Networking Part 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

❖ About Network

○ Devices
Devices Network

❖ Networking
○ Device Information (Data) Devices
Shared Devices Communication
Devices
Networking

❖ Networking Advantages
○ Sharing Data
○ Sharing Software
○ Sharing Hardware

❖ Networking Disadvantages
○ Data Unsecure
○ Unauthorized Access
○ Maintenance Problems

Network Book New(1) Page 1


❖ Network Setup Requirements
○ Network Setup
 Networking Devices OR Network Equipments
(Routers , Switches , Hub , Firewall , etc..)

 Network Medium or Media


(Wired or Wireless / Coaxial , Twisted Pair , Fiber , Wi Fi)

 Network Nodes
(Server , Client (PCs) , Phones , etc..)

 Network Protocols
(IP , TCP , IP , HTTP , FTP , etc..)

❖ Network Categories
○ Network Environment
Network

1. Classifying Network by Geographical Area


2. Classifying Network by Topology
3. Classifying Network by Network Model or Resource Location

Network Book New(1) Page 2


❖ Classifying Network by Geographical Area
○ Network Geographical Area
Network Network
Network

○ Network (4)

1. LAN
2. WAN
3. MAN
4. CAN
5. PAN
6. SAN

LAN
○ Local Area Network
○ (OR) Apartment Network
OR Networks Interconnect Internetwork
LAN Routers
○ Networks LAN
○ LAN High Speed Network
○ Ethernet LAN Network
○ SOHO (Small Office / Home Office) LAN

LAN Standard Connections

1. 802.2 (LLC) (Logical Link Control)


2. 802.3 (Ethernet) (CSMA-CD , CSMA-CA)
3. 802.5 (Token Ring)
4. 802.11 (Wi-Fi)

Network Book New(1) Page 3


WAN
○ Wide Area Network
○ Sites (Networks OR Internetworks)

○ Sites Service Provider (ISP)


Connections T1 ATM
Sites
○ Sites (Networks)
Network WAN

○ Internet WAN
○ Internet Sites
Network WAN
○ WAN Sites
○ WAN Speed LAN Speed

WAN Technologies
 Baseband and Broadband
 Packet Switching and Circuit Switching
 POTS and ISDN Network
 Synchronous Channel and Asynchronous Channel

WAN Standard Connections


1. DSL (Digital Subscriber Line)
2. ADSL (Asymmetric Digital Subscriber Line)
3. X.25
4. Multiprotocol Label Switching (MPLS)
5. Frame Relay
6. ATM (Asynchronous Transfer Mode)
7. Point to Point WAN Connections (T Carriers , E Carriers)
8. High Speed Through Satellite
9. SONET (Synchronous Optical Network) [POS , Packet Over SONET]

Network Book New(1) Page 4


MAN
○ Metropolitan Area Network (MAN)
○ WAN Area Network
○ WAN Sites Service
Provider
○ MAN Sites Very High
Speed Connection Service Provider
Speed
○ MAN Network Companies Offices
Network
University
Network
○ Sites MAN WAN
WAN Connection Sites
MAN Sites
Lines

○ Sites MAN Networks


Fiber Optic Connection

MAN Technologies
 Metro Ethernet
 FDDI
 ATM

MAN Standard Connections


1. Point to Point Connections (Leased Lines) (T1 , T2 , etc..)
2. SONET (High Speed Fiber)
3. FDDI

Network Book New(1) Page 5


CAN
○ Campus Area Network
○ Campus University Campus Company Campus , Organization Campus

○ Campus LAN MAN


○ Series of LANs Interconnect Network CAN

○ Several Square Miles Industrial Park, Business Park


CAN Network

SAN
○ Storage Area Network
○ Storage Devices Very High Speed Data
Network
○ SAN LAN or MAN or WAN Network Segment
LAN / MAN / WAN Data Stored Network Location

Network Book New(1) Page 6


PAN
○ Personal Area Network
○ Small Area Devices
Network
○ PAN Devices 2 Network
○ PAN Network Bluetooth Connect
○ PAN Limited Area , Limited Speed , Limited Devices Limitations
○ Bluetooth Network ..

Classifying Network by Network Topology


○ Network Topology
○ Network Networking Equipment End User Devices
Design Network Topology
○ Network Topology Types (7)
 Bus
 Mesh
 Ring
 Star
 Hybrid
 Hub and Spoke
 Tree

○ Network Topologies (7) (2)

1. Physical Topology
2. Logical Topology
(Example, Ring Topology is Physical Star, Logical Bus)

○ Network Topologies Network


◊ Speed
◊ Reliability
◊ Security
◊ Costing
◊ Maintaining

Network Book New(1) Page 7


Bus Topology
○ Bus Topology All Network Nodes Single Shared Cable Connected

○ Single Cable Network Nodes


Data Frames Cable Bus
○ Bus Cable
 A trunk
 A backbone
 A Segment

Bus Components
○ Bus Network Coaxial Cable Create
○ Central Shared Cable (Bus Cable) Coaxial Cable
○ Bus Network Nodes Transceiver Transceiver
Bus Network Card
○ Transceiver Computer Digital Signals Bus Network
Signals
○ Network Nodes Central (Bus Cable) BNC Barrel Connector
OR T Connector (Vampire Tap)
○ Bus Network (Coaxial Cable) Signal Bounce
Terminator

