- Lecture 04 Network Hardware in Depth
- work at datalink layer 2
- receive frames on 1 port & forward to port whr dest device found
- switches send broadcast frames out all ports
- ea switch port considered a collision domain
- dont forward collision info to other ports
- can operate in full-duplex
- allows connected devices to transmit & receive simultaneously - eliminates possibility of collision
- ports on typical 10/100 mbps switch can usually operate in these modes
- 10mbps half duplex
- 100mbps half duplex
- 10 mbps full duplex
- 100mbps full duplex
- most inexpensive switches run in auto-nego mode
- switch sets mode to highest perf setting the device supports
- auto-MDIX mode - switch port detects type of device & cable it's connected to
- straight-through or crossover cable can be used
- switching table holds MAC address/port pairs that tell switch whr to forward a frame based on dest MAC
- when switch powered on, its table is empty
- as network devices send frames, switch reads ea frame's src address & adds to table with port its received from
- if frame's dest not found in table, the switch forwards the frame to all ports
- most swithes include a num that indicates num of MAC addresses the switch can hold
- Eg. 8k MAC supported
- switching tables prevent stale entries by including timestamp when entry created
- when switch gets frame from device alrdy in table, it updates the entry with new timestamp
- period of time a table keeps a MAC is called aging time
- if timestamp not updated within aging time, the entry expires & removed from table
- cut-through switching - switch reads only enoguh of incoming frame to determine frame's src & dest
- fastest
- disadvantage - no error checking
- store-and-forward switching - switch reads entire frame into buffers before forwarding
- examines the FCS field to enure it contains no errors before forwarding
- a frame check sequence (FCS) refers to an error-detecting code added to a frame in a communications protocol
- fragment-free switching - switch reads enough of frame to guarantee that its at least the min size for network type
- have funcs of switch (layer 2) but add layers 3 capabilities
- typically used in interior of networks to route between vlans instead of being placed on network perimeter
- perf advantage over traditional routers
- packet routing between vlans done within switch than having to exit switch to router
- high-end switches (AKA smart switches/manages switches) can help make network more efficient & reliable
- common features in smart switches
- multicast processing
- spanning tree protocol
- virtual lan
- port security
- switches process multicast frames in 1 of 2 ways
- as broadcast & send to all port
- used by low-end switches or those not configured for it
- by forwarding frames only to ports with the registered multicast addr
- used by switches that support internet grp management protocol (IGMP)
- multicast MAC addr always begin with
01:00:5E
- rest of addr identifies particular multicast app
- as broadcast & send to all port
- enables switches to detect when there's potential for switching loop
- occurs when frame is forwarded from 1 switch to another in infinite loop
- when possible loop detected,
- 1 of switch ports goes into blking mode
- prevents it from forwarding frames that creates loops
- if loop config broken, switch that was in blking mode resumes forwarding frames
- 1 of switch ports goes into blking mode
- device takes longer to create link with switch that runs the protocol
- enhancement to STP that provides faster convergence when topology changes
- enable you to config 1 or more switch ports into separate broadcast domains
- like separating switch into 2 or more switches that aint connected
- router needed to comm between VLANs
- improves management & security of network & gives more control of broadcast frames
- allows admins to grp users & resources logically instead of by phy location
- trunk port - switch port configed to carry traffic from all VLANs to another switch/router
- switch/router port must also be configed as trunk port
- involves switch adding tag to ea frame that must traverse the trunk port
- VLAN tag identifies which vlan traffic originated from
- overuse of vlans will cost more than it benefits you
- more vlan = more logical networks
- network more complicated
- every vlan you create needs corr router interface
- routers are slow so perf decrease with more vlan
- more router interfaces mean more IP networks
- need subnetting your existing network
- network jacks with connections to switches often avail to public users - can plug in laptop with viruses, hacker tools or malware
- switch with port security can help prevent these types of conn
- enables admin to limit how many & which MAC can connect to a port
- if unauth comp attempts to connect, port can be disabled & msg sent to admin to alert them of intrusion
- operate at network layer 3 & work with packets
- connect separate logical networks to form internetwork
- broadcast frames not forwarded to other outer ports/networks
- can use complex internetworks with multiple paths
- creates fault tolerance & load sharing
- all processing depends on following features
- router interfaces
- routing tables
- routing protocols
- access control lists
- must have 2 or more interfaces (ports) to forard packets to other networks
- when router interface receives frame, it compares the dest MAC with interface's MAC
- if match, router strips frame header & trailer & reads packet's dest IP
- if IP maches, it proceeds the packet
- if not, router consults with routing table to determine how to get packet to dest
- process of moving packet from incoming interfce to outgoing interface called packet forwarding
- composed of network addr & interface pairs that telll router which interface packet shld be forwarded to
- most tables contain following for ea entry
- dest network - usually in CIDR notation
- next hop - indicates interface name/addr of next router in path to dest
- total num of routers a packet must travel through called hop count
- metric - numeric val that tells router how far away dest network is
- AKA cost or distance
- how route derived - tells you how route gets into routing table (1 of 3 ways)
- network connected directly
- admin enters route info manually
- AKA static route
- route info entered dynamically via routing protocol
- timestamp - tells router how long since the routing protocol updated the dynamic route
- set of rules that routers use to exchange info so all routers have accurate info abt internetwork to populate their routing tables
- 2 main types of protocols
- dist-vector protocols
- link-state protocols
-
speed of convergence - how fast routing tables of all routers in internetwork updated when change in network occurs
-
interior gateway protocols (IGP) used in autonomous system (AS)
- AS - internetwork managed by single org
- routing protocols discussed so far are IGPs
-
exterior gateway protocols (EGP) used between AS
- Eg. broder gateway protocol (BGP)
- path vector routing protocol - analyses characeristics of all ASs to form nonlooping routing topology
- Eg. broder gateway protocol (BGP)
-
static routes entered in manually
- share info abt internetwork's status by copying router's routing table to other routers
- routers sharing network are called neighbour
- routing info protocol (RIP) & RIPv2 are most common
- share info with other routers by sending status of all interface links to other routers
- open shortest path first (OSPF) most common
- does network change often?
