Network Devices & Initial Configuration
Network Devices & Initial Configuration
DEVICES
&
INITIAL
CONFIGURATI
ON
Chapter 1:
Network
Design
Network
Architecture
Refers to the technologies that support the
infrastructure, the programmed services
and rules, or protocols, that move data
across the network.
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
Fault Tolerance
• A fault tolerant network is a network that can continue operations without interruption when one or more
components of the network fail.
• Limits the number of affected devices during a failure. It allows quick recovery when such a failure occurs.
• These networks depend on multiple paths between the source and destination of a message. If one path fails,
the messages are instantly sent over a different link.
• Installing additional links within the network allows us to have multiple paths to reach ISP & the internet
• Having multiple paths to a destination is known as redundancy, the more redundancy in a network, the more
fault tolerant it becomes.
Scalability
• A scalable network expands quickly to support new users and applications.
• It does this without degrading the performance of services that are being accessed by existing
users.
• Networks can be scalable because the designers follow accepted standards and protocols.
Quality of Service
• As data, voice, and video content continue to converge onto the same network, QoS becomes a
primary mechanism for managing congestion and ensuring reliable delivery of content to all users.
• Network bandwidth is measured in bps. When simultaneous communications are attempted across
the network, the demand for network bandwidth can exceed its availability, creating network
congestion.
• The focus of QoS is to prioritize time-sensitive traffic. The type of traffic, not the content of the
traffic, is what is important.
Network Security
• Network administrators must address two types of network security concerns: network infrastructure security and
information security.
• They must also protect the information contained within the packets being transmitted over the network, and the
information stored on network attached devices.
There are three primary requirements to achieve the goals of network security:
• Confidentiality – means that only the intended and authorized recipients can access and read data
• Integrity - assures users that the information has not been altered in transmission, from origin to destination.
• Availability - assures users of timely and reliable access to data services for authorized users.
Physical and Logical Addresses
The IP address is similar to the address of a person. It is known as a logical address because it is
assigned logically based on where the host is located. The IP address, or network address, is assigned
to each host by a network administrator based on the local network.
• IP addresses contain two parts. One part identifies the network portion. The network portion of the
IP address will be the same for all hosts connected to the same local network.
• The second part of the IP address identifies the individual host on that network. Both the physical
MAC and logical IP addresses are required for a computer to communicate on a hierarchical network.
Chapter 2:
Cloud &
Virtualizati
on
Cloud & Cloud Services
When talking about the cloud, we are talking about data centers, cloud
computing, and virtualization.
• Data centers are usually large facilities which provide massive amounts of
power, cooling, and bandwidth. Only very large companies can afford their
own data centers. Most smaller organizations lease the services from a
cloud provider.
Advantages
One major advantage of virtualization is overall reduced cost:
• Less equipment is required - Virtualization enables server consolidation, which requires fewer physical devices and lowers
maintenance costs.
• Less energy is consumed - Consolidating servers lowers the monthly power and cooling costs.
• Less space is required - Server consolidation reduces the amount of required floor space.
These are additional benefits of virtualization:
• Easier prototyping - Self-contained labs, operating on isolated networks, can be rapidly created for testing and prototyping
network deployments.
• Faster server provisioning - Creating a virtual server is far faster than provisioning a physical server.
• Increased server uptime - Most server virtualization platforms now offer advanced redundant fault tolerance features.
• Improved disaster recovery - Most enterprise server virtualization platforms have software that can help test and automate
failover before a disaster happens.
• Legacy support - Virtualization can extend the life of OSs and applications providing more time for organizations to migrate to
newer solutions.
Hypervisors
The hypervisor is a program, firmware, or hardware that
adds an abstraction layer on top of the physical hardware.
• The abstraction layer is used to create virtual machines
which have access to all the hardware of the physical
machine such as CPUs, memory, disk controllers, and
NICs.
• Each of these virtual machines runs a complete and
separate operating system.
Type 1 Hypervisor:
• Type 1 hypervisors are also called the “bare metal”
approach because the hypervisor is installed directly on
the hardware.
• Type 1 hypervisors are usually used on enterprise
servers and data center networking devices.