Network Book New(1) Page 8


○ Bus Network Components
 Coaxial Cable
 Transceiver (Bus Network Card)
 Terminator
 BNC Connector
 T Connector (or Vampire Tap)
 (T Connector in 10Base2)
 (Vampire Tap in 10Base5)

 Barrel Connector

Network Book New(1) Page 9


❖ Bus Topology and Signal Bounce
○ Signal Bounce Bus Network Computer Signal
Bus (Trunk)

Signal Bounce
○ Signal Bounce Data Network
Loop Data Package
Computer Data Package Signals 2 Bounce
Bus (Trunk) Signal 2
Data Lost Computers Retransmit

○ Signals Bounce Problem Bus Network Loop Signal Bounce


Terminators ( )

○ Bus Network Terminators Bus (Trunk)


Terminator
Segment Computers Communicate

○ Terminators Resistance Terminators


Bus Network Terminators 50
Ohms

Network Book New(1) Page 10


Coaxial Cable
○ Coaxial Cable (OR) Coax
○ Solid-Core Copper Wire Copper Wire Data

○ Insulation Layer Dielectric

○ "foil shield" Electro Magnetic Interference (EMI)


○ "Braided Shield" Cable Strength
Plastic Cover

BNC Connectors
○ Bayonet Neil Concelman
○ Coaxial Cable

Network Book New(1) Page 11


Bus Cables and Standards
○ Bus Cable Coaxial Cable Environments
TV Cable , Radio Station Cable , Telephone Exchange Cable
Coaxial Cables

○ Network Coaxial Cable


Distance
▪ Thinnet (10Base2)
▪ Thicknet (10Base5)

Thinnet (Thin Ethernet)


▪ RG-58 Cable
▪ 1/4 (0.25) inch
▪ 50 Ohm or 52 Ohm (Ohm = Resistance)
▪ Thinnet Short-Distance Communication
▪ Maximum Length 185 meters Nearly 200 meters 10Base2

▪ Speed 10 Mbps
▪ Thinnet Bus Network 10Base2 Network

Thicknet (Thick Ethernet)


▪ RG-8 Cable
▪ 1/2 (0.5) inch
▪ 75 Ohm
▪ Thicknet Long-Distance Communication
▪ Maximum Length 500 meters 500 meters 10Base5

▪ Speed 10 Mbps
▪ Thicknet Bus Network 10Base5

Other Coaxial Cable


▪ Coaxial Cable RG-59 Coaxial Cable RG-6 Coaxial Cable
TV , VCR , Satellite , Fixed Wireless Internet / Wireless TV Services

▪ RG-59 Coaxial Cable Short Cable RG-6 Cable Long Distance Cable

▪ RG-59 or RG-6 Coaxial Cable BNC F-Connectors

Network Book New(1) Page 12


Bus Topology Advantages and Disadvantages
○ Bus Topology Advantages
▪ Bus Additional Devices Hubs Switches
Cost
▪ Install Maintaining (Upgrading) New Node

▪ Cables
▪ Lower Costs to Establish

○ Bus Topology Disadvantages


▪ Bus Cable The whole connection
lost
▪ A period of time .. Maintenance
Maintaining Costs Expensive
▪ Data Communication Network Topologies
▪ Network Nodes Limited
▪ Network Nodes The whole connection speed

Network Book New(1) Page 13


Ring Topology
○ Ring Topology IBM Create
○ Ring Topology All Nodes Bus Topology
Bus Ring Topology Ring All Nodes
Connected
○ Ring Topology Logical Ring Shape Physical Ring
Shape Ring Topology Physical Network
Star
○ Ring Topology Circuit Start Point End Point
Nodes Connected Direction
○ Data Token Datagram Node
Ring Direction Node Node
Ring
○ Ring Topology Single Ring (One Direction) Dual Ring (Two Directions) Ring Types
2 Dual Ring Redundant Ring
○ Token Ring Network 4 Mbps (OR) 16 Mbps Speed 16 Mbps
Token Ring Network High Speed Token Ring Network

○ Token Ring Network Components 2


▪ Token Network Cable
▪ Multi-station Access Unit (MAU Device)

Network Book New(1) Page 14


MAU and Token Ring Cables
○ Token Ring Network
1. (Single MAU) MAU Computers (Old Token Ring
Network)
2. Multiple MAUs (New Token Ring Network)
○ Token Ring Network Ring-In (RI) Port Ring-Out (RO) Port RI RO
MAU
○ Single MAU MAU Computer
Ring-In (RI) port Computer Ring-Out (RO) Port
MAU Ring Out Port
○ Single MAU Cable MAU Transmit Port Transmit Pair
MAU Transmit Circuit Connected Receive Port
MAU Receive Circuit Connected

○ Token Ring Network Limitation (Hosts) Multiple MAUs

○ Multiple MAUs MAU


Port Types
○ MAU RO MAU RI

Network Book New(1) Page 15


Ring Topology Process

○ Token Frame Type Ring Network Sequentially

○ Node Data Token


Token
Addresses Information Ring (Data
)
○ Token Destination Workstation Workstation

○ Workstation Token Address Information


Address Token (Signal) Repeat
Token Ring Network
○ Token Destination Workstation Address
Token Acknowledge "Flag"
Token Network