- routing protocol good
- are there several alt paths to many of the networks in the internetwork?
- routing protocol can reroute arnd down links or congested routes automatically
- is internetwork large?
- routing protocol builds & maintains routing protocols automatically
- set of rules configed on router's interface for specifying which addr & protocols can pass through interface & to whcih dests
- when ACL blks packet, its called packet filtering
- usually configd to blk traffic based on
- inbound/outbound traffic
- src addr
- dest addr
- protocol
- addr can be specific IP addr or network nums & filtering can be done on either src/dest addr or both
- 3 devices in 1
- wireless AP
- router
- switch
- wireless network mode
- allows you to choose which 802.11 standard AP shld operate under
- wireless network name (SSID)
- when AP is shipped SSID is set to default
- pls change it
- when AP is shipped SSID is set to default
- wireless channel
- recommended set channels 5 chann apart
- Eg. 1, 6 & 11
- recommended set channels 5 chann apart
- SSID broadcast status
- by default, APs configed to transmit the SSID so any wireless device in range can see network
- encryption - all private networks shld use
- common protocols
- wired equivalent privacy (WEP)
- wifi protected access (WPA)
- WPA2
- use highest lvl of security your systems support
- all device must use same protocol
- common protocols
- auth - users enter user & password to access wireless network
- APs that support auth usually support remote dial-in user service (RADIUS) protocol
- MAC filtering - enables you to restrict which devices can connect to AP
- & MAC of wireless devices allowed to access network to a list on AP
- AP Isolation - creates seperate virtual network for ea client conn
- clients can access internet but cant comm with ea other
- adjustable transmit power
- control power & range of wireless signal
- multiple SSIDs
- 2 or more wireless networks can be created with diff security settings
- vlan support
- assign wireless networks to wired vlan
- traffic priority
- if AP configed for multiple networks, can assign priority to packets coming from ea network
- wifi multimedia
- provides quality of service (QoS) settings for multimedia traffic
- gives priority to streaming audio/video
- AP modes
- AP can set to operate as traditional AP, repeater or wireless bridge
- NIC makes conn between comp & network medium
- perf & reliability of NIC crucial to comp's network perf
- if NIC slow, can limit network perf
- when selecting network adapter, 1st identify phy characteristics card must match
- type of bus/tech/connector needed
- norm desktop comps with basic features usually adequate
- servers sometimes warrant these high-end features
- virtualised envs benefit from NICs with multiple ports
- shared adapter memory
- adapter's buffers map directly to RAM on comp
- shared system memory
- NIC's onboard processor selects region of RAM on comp & writes to it as though it were buffer space on adapter
- bus mastering
- permit network adapter to take control of comp's bus to init & manage data transfers to/from comp's memory
- RAM buffering
- NIC includes extra memory to provide temp storage for incoming/outgoing network data that arrives at NIC faster than it can be sent out
- onboard co-processors
- enable card to process incoming & outgoing network data w/o requiring service from CPU
- QOS allow pripritising time-sensitive data
- auto link aggregation
- enable you to install multiple NICs in 1 comp & aggregate bandwidth
- improved fault tolerance
- by installing 2nd NIC
- failure of primary NIC shifts network traffic to 2nd NIC
- advanced config power management interface (ACPI)
- offers wake-up LAN
- allow admin to power on PC remotely by accessing NIC through network
- preboot execution environment (PXE) adapter
- allow comp to download OS instead of booting from local hard drive
- used on diskless workstations (thin clients) that dont store OS locally
- security device that puts up barrier between local network & internet
- acts as filter, allowing/restricting data traffic between network/other networks
- flexible
- allows you to modify the blking rules by
- IP
- protocol (TCP, UDP, ICMP)
- port
- or for software apps & services
- allows you to modify the blking rules by
- both protect from malicious traffic
- hardware firewall can be stand-alone device or part of router
- such router is simple & effective protection solution for network
- reviews headers of data packets & decides if can be trusted
- if think packet safe, forward
- else, drop
- such router is simple & effective protection solution for network
- software firewall - program that you install on comp
- can be part of antivirus suit or separate
- protect from uncontrolled access to comp
- depending on software can keep safe from trojans & worms too
- differences
- it will only protect the device with the firewall installed
- have to install on all devices to be protected
- will run in background - use up system resources
- lead to slowdowns
- it will only protect the device with the firewall installed