• With Type 1 hypervisors, the hypervisor is installed
directly on the server or networking hardware. Then,
instances of an OS are installed on the hypervisor, as
shown in the figure.
• Type 1 hypervisors have direct access to the hardware
resources; therefore, they are more efficient than
hosted architectures. They improve scalability,
performance, and robustness.
Hypervisors Cont'd
Type 2 Hypervisors
• 10 Mbps
• 100 Mbps
• 1000 Mbps (1 Gbps)
• 10,000 Mbps (10 Gbps)
• 40,000 Mbps (40 Gbps)
• 100,000 Mbps (100 Gbps)
Ethernet standards define both the Layer 2 protocols and the Layer 1
technologies of the OSI Model
Data Link Sublayers
LLC and MAC have the following roles in the data link layer:
• LLC Sublayer - This IEEE 802.2 sublayer communicates between
the networking software at the upper layers and the device
hardware at the lower layers. It places information in the frame
that identifies which network layer protocol is being used for the
frame. This information allows multiple Layer 3 protocols, such as
IPv4 and IPv6, to use the same network interface and media.
• MAC Sublayer - This sublayer (IEEE 802.3, 802.11, or 802.15 for
example) is implemented in hardware and is responsible for data
encapsulation and media access control. It provides data link layer
addressing and is integrated with various physical layer
technologies.
MAC Sublayer
The MAC sublayer is responsible for data encapsulation and
accessing the media.
If the size of a transmitted frame is less than the minimum, or greater than the maximum, the
receiving device drops the frame. Dropped frames are likely to be the result of collisions or other
unwanted signals. They are considered invalid. Jumbo frames are usually supported by most Fast
Ethernet and Gigabit Ethernet switches and NICs.
Unicast MAC Address
.
Broadcast MAC
Address
An Ethernet broadcast frame is received and processed
by every device on the Ethernet LAN.
• Connectionless
• Best Effort
• Media Independent
Connectionless: There is no connection with the destination established before sending data packets.
• Connectionless communication is conceptually like sending a letter to someone without notifying the recipient in advance.
• Connectionless data communications work on the same principle. As shown in the figure, IP requires no initial exchange of control information
to establish an end-to-end connection before packets are forwarded.
Characteristics of IP Cont'd
Best Effort : The IP protocol does not guarantee that all packets that are delivered are, in fact, received.
As an unreliable network layer protocol, IP does not guarantee that all sent packets will be received. Other
protocols manage the process of tracking packets and ensuring their delivery. The figure illustrates
the unreliable or best-effort delivery characteristic of the IP protocol.
Media Independent: IP operates independently of the media that carry the data at lower layers of the
protocol stack. As shown in the figure, IP packets can be communicated as electronic signals over copper
cable, as optical signals over fiber, or wirelessly as radio signals.
The OSI data link layer is responsible for taking an IP packet and preparing it for transmission over the
communications medium. This means that the delivery of IP packets is not limited to any medium.
IPv4 Packet
• The IPv4 packet header is used to ensure that a packet is delivered to its next stop on the
way to its destination end device.
• An IPv4 packet header consists of fields containing binary numbers which are examined
by the Layer 3 process.
Significant fields in the IPv4 header include version, DS, TTL, protocol, header checksum,
source IPv4 address, and destination IPv4 address.
• Version: Contains a 4-bit binary value set to 0100 that identifies this as an IPv4 packet.
• Differentiated Services or DiffServ (DS): Formerly called the type of service (ToS)
field, the DS field is an 8-bit field used to determine the priority of each packet. The six
most significant bits of the DiffServ field are the differentiated services code point (DSCP)
bits and the last two bits are the explicit congestion notification (ECN) bits.
• Time to Live:TTL contains an 8-bit binary value that is used to limit the lifetime of a
packet. The source device of the IPv4 packet sets the initial TTL value. It is decreased by
one each time the packet is processed by a router. If the TTL field decrements to zero, the
router discards the packet and sends an Internet Control Message Protocol (ICMP) Time
Exceeded message to the source IP address. Because the router decrements the TTL of
each packet, the router must also recalculate the Header Checksum.
• Protocol: This field is used to identify the next level protocol. This 8-bit binary value
indicates the data payload type that the packet is carrying, which enables the network
layer to pass the data to the appropriate upper-layer protocol.