○ Acknowledge Flag Token Node Node Data Token (Data


Carried Frame) Ring Network

Token Ring and Active Monitoring


○ Token Ring Network Node Active Monitor (
Randomly Node Node )
○ Active Monitor Token Ring
Active Monitor Node Token Delete
○ Active Monitor Node Repeat Monitoring Ring Network Token Timing
Clocking Functions Control

Network Book New(1) Page 16


Token Ring Topology and FDDI
 Fiber Distributed Data Interface (FDDI) (Token Ring Topology Network
Token Ring Network )
 FDDI Central Device MAU FDDI Network
Nodes Ring
Network
 Single Ring Data Redundancy / Fault Tolerance "Counter
Rotating Ring Topology" Dual Ring Design

Network Book New(1) Page 17


Star Topology
○ Most Popular used
○ Star Topology All Nodes Central Network Device Connected

○ Network Nodes Nodes Data


Central Network Device Nodes

○ Network Node Node Data


Central Network Device Data (Frame) Copy Nodes
Broadcasts
○ Star Topology Nodes Node Down
Nodes
○ Central Network Device Down
○ LAN or WAN Networks Star Topology
○ Star Topology Cables Central Network Device
Network Device
○ Wireless Networks Star Topology

Star Topology Advantages and Disadvantages


○ Star Topology Advantages
▪ Node Direct Communication
▪ Implement Maintenance
▪ Network Segments Problems
▪ Troubleshooting Recovery Quickly

○ Star Topology Disadvantages


▪ Central Node Down the whole network Down
▪ Network Traffics Central Node
Network Traffics Increases

Network Book New(1) Page 18


❖ Mesh Topology
○ Mesh Topology Connect Network Nodes
Nodes Point-to-Point Mesh Topology

○ Mesh Topology Star Node


Link Mesh Topology

○ Mesh Topology Network Paths Redundancy


Mesh Topology Too Expensive
○ Mesh Topology Mesh Topologies Types 2
 Full Mesh Topology
 Partial Mesh Topology

 Full Mesh
○ Network Nodes Network Nodes One
Connection Connected

Full Mesh

 Full Mesh Formula


L = n * (n-1) / 2 (L = number of links) (n = number of nodes)
L = 10 * (10-1) / 2 = 45 (45 Links Require )

○ Full Mesh are also used in highly available and highly fault-tolerance WAN Sites.

Network Book New(1) Page 19


 Partial Mesh
○ Partial Mesh Network Nodes Connected
Nodes Connected

Partial Mesh

○ Partial Mesh Topology Network Bandwidth Efficient


WAN Sites Fault-Tolerance
WAN Sites

Network Book New(1) Page 20


Hub and Spoke Topology
• Widely used in WAN Sites and Internetworking.
• Hub and Spoke Topology
1. Main Site Hub Site
2. Remote Sites Spoke Sites

○ Hub Site Spoke Sites 2


Spoke Sites
○ Spoke Sites Data
Transfer Hub Site
Data Transfer

 Internetwork Hub Site Location Hub


Site Down Spoke Sites network

Network Book New(1) Page 21


❖ Classifying Network by Network Model or Resource Location
○ Network Model Network Relationship
○ Network Models Types 2
1. Peer-to-Peer Network (Workgroup Model)
2. Server-Based Network or Client/Server Network (Domain Model)

1. Peer-to-Peer Network (Workgroup Model)


○ Peer Networks
○ Equal Situations Nodes , Computers
Connected
○ Network Nodes Equal Level Peer Network Authentications
Authorizations
○ Nodes Accounts Nodes Shared Access

○ Computers Workgroup Name

Network Book New(1) Page 22


2. Server-Based Network or Client/Server Network

○ Server Based Network Unequal Situations One Node


Server Data Storing Sharing
○ Other One Node Client Server Data
Access
○ Server Nodes Management

○ Server All Nodes Master


Authentications Authorizations
○ Workgroup Model Domain (Active Directory) Server Setup
Network Nodes Domain Member

 Server Clients Data Shared Network


File System (NFS) Service

 Server Shared Data Server' Internal Storage Units


Shared NAS (Network Attached
Storage)

Network Book New(1) Page 23


Client
○ Computer
▪ Computer Management
▪ Computer Resources / Services
▪ Computers Authentications
Authorizations

○ Client Computer
▪ Hardware Computers Desktop PCs
(Cloned / Branded / Workstation / All In One) Computers Laptop Computers

▪ Software PC Operating Systems Windows XP , Vista , 7 , 8 ,


8.1 , 10

Server
○ Computer
▪ Computers Management
▪ Computers Resources / Services
▪ Computers Authentications
Authorizations

○ Server Computer
▪ Hardware High Performance Computers Server Hardware

▪ Software NOS Operating Systems (Network Operating System)


 Windows 2000 Server
 Windows Server 2003
 Windows Server 2003 R2
 Windows Server 2008
 Windows Server 2008 R2
 Windows Server 2012
 Windows Server 2012 R2
 Windows Server 2016

Network Book New(1) Page 24


Segment

Backbone

Node/Host

❖ Internet
○ A journey of a thousand sites.
○ Early….Sneaker net , 1960s … ARPANET is Created , 1980s …. Internet
○ Internet ARPANET (Advanced Research Projects Agency Network) Developed

Network Book New(1) Page 25


❖ Intranet
○ LAN Intranet
○ Intranet Controlled Network
○ Authorization Users (Remotely or Physically)
Intranet (Network) Control

