSH ---- 22
- RAP ---- 38
- BGP ---- 179
- IEEE 802.1 Bridging (networking) and Network Management
- IEEE 802.2 Logical link control (upper part of data link layer)
- IEEE 802.5 Defines the MAC layer for a Token Ring (inactive)
Ethernet is the most widely used local area network (LAN) technology, that
defines wiring and signaling standards for the physical layer of TCP/IP.
Ethernet was originally standardized as IEEE 802.3 with a data transmission
rate of 10 Mb/s. Newer versions of Ethernet were introduced lately to offer
higher data rates. Fast Ethernet and Gigabit Ethernet support data rates of
100 Mbps and 1 Gbps (1000 Mbps) respectively. An Ethernet LAN may use
coaxial cable (10Base2), unshielded twisted pair wiring (10BaseT,
100BaseT and 1000BaseT), or fiber optic cable. Ethernet devices compete
for access to the network using a protocol called Carrier Sense Multiple
Access with Collision Detection (CSMA/CD). With prosperity of Internet, Wi-
Fi, the wireless LAN technology standardized by IEEE 802.11, is used in
hybrid with Ethernet LAN to offer portability.
Ethernet Standards
IEEE 802.3 is the signaling standards for Ethernet, and IEEE 802.11 is the
standards for Wi-Fi
Loopback IP:
An address that sends outgoing signals back to the same
computer for testing. In a TCP/IP network, the loopback IP
address is 127.0.0.1, and pinging this address will always
return a reply unless the firewall prevents it. The loopback
address allows a network administrator to treat the local
machine as if it were a remote machine. See ping,
loopback plug and localhost.
Ipconfig is a MS-DOS command-line tool used to display and manage the
network settings of your computer. Ipconfig is available on Windows
machines, and it displays the current network connection details
and DHCP client settings.
Ipconfig is an external MS-DOS command, and is available on Windows 95,
Windows 98, ME, NT, 2000, XP and Windows Vista Operating Systems. On
Windows 9x machines, a graphical tools such as "winipconfig" or "winipcfg"
may be used instead. On Linux machine, the ifconfig command performs
equivalent function.
Commands to Know your system IP Address and
MAC Address ……
ipconfig
ipconfig/all
getmac
hostname
dcpromo
Ping 127.0.0.1
Net users
Ipconfigur /registerdns
nslookup
Securities
A network security system typically relies on layers
of protection and consists of multiple components
including networking monitoring and security
software in addition to hardware and appliances.
Passive Network
○ wiretapping
○ Port scanner
○ Idle scan
Active
Denial-of-service attack
Spoofing
Man in the middle
ARP poisoning
Smurf attack
Buffer overflow
Heap overflow
Format string attack
SQL injection
cyber attack