530 likes | 544 Views
Unit 2 TCP/IP Network, Transport & Application Layers Chapters 5-7 NT2640.U2.PS1. Class Agenda 11/21/16. Learning Objectives Unit 2: Presentation and Discussions and Videos Chapter 5-7 Discussion on Lab Activities. Discussion on Assignments. Break Times. 10 Minutes break in every 1 Hour.
E N D
Unit 2TCP/IP Network, Transport & Application Layers Chapters 5-7NT2640.U2.PS1
Class Agenda 11/21/16 • Learning Objectives • Unit 2: Presentation and Discussions and Videos • Chapter 5-7 • Discussion on Lab Activities. • Discussion on Assignments. • Break Times. 10 Minutes break in every 1 Hour. • Note: Submit all Assignment and labs due today.
Objectives • In this unit, students will demonstrate an: • Understanding of Network Layer Addressing • Understand of Basic IP Routing Concepts • Understanding of Basic IP Subnetting Principles • Understanding of the Differences between and the Features of the Layer 4 Protocols TCP & UDP • Understanding of Basic Network Security Concepts including Common Issues and Defenses • Understanding Tasks Involved in the Installation of Cisco IOS Devices • Understanding the Basic Tasks Involved in the Accessing the Cisco IOS CLI Environment and Utilizing the Help Subsystem
Network Layer Addressing and Layer 4 ProtocolsChapters 5 & 6NT2640-U2-PS1 Chapter1 4
Example 19.1 Change the following IPv4 addresses from binary notation to dotted-decimal notation. Solution We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation.
Figure 19.2 Finding the classes in binary and dotted-decimal notation
Figure 19.7 Configuration and addresses in a subnetted network
Address Formats When Subnetting Is Used (Classless) • IP addressing with subnetting uses a concept called a subnet mask. A subnet mask helps define the structure of an IP address,
ROUTING or FORWARDING Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table. When a host has a packet to send or when a router has received a packet to be forwarded, it looks at this table to find the route to the final destination. Forwarding TechniquesForwarding Process Routing Table
Network Layer Utilities • (ARP) Address Resolution Protocol • (DNS) Domain Name System • (DHCP) Dynamic Host Configuration Protocol • (ICMP) Internet Control Message Protocol used for troubleshooting - Ping & Tracert
Chapter 6 Fundamentals of TCP/IP Transport, Applications, and Security
Multiplexing Using TCP Port Numbers • The computer might be running many applications, such as a web browser, an e-mail package, or an Internet VoIP application (for example, Skype). • TCP and UDP multiplexing enables the receiving computer to know which application to give the data to.
6-1 MULTIPLEXING Whenever the bandwidth of a medium linking two devices is greater than the bandwidth needs of the devices, the link can be shared. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. As data and telecommunications use increases, so does traffic.
Connection & Connectionless Protocols • Connection-oriented protocol: A protocol that requires an exchange of messages before data transfer begins or that has a required preestablished correlation between two endpoints • Connectionless protocol: A protocol that does not require an exchange of messages and that does not require a preestablished correlation between two endpoints
Firewalls • IDS and IPS • VPN
Cisco Routers • Cisco routers need to know several pieces of information before they can start routing IP packets. • First, they need to know which of their physical interfaces currently connect to real LANs and WANs. • Next, the router needs to know its IP address and mask for each of these interfaces. • The router can then use each interface’s IP address/mask pair to calculate the subnet ID of the subnet connected to that interface. • Finally, the routers need to advertise information about the subnets, so that all routers learn about all subnets, and can then choose the best route with which to forward packets to reach each subnet.
Installing Cisco Routers • Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. • Routers forward packets by connecting to various physical network links, like Ethernet, serial links, and Frame Relay, and then using Layer 3 routing logic to choose where to forward each packet. • A typical enterprise network has a few centralized sites as well as lots of smaller remote sites. • To support devices at each site (the computers, IP phones, printers, and other devices), the network includes at least one LAN switch at each site.
Router Installation • Step 1: Connect any LAN cables to the LAN ports. • Step 2: If using an external CSU/DSU, connect the router’s serial interface to the CSU/DSU, and the CSU/DSU to the line from the telco. • Step 3: If using an internal CSU/DSU, connect the router’s serial interface to the line from the telco. • Step 4: Connect the router’s console port to a PC (using a rollover cable), as needed, to configure the router. • Step 5: Connect a power cable from a power outlet to the power port on the router. • Step 6: Turn on the router.
Steps for Install a SOHO router • Step 1: Connect a UTP straight-through cable from the router to the switch. • Step 2: Connect a UTP straight-through cable from the router to the cable modem. • Step 3: Connect the router’s console port to a PC (using a rollover cable), as needed, to configure the router. • Step 4: Connect a power cable from a power outlet to the power port on the router. • Step 5: Turn on the router.
SOHO Network, Using Cable Internet with an Integrated Device
Accessing the CLI with Telnet and SSH • To use Telnet, the user must install a Telnet client software package on his or her PC. • Most terminal emulator software packages today include both Telnet and SSH client functions. • The router runs Telnet server software by default, but the router does need to have an IP address configured so that it can send and receive IP packets. • Additionally, the network between the PC and router needs to be up and working so that the PC and router can exchange IP packets.
Password Security for CLI Access • By default, a Cisco router is very secure as long as the router is locked inside a room. • By default, a router allows only console access, but no Telnet or SSH access. • From the console, you can gain full access to all router commands, and if so inclined, you can stop all functions of the router. • However, console access requires physical access to the router, so allowing console access for routers just removed from the shipping boxes is reasonable.
User and Enable (Privileged) Modes • All three CLI access methods covered so far (console, Telnet, and SSH) place the user in an area of the CLI called user EXEC mode. • User EXEC mode, sometimes also called user mode, allows the user to look around but not break anything. • The “EXEC mode” part of the name refers to the fact that in this mode, when you enter a command, the router executes the command and then displays messages that describe the command’s results. • Cisco IOS supports a more powerful EXEC mode called enable mode (also known as privileged mode or privilegedEXEC mode). • Enable mode is so named because the enable command is used to reach this mode. • Privileged mode earns its name because powerful, or privileged, commands can be executed there. You can use the reload command, which tells the router to reinitialize or reboot Cisco IOS, only from enable mode.
Configuring Cisco IOS Software • Configuration mode is another mode for the Cisco CLI, similar to user mode and privileged mode. • User mode lets you issue non-disruptive commands and displays some information. • Privileged mode supports a superset of commands compared to user mode, including commands that might harm the router. • However, none of the commands in user or privileged mode changes the router’s configuration. • Configuration mode accepts configuration commands—commands that tell the router the details of what to do, and how to do it.
Configuration Submodes and Contexts • Configuration mode itself contains a multitude of subcommand modes. • Context-setting commands move you from one configuration subcommand mode, or context, to another. • These context-setting commands tell the router the topic about which you will enter the next few configuration commands. • More importantly, the context tells the router the topic you care about right now, so when you use the ? to get help, the router gives you help about that topic only.
Storing Router Configuration Files • RAM: Sometimes called DRAM for Dynamic Random-Access Memory, RAM is used by the router just as it is used by any other computer: for working storage. The running (active) configuration file is stored here. • ROM: Read-Only Memory (ROM) stores a bootstrap (or boothelper) program that is loaded when the router first powers on. This bootstrap program then finds the full Cisco IOS image and manages the process of loading Cisco IOS into RAM, at which point Cisco IOS takes over operation of the router. • Flash memory: Either a chip inside the router or a removable memory card, Flash memory stores fully functional Cisco IOS images and is the default location where the router gets its Cisco IOS at boot time. Flash memory also can be used to store any other files, including backup copies of configuration files. • NVRAM: Nonvolatile RAM (NVRAM) stores the initial or startup configuration file that is used when the router is first powered on and when the router is reloaded.
Configuration Mode, changes for the running-config file • Step 1: The original hostname command on the router, with the startup-config file matching the running-config file. • Step 2: The hostname command changes the hostname, but only in the running-config file. • Step 3: The show running-config and show startup-config commands are shown, with only the hostname commands displayed for brevity, to make the point that the two configuration files are now different.
What type of cable is used for console access to a Cisco router and what is the serial communication connection properties? Describe the differences between NVRAM and flash storage Describe the differences between enable mode and configuration mode Describe the differences between startup-config an running-config Check Point