❖ Extranet
○ Extranet Intranet Network Extranet

○ LANs Extranet
○ MAN Extranet
○ Extranet Company Company
Branch Sites Interconnect Network

❖ Ethernet
○ Ethernet Ethernet Twisted Pair (UTP) Cables
RJ45 Network
○ Ethernet Coaxial Cables Coaxial
Cables Networks Ethernet
○ Ethernet Mediums Cable Types

○ IEEE 802.3 Standards Networks Ethernet LAN


Ethernet

Network Book New(1) Page 26


❖ Internetworking
○ Networks (LANs) OR IP Address LANs Networks
Internetworking

❖ Wireless Local Area Network (WLAN)


○ Wireless Network
○ Radio Wave Technology Modulation Technologies
Communication
○ WLAN Connected Wireless Nodes
Limited Geographical Area

❖ Catenet (Catenated Network)


○ Gateway Connected Group of Networks
Catenet
○ Internet Group Networks Catenet

Network Book New(1) Page 27


Bandwidth / Throughput
• Also called throughput
• Data capacity of a link, how much data can be passed per unit time

Latency
• Delay between source and destination.
• Delay occurs because of
▪ Distance
▪ Routing
▪ Interference / Noise

Jitter
• Variation in latency during an transmission
• Jitter impacts real-time applications like voice calling and video streaming

Bottleneck
• Bandwidth become slower at some where in network. EG ISP Link

Network Book New(1) Page 28


CSMA-CD
• Early Ethernet network is Bus Topology. (10BASE2 , 10BASE5)
• Ethernet network using a shared bus topology

• Ethernet permits only a single frame to be on a network segment at any one time.
• So, before a device in this network transmits, it listens to the wire to see if there is
currently any traffic being transmitted.
• If no traffic is detected, the networked device transmits its data. However, what if two
devices simultaneously had data to transmit?
• If they both listen to the wire at the same time, they could simultaneously, and
erroneously, conclude that it is safe to send their data.
• However, when both devices simultaneously send their data, a collision occurs.
• A collision cause data corruption.

• Ethernet was designed with a mechanism to detect collisions and allow the devices
whose transmissions collided to retransmit their data at different times.
• Specifically, after the devices notice that a collision occurred, they independently set
a random back off timer.
• Each device waits for this random amount of time to elapse before again attempting to
transmit.

Network Book New(1) Page 29


• The procedure used by Ethernet to determine whether it is safe to transmit, detect
collisions, and retransmit if necessary is called "Carrier Sense Multiple Access
Collision Detection" (CSMA/CD).

• CSMA/CD down into its constituent components:

Carrier sense: A device attached to an Ethernet network can listen to the wire, prior to
transmitting, to make sure that a frame is not currently being
transmitted on the network segment.

Multiple access: Unlike a deterministic method of network access (for example, the
method used by Token Ring), all Ethernet devices simultaneously
have access to an Ethernet segment.

Collision detect: If a collision occurs (perhaps because two devices were simultaneously
listening to the network and simultaneously concluded that it was safe
to transmit), Ethernet devices can detect that collision and set random
back off timers. After each device’s random timer expires, each device
again attempts to transmit its data.

 Even with Ethernet’s CSMA/CD feature, Ethernet segments still suffer from scalability
limitations.

 Specifically, the likelihood of collisions increases as the number of devices on a


shared Ethernet segment increases.

 CSMA/CA refers to using collision avoidance, which is common in wireless networks

Network Book New(1) Page 30


Collision Domain
• Ethernet, devices on a shared Ethernet segment are said to belong to the same collision
domain.
• Switch port is connecting to a single device, there is no chance of having a collision.
• With no chance of collision, collision detection is no longer needed.
• With collision detection disabled, network devices can operate in full-duplex mode rather
than half-duplex mode.
• In full-duplex mode a device can simultaneously send and receive at the same time.
• When multiple devices are connected to the same shared Ethernet segment such as
a Layer 1 hub, CSMA/CD must be enabled.

Broadcast Domain

Network Book New(1) Page 31


Types of Switching
• There are 4 types of switching,
1. Layer 2 Switching
2. Layer 3 Switching
3. Layer 4 Switching
4. Multi-layer Switching (MLS)

• A standard switch is known as a layer 2 switch and is commonly found in nearly any
LAN
• Layer 3 or layer 4 switches require advanced technology and are more expensive, and
thus are usually only found in larger LANs or in special network environments.

Network Book New(1) Page 32


Layer 2 switching
• Layer 2 switching uses the MAC address from the host's network interface cards (NICs)
and mapping those addresses with port numbers to built "Forwarding Information Base
(FIB)".
• FIB can also called MAC Table or CAM Table.
• Modern CAM Table can store MAC Addresses up to 8000 entry.
• By using those (MAC or CAM) table, switches make decisions to forward frames.
• Switches use application-specific integrated circuit (ASICs) to build and maintain MAC
tables and also make forward decisions (with CPUs).
• Layer 2 Switch doing three stages
1. Address Learning
2. Forward / Filter Decisions
3. Loop Avoidance

Forwarding information base (FIB)


• A forwarding information base (FIB), also known as a forwarding table or MAC table, is
most commonly used in network bridging, routing (L3 Switching), and similar functions
to find the proper interface to which the input interface should forward a packet. It is a
dynamic table that maps MAC addresses to ports.
• Content-addressable memory (CAM) is typically used to efficiently implement the FIB,
thus it is sometimes called a CAM table.

