Professional Documents
Culture Documents
Facilitador
Diego Avila Pesntez
Estudios: Ingeniero en Sistemas Informticos ( UC 1997) Maestra en Internetworking (U. de Chile 2002) Diplomado en Docencia Universitaria (2000) Maestra en Informtica Aplicada (ESPOCH 2003) Estudiante del Doctorado en Ingeniera en Sistemas e Informtica. UMNSM Certificaciones Internacionales: CCNA (Cisco Certified Netwok Associete) CCNP(Cisco Certified Network Proffesional)
Motivacin
http://www.youtube.com/watch?v=itIy8jlVF6o
Agenda
Conceptos Generales, modelo OSI & TCP/IP
Bibliografa
Isaacs, M. Internet User's Guide to Network Resource Tools: http://www.terena.nl/gnrt/. Estupenda gua sobre las herramientas y servicios de Internet. Imprescindible para cualquier usuario habitual u ocasional. McKeon, B. An Introduction to the OSI Reference Model: http://ntrg.cs.tcd.ie/undergrad/4ba2/ . Muy buen resumen del modelo OSI y de los protocolos OSI. Tambin habla de TCP/IP y ATM. Networking Essentials: http://www.labmice.net/networking/networkbasics.htm
Technology Guides for Communications & Networking: http://www.techguide.com/. Interesante recopilacin de guas tcnicas. Hay que registrarse para conseguirlas, pero es gratis. Home Page de Raj Jain: http://www.cis.ohio-state.edu/~jain/. Impresionante coleccin de materiales docentes sobre redes (presentaciones, ejercicios, etc.) Tutoriales de Network Magazine: http://www.networkmagazine.com/static/tutorial/index.html. Interesante recopilacin de artculos educativos sobre diversos temas relacionados con redes de computadores.
Bibliografa
Howe, D. Free On-Line Dictionary Of Computing: http://wombat.doc.ic.ac.uk/. Recopilacin exhaustiva de trminos informticos. Malkin, G. (RFC1983). Internet Users' Glossary. Completo diccionario de trminos y abreviaturas del mundo Internet Tech Encyclopedia: http://www.techweb.com/encyclopedia/ Webopedia: http://webopedia.internet.com/ Whatis: http://whatis.com/
Local Area Network (LAN) An individual network usually spans a single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region.
9
Wide Area Networks (WANs) Leased connections through a telecommunications service provider network. Networks that connect LANs in geographically separated locations Telecommunications service provider (Carrier) interconnect the LANs at the different locations. Voice and data on separate networks or converged networks
10
End devices
Devices (hardware) End devices, switch, router, firewall Media (wired, wireless) Cables, wireless mediums Services (software) Network applications, routing protocols, processes, algorithms
12
Client Server
A host Client, Server, or both. Software determines the role. Servers provide information and services to clients e-mail or web pages Clients request information from the server.
13
Network Media
Network media: The medium over which the message travels. Cooper wires - electrical impulses. Fiber optics pulses of light Wireless electromagnetic waves.
14
Network Media
Different media considerations (4): Distance it will carry signal Environment it works in Bandwidth (speed) Cost
15
Components of a Network
Topology Diagrams
Network Trends
The concept of any device, to any content, in anyway is a major global trend that requires significant changes to the way devices are used. This trend is known as Bring Your Own Device (BYOD).
Online Collaboration
Video Communication
Cloud Computing
Cloud computing offers the following potential benefits: Organizational flexibility Agility and rapid deployment Reduced cost of infrastructure Refocus of IT resources Creation of new business models
Data Centers
A data center is a facility used to house computer systems and associated components including: Redundant data communications connections High-speed virtual servers (sometimes referred to as server farms or server clusters) Redundant storage systems (typically uses SAN technology) Redundant or backup power supplies Environmental controls (e.g., air conditioning, fire suppression) Security devices
Powerline Networking
Wireless Broadband
Network Security
Network Security
Security Threats
The most common external threats to networks include: Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-hour attacks Hacker attacks Denial of service (DoS) attacks Data interception and theft Identity theft
Security Solutions
Network security components often include: Antivirus and antispyware Firewall filtering Dedicated firewall systems Access control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs)
Early days proprietary network equipment and protocols. Now Industry standards Institute of Electrical and Electronics Engineers (IEEE) Examples: 802.3 (Ethernet), 802.11 (WLAN) Internet Engineering Task Force (IETF) Internet standards RFCs (Request for Comments) Example: TCP, IP, HTTP, FTP
29
30
Protocols
Protocols
HTTP Header
Data
Frame Header
IP Header
Frame Trailer
Protocol Rules that govern communications. Protocol suite - A group of inter-related protocols Example: TCP/IP
31
The Open Systems Interconnection (OSI) model is the most widely known internetwork reference model. The International Organization for Standardization (ISO) released the OSI reference model in 1984, was the descriptive scheme they created.