• Head Checksum: This is used to detect corruption in the IPv4 header.
• Source IPv4 Address: This contains a 32-bit binary value that represents the source
IPv4 address of the packet. The source IPv4 address is always a unicast address.
• Destination IPv4 Address: This contains a 32-bit binary value that represents the
destination IPv4 address of the packet. The destination IPv4 address is a unicast,
multicast, or broadcast address.
Limitations of IPv4
Through the years, additional protocols and processes have been developed to address new
challenges. However, even with changes, IPv4 still has three major issues:
• IPv4 address depletion - IPv4 has a limited number of unique public addresses available.
Although there are approximately 4 billion IPv4 addresses, the increasing number of new IP-enabled
devices, always-on connections, and the potential growth of less-developed regions have increased
the need for more addresses.
• Lack of end-to-end connectivity - Network Address Translation (NAT) is a technology commonly
implemented within IPv4 networks. NAT provides a way for multiple devices to share a single public
IPv4 address. However, because the public IPv4 address is shared, the IPv4 address of an internal
network host is hidden. This can be problematic for technologies that require end-to-end
connectivity.
• Increased network complexity – While NAT has extended the lifespan of IPv4 it was only meant
as a transition mechanism to IPv6. NAT in its various implementation creates additional complexity
in the network, creating latency and making troubleshooting more difficult.
IPv6 Packet
• Payload Length - This 16-bit field indicates the length of the data portion or payload of the IPv6 packet. This
does not include the length of the IPv6 header, which is a fixed 40-byte header.
• Next Header - This 8-bit field is equivalent to the IPv4 Protocol field. It indicates the data payload type that
the packet is carrying, enabling the network layer to pass the data to the appropriate upper-layer protocol.
• Hop Limit - This 8-bit field replaces the IPv4 TTL field. This value is decremented by a value of 1 by each
router that forwards the packet. When the counter reaches 0, the packet is discarded, and an ICMPv6 Time
Exceeded message is forwarded to the sending host,. This indicates that the packet did not reach its
destination because the hop limit was exceeded.
• Source IPv6 Address - This 128-bit field identifies the IPv6 address of the sending host.
• Destination IPv6 Address - This 128-bit field identifies the IPv6 address of the receiving host.
Chapter 5:
IPv4
Address
Structure
Network and Host Portions
• An IPv4 address is a 32-bit hierarchical address that is made up of a network portion and a host portion
• The bits within the network portion of the address must be identical for all devices that reside in the same network.
• The bits within the host portion of the address must be unique to identify a specific host within a network.
IPv4 Configuration on a Windows
Computer
• The subnet mask does not actually contain the network or host portion of an IPv4 address, it just tells the
computer where to look for the part of the IPv4 address that is the network portion and which part is the host
portion.
• The actual process used to identify the network portion and host portion is called ANDing.
Prefix Length
An alternative method of identifying a subnet mask, a method called the prefix length.
The prefix length is the number of bits set to 1 in the subnet mask. It is written in “slash notation”, which is noted
by a forward slash (/) followed by the number of bits set to 1. For example, 192.168.10.10 255.255.255.0 would
be written as 192.168.10.10/24.
The first column lists various subnet masks that can be used with a host address. The second column displays
the converted 32-bit binary address. The last column displays the resulting prefix length
Determining the Network: Logical AND
• A logical AND is one of three Boolean operations used in Boolean or digital logic. The other two are
OR and NOT. The AND operation is used in determining the network address.
• In digital logic, 1 represents True and 0 represents False. When using an AND operation, both input
values must be True (1) for the result to be True (1).
• To identify the network address of an IPv4 host, the IPv4 address is logically ANDed, bit by bit, with the subnet
mask. ANDing between the address and the subnet mask yields the network address.
To illustrate how AND is used to discover a network address, consider a host with IPv4 address 192.168.10.10 and subnet mask
of 255.255.255.0, as shown in the figure:
• IPv4 host address (192.168.10.10) - The IPv4 address of the host in dotted decimal and binary formats.
• Subnet mask (255.255.255.0) - The subnet mask of the host in dotted decimal and binary formats.