Network Book New(1) Page 33


Content-addressable memory
• Content-addressable memory is often used in computer networking devices.
• Content-addressable memory (CAM) is purpose-built for extremely fast but very specific
type of memory lookups.
• MAC address table is usually implemented with a binary CAM so the destination port can
be found very quickly, reducing the switch's latency.
• Because a CAM is designed to search its entire memory in a single operation, it is much
faster than RAM in virtually all search applications.
• Unlike a RAM chip, which has simple storage cells, each individual memory bit in a fully
parallel CAM must have its own associated comparison circuit to detect a match between
the stored bit and the input bit.
• CAM chip cost higher than RAM chip.
• CAM chip are SRAMs.

Difference between RAM and CAM


• Random Access Memory (RAM) performs lookups using a memory address and which
then returns the data from the address.
• CAM lookups do the opposite. A function calls the CAM by passing a key that consists of
data word structure and the CAM lookup returns memory addresses.

Types of CAM
• There are two types of CAM (Hardware Architecture)
1. Binary CAM
(Used in L2 Switches, Two States 0 or 1)

2. Ternary CAM
(Used in L3 Switches and Routers, Three States 0 or 1 or care/don't care bit)

Network Book New(1) Page 34


Application-specific integrated circuit (ASIC)
• The ASIC is basically a CPU that is not a general purpose CPU.
• ASIC is an integrated circuit (IC) making switching decisions very quickly.
• Not only making switching decisions but also build and maintain MAC tables.
• Commonly, in earlier networks, as they grew, enterprises began to experience slower
network performance. Ethernet bridges (an early version of a switch) were added to
networks to limit the size of the collision domains.
• In the 1990s, advancements in integrated circuit technologies allowed for LAN switches
to replace Ethernet bridges. These LAN switches were able to move the Layer 2
forwarding decisions from software to application-specific-integrated circuits (ASICs).
ASICs reduce the packet-handling time within the device, and allow the device to handle
an increased number of ports without degrading performance.
• This method of forwarding data frames at Layer 2 was referred to as store-and-forward
switching.
▪ The store-and-forward method makes a forwarding decision on a frame after it
has received the entire frame and then checked the frame for errors.
▪ The cut-through switching method begins the forwarding process after the
destination MAC address of an incoming frame and the egress port has been
determined.
• Modern ASICs often include entire microprocessors, memory blocks including ROM,
RAM, EEPROM, flash memory and other large building blocks.

Network Book New(1) Page 35


Layer 3 Switching
• Layer 3 switching based on (destination) IP address stored in the header of IP
datagram.
• Layer 3 switching using microprocessors to make forwarding decisions in software.
• Comes to Layer 3 switching, there are two kinds of switching,
1. Hardware based Layer 3 Switching
2. Software based Layer 3 Switching

• With a hardware-based solution, the device is using an ASIC (a dedicated chip) to


perform the function.
• With the software implementation, the device is using a computer processor and
software to perform the function.
• Primarily used for "Inter-VLAN routing".

Layer 4 Switching
• Layer 4 switching means hardware-based layer 3 switching technology that can also
consider the type of network traffic (for example, distinguish between HTTP, FTP or
VoIP).
• Layer 4 switching provides additional datagram inspection by reading the port numbers
found in the Transport layer header to make routing decisions (i.e. ports used by UDP
or TCP).
• The largest benefit of layer 4 switching is that the network administrator can configure a
layer 4 switch to prioritize data traffic by application, which means a QoS can be defined
for each user.

Multi-layer switching (MLS)


• Multi-layer switching combines layer 2, 3 and 4 switching technologies and provides
high-speed scalability with low latency.
• Multi-layer switching can make routing/switching decisions based on the following
 MAC source/destination address in a Data Link frame
 IP source/destination address in the Network layer header
 Protocol field in the Network layer header
 Port source/destination numbers in the Transport layer header

Network Book New(1) Page 36


Switch Frame Forwarding Types
○ Switch Frame Frame Forwarding
Switching Methods ( ) Forward
1. Cut-Through Switching
2. Store and Forward Switching
3. Fragment Free Switching

Cut Through Switching


○ Cut Through Switching Frame Minimal Information
Forward Switching

○ Cut Through Switching Switch Layer 2 Frame


Destination MAC Address MAC Address
Port Forward
○ Cut Through Switching Frame Destination Address
Forward Switching
Cut Through Switching Latency Decrease

○ Frames Destination MAC Address


Forward Cut Through Switching
Switching Methods Switching

○ Frames
Frame Valid Error

○ Cut Through Switching Cisco Data Center Series Switches


Nexus Switches
○ Nexus Series Switches Cut Through Switching Layer 2 Frame
Destination MAC Address Frame
Ether Type Ether Type
IPv4 Frame Access Control List
Information QOS (Quality Of Service) Information
Switch
Port Blocking Maintenance

Network Book New(1) Page 37


Store and Forward Switching
○ Store and Forward Switching Switch Frame Forward
Frames Frame
Frame FCS (Frame Check
Sequence) Frame Corrupted
Corrupted Frame Forward

○ Frame Corrupted
Network Corrupted
Frames Bandwidth Loading
Frames Corrupted
Redundancy
○ Frame FCS
Forward
Store and Forward Switching Cut Through Switching

○ Store and Forward Switching Frame FCS


Ethernet Frame FCS
Frame FCS Switch FCS
Frame Corrupted
Port Forward Frame Forward

Network Book New(1) Page 38


Fragment Free Switching
○ Layer 2 Frames (Ethernet Frames) Frames
Collision Network Entire
Frame Collision
Frame 64 Bytes
Collision
○ Frames Network 64 Bytes Data
Collision Ethernet Collision
Detect System CSMA/CD Collision

○ Fragment Free Switching Cut Through Switching Store and Forward


Switching Methods Switching Method

○ Fragment Free Switching Frame Collision


Frame Forward
○ Fragment Free Switching Frame Receive
Frame 64 Bytes Receive
Frame Network Collision
Forward
○ Fragment Free Switching Entire Frame
Frame Forward FCS
Frame Error
Collision

○ Entire Frame
Delay Collision
Frames Destination

Network Book New(1) Page 39


The Differences between Bandwidth and Speed

• A link in a network is determined by two factors, bandwidth and speed. These are
usually the same but not always.

• Definition: Speed is bit rate of the circuit while bandwidth is the amount of “speed”
available for use.

• As an example, a 500 Megabit Ethernet MPLS service which uses a 1 Gigabit Ethernet
connection to site would have a bandwidth of 500Mbps and a speed of 1 Gbps.

• Speed is commonly determined by the physical signaling of the underlying network.

• The most common example is a Link Aggregation where a number of Ethernet


connection are bonded into a single interface. The bandwidth is the sum of the total
connections but the speed is determined by the physical network connection.

Network Book New(1) Page 40


❖ Network Standardization & Organizations
○ Network Setup Items Standard ( )
Network Standard
○ There are three main types of networking-related standards.

1. De facto Standards
▪ De facto standards Based Standard All vendors
De facto standards Vendors
Network

▪ EG. (Network Connectors , Cables , Speed , etc..)

2. Proprietary Standards
▪ Proprietary standards Vendor Create
Standard Vendor

▪ Vendor

▪ EG. (Cisco , Unix , IBM , etc..)

3. Open Standards
▪ Open standards Vendor Create
Creation Vendors
Upgrade
▪ Vendors Create

▪ EG. (USB , Wireless , Linux , etc..)

Network Book New(1) Page 41


❖ American National Standards Institute (ANSI)

○ ANSI United State Organizations , Companies Invention


Products (Quality Control) Based-Line Standards
Organization (Electronic Industry , Chemical ,
Health , Constructions , etc )
○ ANSI Industries
Governments

○ ANSI Global Products Standardization


( ) Global Standardization 2

International Organization of Standardization (ISO) Standard


○ Switzerland , Geneva
○ 157

○ Company Products Quality


Standard (All Products
Including Electric , Chemical , Health , etc..)

International Electrotechnical Commission (IEC) Standard


○ Electronic Products Technologies Quality
Standard
○ Headquarters Geneva Switzerland
60

Network Book New(1) Page 42


Institute of Electrical and Electronics Engineers (IEEE)
○ I-triple-E (I E E E )
○ Electrical Engineering Field Computer Science Field
Development
Developers Engineers

○ Membership Scientists , engineers , Computer Scientists , etc..

○ Network Equipment
IEEE Working Group
IEEE 802.x

○ IEEE 802.x Working Group Networking Equipment


Products Standard (
) Product Standardization Paper

○ IEEE Working Group Product Standardization Paper


Companies Networking
Equipment
○ IEEE 802.x Working Group Working Groups 22

Network Book New(1) Page 43


❖ IEEE 802. Working Groups
○ IEEE 802. Working Groups Networking Technologies LAN ,
MAN , WAN Technologies Standards

○ IEE 802. Working Groups Active Groups


 Active Groups
▪ 802.1 Higher Layer LAN Protocols Working Group
▪ 802.3 Ethernet Working Group
▪ 802.11 Wireless LAN Working Group
▪ 802.15 Wireless Personal Area Network (WPAN) Working Group
▪ 802.16 Broadband Wireless Access Working Group
▪ 802.17 Resilient Packet Ring Working Group
▪ 802.18 Radio Regulatory Technical Advisory Group
▪ 802.19 Coexistence Technical Advisory Group
▪ 802.20 Mobile Broadband Wireless Access (MBWA) Working Group
▪ 802.21 Media Independent Handoff Working Group
▪ 802.22 Wireless Regional Area Networks

 Inactive Groups
▪ 802.2 Logical Link Control Working Group
▪ 802.5 Token Ring Working Group

 Disbanded Groups
▪ 802.4 Token Bus Working Group
▪ 802.6 Metropolitan Area Network Working Group
▪ 802.7 Broadband TAG
▪ 802.8 Fiber Optic TAG
▪ 802.9 Integrated Services LAN Working Group
▪ 802.10 Security Working Group
▪ 802.12 Demand Priority Working Group
▪ 802.14 Cable Modem Working Group
▪ QOS/FC Executive Committee Study Group

Network Book New(1) Page 44


❖ US Standard Organizations
○ US Electrical Products Telecommunication
Products Standardization
Organizations
○ EIA TIA
○ EIA / TIA American Standardization
ANSI Globally Standardization

Telecommunications Industry Association (TIA)


○ Telecommunications technologies Standard
Corporations
○ Radio Signal Equipment , Cellular Towers , Satellites
Standard
○ EG. TIA-942 for Data Center Standard , TIA-222-G for Antennas