32
TCP/IP Model
Frame Header
IP Header
Frame Trailer
Encapsulation Process of adding a header to the data or any previous set of headers. Decapsulation Process of removing a header.
34
Data
Encapsulation Process of adding control information as it passes down through the layered model.
35
Data
Client
HTTP Data
Decapsulation Process of removing control information as it passes upwards through the layered model.
36
Protocol Data Unit (PDU) - The form that a piece of data takes at any layer. PDUs are named according to the protocols of the TCP/IP suite. Data - Application layer PDU Segment - Transport Layer PDU Packet - Internetwork Layer PDU Frame - Network Access Layer PDU Bits - A PDU used when physically transmitting data over the medium 37
Organizarse en equipos de 4 personas. Determinar la manera como pueden describir el proceso de encapsulamiento de datos. 10 min. para planificar la presentacin.
39
TCP-IP Protocol
TCP-IP Protocol
Aplication Layer
HTTP (WWW)
We will examine HTTP in detail.
SMTP (email)
42
HTTP
Implemented in: Client program Server program Web page (also called a html document) Web page consists of objects HTML file JPEG image JAVA applet Audio file
43
HTTPS
HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) is a URL scheme used to indicate a secure HTTP connection. HTTPS is not a separate protocol combination of a normal HTTP interaction over an encrypted: Secure Sockets Layer (SSL) or Transport Layer Security (TLS) connection
44
FTP was developed to allow for file transfers between a client and a server. Used to push and pull files from a server running the FTP daemon (FTPd). RFC 959
45
POP3 IMAP
Internet mail involves: User agents Allows users to read, reply, compose, forward, save, etc., mail messages GUI user agents: Outlook, Eudora, Messenger Text user agents: mail, pine, elm Mail servers Stores user mail boxes, communicates with local user agents and other mail servers. SMTP Principle application layer protocol for Internet mail Sent over TCP 46 Mail access protocols: POP3, IMAP4, HTTP
Telnet
Telnet Telnet Server
Allows a user to remotely access another device (host, router, switch). Connection called a Virtual Terminal (VTY) session. Telnet clients: Putty Teraterm Hyperterm
47
Telnet
Supports user authentication, Does not encrypt data. Secure Shell (SSH) protocol offers an alternate and secure method for server access. Stronger authentication Encrypts data
48
50
TCP
0 16-bit Source Port Number 15 16 31 16-bit Destination Port Number 32-bit Sequence Number 32 bit Acknowledgement Number 4-bit Header Length 6-bit (Reserved)
U A P R S F R C S S Y I G K H T N N
UDP provides: Unreliable delivery No error checking No flow control No congestion control No ordered delivery
TCP provides: Reliable delivery Error checking Flow control Congestion control Ordered delivery (Connection establishment)
52
TCP Header
0 16-bit Source Port Number 15 16 31 16-bit Destination Port Number
53
TCP Header
source port -- the number of the calling port destination port -- the number of the called port sequence number -- the number used to ensure correct sequencing of the arriving data acknowledgment number -- the next expected TCP octet HLEN -- the number of 32-bit words in the header reserved -- set to 0 code bits -- the control functions (e.g. setup and termination of a session) window -- the number of octets that the sender is willing to accept checksum -- the calculated checksum of the header and data fields urgent pointer -- indicates the end of the urgent data option -- one currently defined: maximum TCP segment size data -- upper-layer protocol data
54
Three-way Handshake
55
1. When the client has no more data to send in the stream, it sends a segment with the FIN flag set. 2. The server sends an ACK to acknowledge the receipt of the FIN to terminate the session from client to server. 3. The server sends a FIN to the client, to terminate the server to client session. 4. The client responds with an ACK to acknowledge the FIN from the server.