• Network address (192.168.10.0) - The logical AND operation between the IPv4 address and subnet mask results in an IPv4
network address shown in dotted decimal and binary formats.
• Using the first sequence of bits as an example, notice the AND operation is performed on the 1-bit of the host address with the
1-bit of the subnet mask. This results in a 1 bit for the network address. 1 AND 1 = 1.
• The AND operation between an IPv4 host address and subnet mask results in the IPv4 network address for this host. In this
example, the AND operation between the host address of 192.168.10.10 and the subnet mask 255.255.255.0 (/24), results in
the IPv4 network address of 192.168.10.0/24. This is an important IPv4 operation, as it tells the host what network it belongs
to.
Chapter 6:
Address
Resolution
Protocol
ARP
A network that is using the IPv4 communications protocol need the ARP to map IPv4 addresses to
MAC addresses.
Every IP device on an Ethernet network has a unique Ethernet MAC address. When a device sends an
Ethernet Layer 2 frame, it contains two addresses:
• Destination MAC address - The Ethernet MAC address of the destination device on the same
local network segment.
• Source MAC address - The MAC address of the Ethernet NIC on the source host.
To send a packet to another host on the same local IPv4 network, a host must know the IPv4 address
and the MAC address of the destination device. Device destination IPv4 addresses are either known or
resolved by device name. However, MAC addresses must be discovered.
A device uses Address Resolution Protocol (ARP) to determine the destination MAC address of a local
device when it knows its IPv4 address.
ARP provides two basic functions:
• Resolving IPv4 addresses to MAC addresses
• Maintaining a table of IPv4 to MAC address mappings
ARP
To send a packet to another host on the same local IPv4 network, a host must know the IPv4 address
and the MAC address of the destination device. Device destination IPv4 addresses are either known
or resolved by device name. However, MAC addresses must be discovered.
A device uses ARP to determine the destination MAC address of a local device when it knows its IPv4
address.
• The sending device will search its ARP table for a destination IPv4 address and a corresponding
MAC address.
• If the packet’s destination IPv4 address is on the same network as the source IPv4 address, the
device will search the ARP table for the destination IPv4 address.
• If the destination IPv4 address is on a different network than the source IPv4 address, the device
will search the ARP table for the IPv4 address of the default gateway.
• Each entry, or row, of the ARP table binds an IPv4 address with a MAC address. We call the
relationship between the two values a map. ARP messages are encapsulated directly within an
Ethernet frame. There is no IPv4 header. The ARP request is encapsulated in an Ethernet frame
using the following header information:
• Destination MAC address – This is a broadcast address FF-FF-FF-FF-FF-FF requiring all Ethernet
NICs on the LAN to accept and process the ARP request.
• Source MAC address – This is MAC address of the sender of the ARP request.
• ARP messages have a type field of 0x806. This informs the receiving NIC that the data portion of the frame
needs to be passed to the ARP process.
• Because ARP requests are broadcasts, they are flooded out all ports by the switch, except the receiving port.
Only the device with the target IPv4 address associated with the ARP request will respond with an ARP reply.
• After the ARP reply is received, the device will add the IPv4 address and the corresponding MAC address to its
ARP table.
• When the destination IPv4 address is not on the same network as the source IPv4 address, the source device
needs to send the frame to its default gateway which is the interface of the local router.
• Whenever a source device has a packet with an IPv4 address on another network, it will encapsulate that packet
in a frame using the destination MAC address of the router. The IPv4 address of the default gateway is stored in
the IPv4 configuration of the hosts.
• If the destination host is not on its same network, the source checks its ARP table for an entry with the
IPv4 address of the default gateway. If there is not an entry, it uses the ARP process to determine a MAC
address of the default gateway.
• On a Cisco router, the show ip arp command is used to display the ARP table. On a Windows 10 PC, the arp –
a command is used to display the ARP table.
• As a broadcast frame, an ARP request is received and processed by every device on the local network.
• If a large number of devices were to be powered up and all start accessing network services at the same time,
there could be some reduction in performance for a short period of time. Therefore, in some cases, the use of
ARP can lead to a potential security risk.