Electronic Industries Alliance (EIA)


○ EIA United States Electric Device Manufactures Companies
Corporations
○ Standard Companies
Corporations

Network Book New(1) Page 45


❖ ITU
○ International Telecommunication Union
International Telegraph Union
○ Geneva , Switzerland
○ United Nations (UN)
Information Communication Technologies Specialized
UN

○ Global telecommunication facilities development , Data network development


Organization
○ Telecommunication Companies Development

Network Book New(1) Page 46


Internet Society (ISOC)
○ Internet Technical Standards 1992
Non Profit Organization
○ Internet Technologies Research and Development
180 Professional Members
80,000

Internet Engineering Task Force (IETF)


○ IETF Internet Society (ISOC) Organization

○ IETF Internet Technologies Development


Maintenance Discussion Groups
Organization
○ IETF Create Committee Groups
 Internet Architecture Board (IAB)
 Internet Assigned Numbers Authority (IANA)
 Internet Engineering Steering Group (IESG)
 Internet-Drafts
 Request for Comments (RFCs)

○ IETF Birds of a Feather (BOF) discussion group BOF


discussion group IETF Create Groups
Groups Group

Internet Architecture Board (IAB)


○ Internet Architecture Rules Defined , Managing
Group

Network Book New(1) Page 47


Internet Assigned Numbers Authority (IANA)

○ 1988 US Government
○ Playa Vista , California , US
○ Non-profit Organization
○ IANA Internet
▪ Global IP Address (IPv4 and IPv6 Addresses) Allocation
▪ Autonomous System (AS) Number Allocation
▪ Domain Name System Management (DNS) Root Zone Management
▪ MIME Type / Content Type (Media Types) Management
(Multipurpose Internet Mail Extensions)
▪ Internet Protocol Symbols and (Port) Numbers Management
▪ Time Zone Management

○ IANA Internet Functions 3

I. (Function 1) Internet Protocols Protocols Names Numbers


Register

II. (Function 2) Internet Top-Level Domain Names (DNS Root)


Maintaining Internationalized Domain Name
(IDN) Registry Maintaining

III. (Function 3) Internet IP Addresses Autonomous


System (AS) Numbers Provide

Network Book New(1) Page 48


Internet Engineering Steering Group (IESG)
○ IETF Activities Deployment States

Internet-Drafts
○ Internet-Drafts IFTF Deploy
Information Data Documents

Requests For Comments (RFC)


• Request For Comments (RFC) is a paper describing a protocol or technology.
• RFC's are used as a platform to encourage and facilitate correspondence among the
engineers who are involved in developing a new technology or a protocol.
• RFCs help in providing feedback and collaboration among engineers.
• An RFC is a paper that has been written by an engineer, a team of engineers, or just
someone who has an innovative idea, to define a new technology or enhance an
existing technology.
• After an RFC is written and posted, it can be evaluated, and used by other engineers
and developers.
• If another engineer or developer can improve on the theory or standard, the RFC
provides an open forum to do so.
• An RFC can be submitted for review to the IETF (Internet Engineering Task Force).
• Engineers from the IETF review the papers that are submitted and assign a number to
each.
• From that point on, the RFC number becomes the effective "name" of the paper. There
are currently more than 5,000 RFCs. RFC's can be searched in RFC search
Engine, http://www.rfc-editor.org/rfcsearch.html, by using the RFC number or by the
technology name.

Network Book New(1) Page 49


About IP Address
○ Internet Protocol (IP) Addresses

○ TCP/IP Networks Node Identifier

○ IP Address types 2
▪ IPv4 (Internet Protocol Version 4)
▪ IPv6 (Internet Protocol Version 6)

 (IPv4 32-bits Decimal Notation )


 192.168.1.1

 (IPv6 128-bits Hexadecimal Notation )


 2001:db8:0:1234:0:567:8:1

Address Space
○ IPv4 32 bits IPv4 Addresses Limits 232
IP Addresses 4,294,967,296 (Nearly 4.3 Billions) (109)
(4.3 Billions Addresses Block Private Network Addresses (18 Millions)
Multicast Addresses (270 Millions) Reserved )

○ IPv6 128 bits 2128 IP Addresses


340,282,366,920,938,463,463,374,607,431,768,211,456 (340 undecillion addresses)
36
(10 )

Standardization
○ 1981 IPv4 IETF publication RFC 791 Standardized
○ 1995 128-bits IPv6 IETF publication RFC 2460
Standardized

Transmission Guarantee
○ IPv4 (Internet Protocol Version 4) Protocol IPv6 (Internet Protocol
Version 6) Protocol Connection Less Protocol Data Guarantee
IP Addresses Data Guarantee Upper Layer Protocol
TCP Protocol

Address Managing Organization


○ IPv4 IPv6 Address Spaces Internet Assigned Numbers Authority (IANA)
Management Regional Internet
Registries (RIRs) RIRs
Internet Service Provider (ISP) (also called "Local Internet Registries")
Addresses Blocks

Network Book New(1) Page 50


RIR and IANA
○ IANA IP Addresses Managing Regional Internet
Registries (RIRs) Create
○ RIR Internet Number IP Address Autonomous
System (AS) Numbers Management Organization
IANA World Regions RIRs 5

 AFRINIC (African Network Information Centre)


[Africa]

 ARIN (American Registry for Internet Numbers)


[US , Canada , Antarctica , Some Caribbean Region]

 APNIC (Asia Pacific Network Information Centre)


[Asia , Australia , New Zealand]

 LACNIC (Latin America and Caribbean Network Information Centre)


[Latin America , Parts of Caribbean Region]

 RIPE NCC (Reseaux IP Europeans Network Coordination Centre)


[Europe , Russia , Middle East , Central Asia]

Network Book New(1) Page 51


AFRINIC

IPv4 Block IPv6 Block


41.0.0.0/8 2C00::/12
102.0.0.0/8 2001:4200::/23
105.0.0.0/8
154.0.0.0/8
165.255.0.0/16
196.0.0.0/8
197.0.0.0/8

ARIN

IPv4 Block IPv4 Block IPv6 Block


23.0.0.0/8 173.0.0.0/8 2001:0400::/23
24.0.0.0/8 174.0.0.0/8 2001:1800::/23
45.16.0.0/12 184.0.0.0/8 2001:4800::/23
45.32.0.0/11 192.0.0.0/8 2600:0000::/12
45.72.0.0/13 198.0.0.0/8 2602:0000::/16
50.0.0.0/8 199.0.0.0/8 2601:0000::/23
63 to 76 .0.0.0/8 204.0.0.0/8 2620:0000::/23
96 to 100.0.0.0/8 205.0.0.0/8
104.0.0.0/8 206.0.0.0/8
107.0.0.0/8 207.0.0.0/8
108.0.0.0/8 208.0.0.0/8
135.0.0.0/8 209.0.0.0/8
136.0.0.0/8 216.0.0.0/8
142.0.0.0/8
147.0.0.0/8
162.0.0.0/8
166.0.0.0./8
172.0.0.0/8

Network Book New(1) Page 52


APNIC
IPv4 Block IPv4 Block IPv4 Block IPv4 Block IPv6 Block
1.0.0.0/8 126.0.0.0/8 137.59.0.0/16 192.140.120.0/17 2001:0200::/23
14.0.0.0.0/8 169.0.0.0/12 139.5.0.0/16 192.144.80.0/20 2001:0C00::/23
27.0.0.0/8 175.0.0.0/8 144.48.0.0/16 216.250.96.0/20 2001:0E00::/23
36.0.0.0/8 180.0.0.0/8 146.196.32.0/19 2001:4400::/23
39.0.0.0/8 182.0.0.0/8 146.196.64.0/18 2001:8000::/19
42.0.0.0/8 183.0.0.0/8 150.107.0.0/16 2001:A000::/20
49.0.0.0/8 202.0.0.0/8 150.129.0.0/16 2001:B000::/10
58.0.0.0/8 203.0.0.0/8 157.119.0.0/16 2400:0000::/12
59.0.0.0/8 210.0.0.0/8 160.19.48.0/21 2001:0DC0::27
60.0.0.0/8 211.0.0.0/8 160.19.208.0/20 2001:0DE8::/29
61.0.0.0/8 218.0.0.0/8 160.20.0.0/20 2001:0DF0::/29
101.0.0.0/8 219.0.0.0/8 160.20.40.0/21 2001:07FA::/32
103.0.0.0/8 220.0.0.0/8 160.20.48.0/20 2001:0DE0::/29
106.0.0.0/8 221.0.0.0/8 160.202.8.0/21 2001:0DB8::/32
110.0.0.0/8 222.0.0.0/8 160.202.32.0/19
111.0.0.0/8 223.0.0.0/8 160.238.64.0/19
112.0.0.0/8 43.224.0.0/13 162.12.240.0/21
113.0.0.0/8 43.236.0.0/14 163.47.4.0/22
114.0.0.0/8 43.240.0.0/14 163.47.8.0/21
115.0.0.0/8 43.245.0.0/16 163.47.16.0/23
116.0.0.0/8 43.246.0.0/15 163.47.18.0/24
117.0.0.0/8 43.248.0.0/14 163.47.20.0/23
118.0.0.0/8 43.252.0.0/16 163.47.32.0/21
119.0.0.0/8 43.254.0.0/15 163.47.40.0/22
120.0.0.0/8 45.64.0.0/16 163.47.44.0/23
121.0.0.0/8 45.65.0.0/20 163.47.47.0/23
122.0.0.0/8 45.65.16.0/20 163.47.48.0/20
123.0.0.0/8 45.65.32.0/19 163.47.64.0/18
124.0.0.0/8 45.112.0.0/12 163.47.128.0/17
125.0.0.0/8 45.248.0.0/13 163.53.0.0/16

Network Book New(1) Page 53


LACNIC

IPv4 Block IPv6 Block


177.0.0.0/8 2001:1200::/23
179.0.0.0/8 2800:0000::/12
181.0.0.0/8
186.0.0.0/8
187.0.0.0/8
189.0.0.0/8
190.0.0.0/8
191.0.0.0/8
200.0.0.0/8
201.0.0.0/8

RIPE NCC IPv4 Lists


https://www-public.tem-tsp.eu/~maigron/RIR_Stats/RIPE_Allocations/IPv4/ByNb/index.html

RIPE NCC IPv6 Lists


https://www-public.tem-tsp.eu/~maigron/RIR_Stats/RIPE_Allocations/IPv6/ByNb/index.html

Check RIR Information by country here !


https://www-public.tem-tsp.eu/~maigron/RIR_Stats/index.html

Network Book New(1) Page 54

You might also like