56
UDP
0 16-bit Source Port Number 15 16 16-bit Destination Port Number 31
source port -- the number of the calling port destination port -- the number of the called port UDP length -- the length of the UDP header checksum -- the calculated checksum of the header and data fields data -- upper-layer protocol data
57
UDP
0 16-bit Source Port Number 15 16 16-bit Destination Port Number 31 16-bit UDP Length 16-bit UDP Checksum
Client
Server
Time
Why would an application developer choose UDP rather than TCP? Finer application-layer control TCP will continue to resend segments that are not acknowledged. Applications that use UDP can tolerate some data loss: Streaming video VoIP (Voice over IP) Application decides whether or not to resend entire file: TFTP
58
Network Layer
IPv4
IPv6
59
Network Layer
0 4-bit Version 4-bit Header Length 8-bit Type Of Service (TOS) 15 16 16-bit Total Length (in bytes) 3-bit Flags 31 16-bit Identification 13-bit Fragment Offset
8-bit Protocol
Data
60
Assignment of IP Addresses
Regional Internet Registries (RIRs)
IP Header IPv4
IP Destination Address 32-bit binary value that represents the packet destination Network layer host address. IP Source Address 32-bit binary value that represents the packet source Network layer host address.
Where I am going.
62
IP Header IPv4
Sending hosts generates the value for TTL. Common operating system TTL values are: UNIX: 255 Linux: 64 or 255 depending upon vendor and version Microsoft Windows 95: 32 Microsoft Vista: 128 Protocol field enables the Network layer to pass the data to the appropriate upper-layer protocol. Example values are: 01 ICMP, 06 TCP, 17 UDP Type-of-Service is used to determine the priority of each packet. Enables Quality-of-Service (QoS) mechanism for high priority traffic. What types of traffic might a network administrator need to give priority to? Traffic that cannot accept any delays. VoIP, Streaming video
63
Shared address space addresses: Not globally routable Intended only for use in service provider networks
Network/Subnets Address
172.16.10.0/24
172.16.10.100/24
172.16.20.0/24
172.16.20.77/24
172.16.30.0/24
172.16.30.39/24
172.16.40.0/24
172.16.40.123/24
172.16.10.55/24
172.16.20.96/24
172.16.30.10/24
172.16.40.51/24
172.16.10.1/24
172.16.20.1/24
172.16.30.1/24
172.16.40.1/24
Networks can be subdivided into subnets. This provides for several benefits which we will discuss later. Networks can be grouped based on factors that include: Geographic location, Purpose, Ownership
67
Routing
Network 192.168.1.0/24 Network 192.168.2.0/24 192.168.1.254/24
Static routes Manually entered by the administrator Dynamic Routing protocols Routers automatically learn about remote networks Ex: RIP, EIGRP, OSPF, IS-IS, BGP
68
IPv6 Addressing
128-bit hexadecimal format (0-9, A-F) Uses 16-bit hexadecimal number fields separated by colons (:) Every 4-hexadecimal digits are equivalent to 16-bits. Consists of 8 hextets/quartets which is the equivalent to 16bits per-hextet.
2001:0DB8:0001:5270:0127:00AB:CAFE:0E1F /64
- 2001 in hexadecimal is 0010 0000 0000 0001 in
binary
The Site Prefix or Global Routing Prefix is the first 3 hextets or 48-bits of the address. It is assigned by the service provider. The Site Topology or Subnet ID Is the 4th hextet of the address. The Interface ID is the last 4 hextets or 64-bits of the address. It can be manually or dynamically assigned using the EUI-64 command. (Extended Unique Identifier)
2001:0000::/23 IANA 2001:0200::/23 APNIC (Asia/Pacific Region) 2001:0400::/23 ARIN (North America Region) 2001:0600::/23 RIPE (Europe, Middle East and Central Asia)
The 4th hextet represent the Site Topology/Subnet ID. - Allows 65,536 subnets with 18,446,744,073,709,551,616 (18 quintillion) for each subnet. - Not part of the host address field.