• A threat actor can use ARP spoofing to perform an ARP poisoning attack. This is a technique used by a threat
actor to reply to an ARP request for an IPv4 address that belongs to another device, such as the default
gateway.
• The threat actor sends an ARP reply with its own MAC address. The receiver of the ARP reply will add the
wrong MAC address to its ARP table and send these packets to the threat actor.
Chapter 7:
IP
Addressin
g Services
Domain Name System
IP Addressing Services
• In data networks, devices are labeled with numeric IP addresses to send and receive data over networks. Domain names were
created to convert the numeric address into a simple, recognizable name.
• The DNS protocol defines an automated service that matches resource names with the required numeric network address.
• The DNS protocol communications use a single format called a message. This message format is used for all types of client
queries and server responses, error messages, and the transfer of resource record information between servers.
• The DNS protocol defines an automated service that matches resource names with the required numeric network address. It
includes the format for queries, responses, and data.
• On the internet, fully-qualified domain names (FQDNs), such as http://www.cisco.com, are much easier for people to
remember than 198.133.219.25, which is the actual numeric address for this server.
• If Cisco decides to change the numeric address of www.cisco.com, it is transparent to the user because the domain name
remains the same. The new address is simply linked to the existing domain name and connectivity is maintained.
Step 1
• The user types an FQDN into a browser application Address field.
Step 2 Step 4
A DNS query is sent to the designated The DNS query response is sent back to the
client with DNS server for the client computer. the IP address
for the FQDN
Step 3
Step 5
The DNS server matches the FQDN with its IP address. The client computer uses
the IP address to make
requests of the server.
DNS Hierarchy
• DNS uses domain names to form the hierarchy.
• The naming structure is broken down into zones. Each DNS
server maintains a specific database file and is
only responsible for managing name-to-IP mappings for that
small portion of the entire DNS structure.
• When a DNS server receives a request for a name translation
that is not within its DNS zone, the DNS server forwards the
request to another DNS server within the proper zone for
translation.
• DNS is scalable because hostname resolution is spread
across multiple servers.
• Add Header Information - The transport layer protocol also adds header
information containing binary data organized into several fields to each block
of data.
• Identifying the Applications - The transport layer must be able to separate and
manage multiple communications with different transport requirement needs.
• TCP provides reliability and flow control using these basic operations:
• Number and track data segments transmitted to a specific host from a specific application
• Acknowledge received data
• Retransmit any unacknowledged data after a certain amount of time
• Sequence data that might arrive in wrong order
• Send data at an efficient rate that is acceptable by the receiver
In addition to supporting the basic functions of data segmentation and reassembly, TCP also provides the following services:
• Establishes a Session - TCP is a connection-oriented protocol that negotiates and establishes a permanent connection (or session) between
source and destination devices prior to forwarding any traffic. Through session establishment, the devices negotiate the amount of traffic that
can be forwarded at a given time, and the communication data between the two can be closely managed.
• Ensures Reliable Delivery - For many reasons, it is possible for a segment to become corrupted or lost completely, as it is transmitted over the
network. TCP ensures that each segment that is sent by the source arrives at the destination.
• Provides Same-Order Delivery - Because networks may provide multiple routes that can have different transmission rates, data can arrive in
the wrong order. By numbering and sequencing the segments, TCP ensures segments are reassembled into the proper order.
• Supports Flow Control - Network hosts have limited resources (i.e., memory and processing power). When TCP is aware that these resources
are overtaxed, it can request that the sending application reduce the rate of data flow. This is done by TCP regulating the amount of data the
source transmits. Flow control can prevent the need for retransmission of the data when the resources of the receiving host are overwhelmed.
Applications That Use TCP
TCP handles all tasks associated with dividing the data stream into segments, providing reliability, controlling data
flow, and reordering segments. TCP frees the application from having to manage any of these tasks. HTTP, FTP,
SMTP, and SSH, can simply send the data stream to the transport layer and use the services of TCP.
For other applications it is important that all the data arrives and that it can be processed in its proper sequence.
For these types of applications, TCP is used as the transport protocol. For example, applications such as
databases, web browsers, and email clients, require that all data that is sent arrives at the destination in its
original condition. Any missing data could corrupt a communication, making it either incomplete or unreadable.
