CSE - 2103 Tutorial #1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 39

1

CSE 2103
Computer Networks and
Data Communications I

Tutorials

Timothy Velloza and


Devindra Kashrinandan
Topic in Focus

Network Devices
3
Tutorial Outline

▸ Section I: Introduction
▸ Section II: Network Devices
▸ Section III: Questions
4

Section I

Introduction
5
Tutorial Times

▸ 18:00pm-19:00pm (Friday | Group 1)


▸ 19:00pm-20:00pm (Friday | Group 2)
▸ 14:00pm-15:00pm (Saturday | Group 3)
▸ 15:00pm-16:00pm (Saturday | Group 4)
▸ 16:00pm-17:00pm (Saturday | Group 5)
6
Tutorial Grading Scheme

5% of overall Coursework Grade


7
Tutorial Structure

▸ Practical
▸ Theoretical
8
Tutorial Reading Material

An additional reading material not only for


this tutorial but for the overall course is the
CompTIA Network+ Cert Guide (suitable
version).
It will also give you a good preparation if
you intend to pursue the Network+
certification in the future.
9

Section II

Network
Devices
10
Network Devices

Networks are much more than just


computers and loads of wiring. Each
network comprises of several devices that
perform various functions.
Networks along with the devices they
comprise of are usually built based on an
organization’s needs.
11
Types of Network Devices

▸ Hub
▸ Switch
▸ Router
▸ VPN Concentrator
▸ DHCP Server
12
Types of Network Devices

▸ DNS Server
▸ Proxy Server
▸ Firewall
▸ Virtual Server
13
Network Devices: Hub

A hub is a network device that resides at


Layer 1 of the OSI model. As a result, a hub
does not make forwarding decisions.
Instead, a hub receives bits in on one port
and then retransmits those bits out all other
ports (that is, all ports on the hub other
than the port on which the bits were
received).
14
Network Devices: Hub

A significant downside to hubs, is that all ports


on a hub belong to the same collision domain.
Because multiple devices can reside in the
same collision domain, as is the case with
multiple PCs connected to a hub, if two
devices transmit at the same time, those
transmissions collide and have to be
retransmitted.
15
Network Devices: Switch

A switch is a network device that resides at


Layer 2 of the OSI model. Unlike a hub, which
blindly forwards received bits, a switch makes
intelligent forwarding decisions based on the
destination MAC address present in a frame.
Additionally, each port on a switch is in a
separate collision domain. However, all ports
are by default in the same broadcast domain.
16
Network Devices: Switch

A switch works by analyzing the source MAC


address information on frames entering its ports
and then populates an internal MAC address table
based on the learned information. Then, when a
frame enters the switch destined for a MAC
address known by the switch's MAC address
table, the switch then forwards the frame out the
appropriate port.
17
Network Devices: Router

A router is a network device that resides at Layer


3 of the OSI model. A router makes forwarding
decisions based on the IP Address information
contained in a packet. A router is used to
interconnect multiple networks. For traffic to
travel between two devices that belong to
different networks, that traffic must be routed
appropriately. Each port on a router is a separate
collision domain and a separate broadcast
18
Network Devices: Summary
19
Network Devices: VPN Concentrator

Companies with locations spread across multiple


sites often require secure communications
between those sites. One option is to purchase
multiple WAN connections interconnecting those
sites. Sometimes, however, a more cost-effective
option is to create secure connections through an
untrusted network, such as the Internet. Such a
secure tunnel is called a virtual private network
(VPN).
20
Network Devices: VPN Concentrator

Consider a company headquarters location with


VPN connections to each of 100 remote sites. The
device at the headquarters terminating these VPN
tunnels might have to perform encryption and
authentication for each tunnel, resulting in a heavy
processor burden on that device. A dedicated
device, called a VPN concentrator, can be used to
perform the processor-intensive tasks required to
terminate multiple VPN tunnels.
21
Network Devices: DHCP Servers

Most modern networks have IP addresses


assigned to network devices, and those
logical Layer 3 addresses are used to route traffic
between different networks. IP Address
assignment to a network device is either done
manually or dynamically. Via the use of a DHCP
server, IP Addresses can be assigned to several
devices with very little effort.
22
Network Devices: DHCP Servers

The most common approach for this auto


assignment of IP addresses is Dynamic Host
Configuration Protocol (DHCP). Not only does
DHCP assign an IP address to a network device, it
can assign a wide variety of other IP parameters,
such as a subnet mask, a default gateway, and the
IP address of a DNS server.
23
Network Devices: DHCP Servers
24
Network Devices: DNS Servers

A Domain Name System (DNS) server performs


the task of taking a domain name and resolving
that name into a corresponding IP address.
Because routers make their forwarding decisions
based on Layer 3 information (for example, IP
addresses), an IP packet needs to contain IP
address information, not DNS names.
25
Network Devices: DNS Server
26
Network Devices: DNS Server

A DNS server’s database contains not only FQDNs


and corresponding IP addresses, but also DNS
record types. For example, a Mail Exchange (MX)
record would be the record type for an e-mail
server.
27
Network Devices: DNS Server
28
Network Devices: Proxy Server

Some clients are configured to forward their


packets, which are seemingly destined for the
Internet, to a proxy server. This proxy server
receives the client’s request, and on behalf of that
client (that is, as that client’s proxy), the proxy
server sends the request out to the Internet. When
a reply is received from the Internet, the proxy
server forwards the response on to the client.
29
Network Devices: Proxy Server
30
Network Devices: Proxy Server

Some benefits of deploying a proxy server include:


▸ An added layer of security
▸ Bandwidth-Savings
▸ Content-filtering
31
Network Devices: Firewall

Today’s networks are increasingly dependent on


connectivity with other networks. However,
connecting an organization’s trusted network to
untrusted networks, such as the Internet,
introduces security risks. Security risks even exist
within an organization. To protect your
organization’s data from malicious users or
programs, you need to implement some form of
security.
32
Network Devices: Firewall

A firewall is primarily a network security appliance


which stands guard at the door of your network. A
firewall offers multiple options for security such
as protecting your internal network from malicious
internet traffic.
33
Network Devices: Firewall
34
Network Devices: Virtual Servers

The computing power available in a single high-


end server is often sufficient to handle the tasks
of multiple independent servers. With the advent
of virtualization, multiple servers (which might be
running different operating systems) can run in
virtual server instances on one physical device.
Although a virtual server may have one NIC
interface, many virtual server platforms support
multiple NICs.
35
Network Devices: Virtual Servers
36
Network Devices: Virtual Servers

Benefits of server virtualization includes:


▸ Faster backups and recovery in case of failure
▸ Reduced hardware costs
▸ Significant Energy Cost Savings
▸ Faster Server Provisioning and Deployment
37
Network Devices: Miscellaneous

▸ Multilayer Switch
▸ Content Engines
▸ Virtual router/switch/firewall/desktop
38
Conclusion

END
39

Section III

Questions

You might also like