The Interface ID are the remaining 64-bits of the address. Can be manually configured or dynamically by using the EUI-64 (Extended Unique Identifier). The EUI-64 command uses the device 48-bits MAC Address and convert it into 64-bits by adding FF:FE in the middle of the address. The first (network) and last (broadcast) address may be assigned to an interface. An interface may contain more than one IPv6 address. There are no broadcast addresses, multicast is used instead.
Double Colons can only be used to compress a single contiguous 16bits blocks. You cannot use double colons to include part of a block.
Double Colons can only be used once in an address, if it's used more than once the address could be ambiguous
Data Link layer Connects the Network Layer with the Physical Layer Network Layer and above is software (IP, TCP, HTTP, etc.) Physical layer is implemented in hardware (converting bits to a transmission signal) Data Link layer is implemented in both: Software Hardware Data Link Layer prepares Network Layer packets for transmission across some form of media, be it copper, fiber, or the atmosphere.
77
Data Link layer has two sublayers (sometimes): Logical Link Control (LLC) Software processes that provide services to the Network layer protocols. Frame information that identifies the Network layer protocol. Multiple Layer 3 protocols, (IP and IPX) can use the same network interface and media. Media Access Control (MAC) - Media access processes performed by the hardware. Provides Data Link layer addressing and framing of the data according to the protocol in use.
78
The media access control methods used by logical multi-access topologies are typically: CSMA/CD - Hubs CSMA/CA - Wireless Token passing Token Ring
79
Coaxial Cable
Coaxial Cable
Advantages:
Less expensive than fiber It has been used for many years for many types of data communication, including cable television
Disadvantages:
More expensive and more difficult to install than twisted pair Needs more room in wiring ducts than twisted pair
Shielded twisted-pair cable (STP) combines the techniques of shielding, cancellation, and twisting of wires. Each pair of wires is wrapped in metallic foil. The four pairs of wires are wrapped in an overall metallic braid or foil. A new hybrid of UTP with traditional STP is Screened UTP (ScTP), also known as Foil Twisted Pair (FTP). ScTP is essentially UTP wrapped in a metallic foil shield, or screen.
Greater protection from all types of external and internal interference than UTP.
Reduces electrical noise within the cable such as pair to pair coupling and crosstalk. Reduces electronic noise from outside the cable, for example electromagnetic interference (EMI) and radio frequency interference (RFI).
More expensive and difficult to install than UTP. Needs to be grounded at both ends
Unshielded twisted-pair cable (UTP) is a four-pair wire medium used in a variety of networks.
When communication occurs, the signal that is transmitted by the source needs to be understood by the destination.
ST and SC Connectors
The type of connector most commonly used with multimode fiber is the Subscriber Connector (SC connector). On single-mode fiber, the Straight Tip (ST) connector is frequently used. LC (Little conector).
Copper Media
10 Mbps 10 Gbps Relatively short (1 100 meters) Low
Fibre Optic
10 Mbps 100 Gbps Relatively High (1 100,000 meters) High (Completely immune) High (Completely immune) Highest
Low
Lowest
Lowest
Highest
Lowest
Highest
Wireless Media
IEEE 802.15 standard Supports speeds up to 3 Mb/s Provides device pairing over distances from 1 to 100 meters. IEEE 802.16 standard Provides speeds up to 1 Gbps Uses a point-to-multipoint topology to provide wireless broadband access.
Wireless Media
Wireless LAN
Cisco Linksys EA6500 802.11ac Wireless Router
Wireless Media
Standard 802.11a
Frequency
5 GHz
Backwards Compatible
No
802.11b
802.11g 802.11n 802.11ac 802.11ad
11 Mbps
54 Mbps 600 Mbps 1.3 Gbps (1300 Mbps) 7 Gbps (7000 Mbps)
2.4 GHz
2.4 GHz 2.4 GHz or 5 GHz 2.4 GHz and 5.5 GHz 2.4 GHz, 5 GHz and 60 GHz
No
802.11b 802.11b/g
802.11b/g/n
802.11b/g/n/ac
Tarea Extraclase:
Realizar un mapa mental sobre caractersticas de cables: UTP/STP Cat 5e, Cat 6, Cat 6A, Cat 7, Fibra ptica multimodo, Fibra ptica monomodo. Stack de protocolos que utiliza la aplicacin VoIP utilizando Wireshark. Simulacin de la red de Campus utilizando el Packet Tracer de Cisco.