Real-Life Examples of TCP :
• Text Communication –
We all are aware of the importance of Text Communication in the present times. Any discrepancy in texting
between sender and receiver cannot be tolerated. Hence TCP is used in Text Communication due to its reliable
transmission, error control, and in order receiving of the data.
Example : Whatsapp, Instagram, Google Chat, iMessage.
• Flow Control
• Error Control
• Congestion Control
• Process to Process Communication
• In order delivery of data segments
Disadvantages :
• The data segments don’t get transmitted immediately
• More overhead(20-60Bytes)
• It has a large TCP Header
User Datagram Protocol (UDP)
• UDP does not track information sent or received between the client
and server, UDP is also known as a stateless protocol.
• It is also known as a best-effort delivery protocol because there is
no acknowledgment that the data is received at the destination.
• With UDP, there are no transport layer processes that inform the
sender of a successful delivery. UDP is preferable for applications
such as VoIP. Acknowledgments and retransmission would slow
down delivery.
UDP is a stateless protocol, meaning neither the client, nor the server, tracks the state of the
communication session. If reliability is required when using UDP as the transport protocol, it must be
handled by the application.
The blocks of communication in UDP are called datagrams, or segments. These datagrams are sent
as best effort by the transport layer protocol. The UDP header is far simpler than the TCP header
because it only has four fields and requires 8 bytes (i.e., 64 bits).
There are three types of applications that are best suited for UDP are live video and multimedia
applications, simple request and reply applications, applications that handle reliability themselves.
Real-Life Examples of UDP :
• Online Games –
Most of the online games we play use the services of User Datagram Protocol. Since
any amount of delay cannot be tolerated in online games UDP is widely used over TCP
which is quite slower. UDP doesn’t retransmit the lost data and is a connectionless
protocol due to which it is much faster.
Ex : All online games
• Video Conferencing –
Video Conferencing apps like Skype, Google meet, Zoom, all use the services of UDP
due to the fact that they are real-time applications and any delay in receiving the data
cannot be tolerated.
Ex: Skype, Google Meet, zoom, and Facetime.
a) UDP is much faster than TCP. After all, speed matters a lot when loading a webpage
b) DNS requests are typically small requests and can be accommodated inside UDP
segments(Header).
c) Even though UDP is unreliable, it can be achieved in the application layer too
Advantages :
• The packet created by UDP is relatively smaller than that of TCP(UDP Header: 8 bytes)
• Connectionless Transmission
• It is Faster, Simpler and Efficient
Disadvantages :
As a security feature, the Cisco IOS software separates management access into the following two command modes:
• User EXEC Mode - This mode is useful for basic operations. It allows a limited number of basic monitoring commands but does not allow the
execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends
with the > symbol.
• Accessing User EXEC Mode: When you connect to a Cisco device, you typically start in User EXEC Mode. You can access it directly through a
console connection, Telnet, SSH, or other remote management methods. The initial prompt will be Router> or Switch>.
• Privileged EXEC Mode - To execute configuration commands, a network administrator must access privileged EXEC mode. The privileged
EXEC mode can be identified by the prompt ending with the # symbol. Higher configuration modes, like global configuration mode, can only be
reached from privileged EXEC mode. Global configuration mode is identified by the CLI prompt that ends with (config)#
• Accessing Privileged EXEC Mode: To enter Privileged EXEC Mode, users typically start from User EXEC Mode (indicated by the Router> or
Switch> prompt) and then use the enable command. If the device is configured with a password, users will be prompted to enter it.
• Global Configuration Mode is a privileged mode in Cisco IOS that allows administrators to make changes to the overall
configuration of the device. When you enter Global Configuration Mode, you can configure various parameters that affect the
behavior of the device as a whole, such as interface settings, routing protocols, security features, and more. Here's how to
access Global Configuration Mode and some common tasks performed within it:
• Accessing Global Configuration Mode: To enter Global Configuration Mode, you typically start from the privileged EXEC
mode (designated by the > prompt) and then use the configure terminal or conf t command. This places you in Global
Configuration Mode, indicated by the (config) or (config)# prompt, depending on the device.
The commands used to navigate between the different IOS command modes are: