cecs 5460 – assignment 3 stacey vanderheiden güney

30
Networking Components CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Upload: adam-gilmore

Post on 25-Dec-2015

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Networking Components

CECS 5460 – Assignment 3

Stacey VanderHeiden Güney

Page 2: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Networking Components

Hubs Bridges Switches Router Gateway Firewall Wireless AP

Page 3: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Hubs

• $30

• $7

• $3

Page 4: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Hubs

• A hub interconnects two or more workstations into a local area network.

• Hubs are used on small networks where data transmission is not very high. 

Page 5: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Bridges

• $99

• $59

• $38

Page 6: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Bridges

•  A bridge connects a local area network (LAN) to another local area network that uses the same protocol – forwards frames from one network to another.

• Having a single incoming and outgoing port and filters traffic on the LAN by looking at the MAC address, bridge is more complex than hub.

• Bridge looks at the destination of the packet before forwarding unlike a hub. It restricts transmission on other LAN segment if destination is not found.

Page 7: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Switches

• $18

• $33

• $14

Page 8: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Switches• A switch is like a bridge, but it has multiple

ports.

• Like a bridge, it observes traffic flow and learns. When a frame arrives at a switch, the switch examines the destination address and forwards the frame out the one necessary connection. They use this to build forwarding tables to determine the destination of data being sent by one computer to another on the network.

• Switches can perform error checking before forwarding data.

• Switches are considered layer-two devices, using MAC addresses to forward frames to their proper destination.

• Usually large networks use switches instead of hubs to connect computers within the same subnet.

Page 9: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Routers

• Routers are more complex than switches.• Routers are layer-three devices, using

microprocessor-based circuitry to route packets between networks based on their IP address.

• Routers operate at the Network layer of the OSI model.

• They are slower than bridges and switches but make "smart" decisions on how to route packets received on one port to a network on another port.

• Routers are capable of segmenting the network.

• Routers are capable of segmenting a network into multiple collision domains as well as into multiple broadcast domains.

Page 10: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Routers

• $20• $180

• $90

• $250

Page 11: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Hub & Bridges• Hub - A hub is the simplest of these devices. Any data packet coming from one port is

sent to all other ports. It is then up to the receiving computer to decide if the packet is for it. Imagine packets going through a hub as messages going into a mailing list. The mail is sent out to everyone and it is up to the receiving party to decide if it is of interest.

• The biggest problem with hubs is their simplicity. Since every packet is sent out to every computer on the network, there is a lot of wasted transmission. This means that the network can easily become bogged down.

• Hubs are typically used on small networks where the amount of data going across the network is never very high.

• Bridge- A bridge goes one step up on a hub in that it looks at the destination of the packet before sending. If the destination address is not on the other side of the bridge it will not transmit the data.

• A bridge only has one incoming and one outgoing port.• To build on the email analogy above, the bridge is allowed to decide if the message

should continue on. It reads the address [email protected] and decides if there is a [email protected] on the other side. If there isn't, the message will not be transmitted.

• Bridges are typically used to separate parts of a network that do not need to communicate regularly, but still need to be connected.

Page 12: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Switch & Router• Switch- A switch steps up on a bridge in that it has multiple ports. When a packet

comes through a switch it is read to determine which computer to send the data to.• This leads to increased efficiency in that packets are not going to computers that do

not require them.• Now the email analogy has multiple people able to send email to multiple users. The

switch can decide where to send the mail based on the address.• Most large networks use switches rather than hubs to connect computers within the

same subnet.• Router - A router is similar in a switch in that it forwards packets based on address.

But, instead of the MAC address that a switch uses, a router can use the IP address. This allows the network to go across different protocols.

• The most common home use for routers is to share a broadband internet connection. The router has a public IP address and that address is shared with the network. When data comes through the router it is forwarded to the correct computer.

• This comparison to email gets a little off base. This would be similar to the router being able to receive a packet as email and sending it to the user as a fax.

Page 13: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Bridge/Router/Switch

• A bridge or router may be referred to as a "switch" because it uses information in the data packet to choose a path from one network segment to another.

• A bridge may be referred to as a "layer 2 switch" because it uses information from layer 2, the Data Link layer of the OSI model.

• A router may be referred to as a "layer 3 switch" because it uses information from layer 3, the Network layer of the OSI model.

• A network device that uses a higher layer of the OSI model may be referred to as a "layer 4 switch", and so on.

Page 14: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

The OSI Reference Model

14

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

Page 15: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

The Physical Layer Connection

15

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

Specifies electrical

connection

Page 16: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

The Physical Layer Connection

16

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

Hub

AmplificationRegeneration

Page 17: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

The Data Link Connection

17

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayerDelineation

ofData

ErrorDetection

AddressFormatting

Page 18: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

18

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

Bridge& Switch

The Data Link Connection

Page 19: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

The Network Layer Connection

19

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

End to end routing

Page 20: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

The Network Layer Connection

20

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

NetworkLayer

Data LinkLayer

PhysicalLayer

ApplicationLayer

PresentationLayer

SessionLayer

TransportLayer

Router

Page 21: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Gateway

• $20• $180

• $90

• $250

Page 22: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Gateways

• The activities of a gateway are more complex than that of the router or switch as it communicates using more than one protocol. Both the computers of Internet users and the computers that serve pages to users are host nodes, while the nodes that connect the networks in between are gateways.

• A network gateway can be implemented completely in software, completely in hardware, or as a combination of both. Depending on the types of protocols they support, network gateways can operate at any level of the OSI model.

Page 23: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Gateways

• Because a network gateway, by definition, appears at the edge of a network, related capabilities like firewalls tend to be integrated with it.

• On home networks, a broadband router typically serves as the network gateway although ordinary computers can also be configured to perform equivalent functions.

Page 24: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Firewalls

• $24,000

• $1,665

• $100,000

Page 25: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Firewalls

• Protects a computer network from unauthorized access.

• Network firewalls may be hardware devices, software programs, or a combination of the two.

• Network firewalls guard an internal computer network (home, school, business intranet) against malicious access from the outside.

• Network firewalls may also be configured to limit access to the outside from internal users.

Page 26: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

FirewallsNetwork Firewalls and Broadband Routers• Many home network router products include

built-in firewall support. The administrative interface of these routers include configuration options for the firewall. Router firewalls can be turned off (disabled), or they can be set to filter certain types of network traffic through so-called firewall rules.

Network Firewalls and Proxy Servers• Another common form of network firewall is a

proxy server. Proxy servers act as an intermediary between internal computers and external networks by receiving and selectively blocking data packets at the network boundary. These network firewalls also provide an extra measure of safety by hiding internal LAN addresses from the outside Internet. In a proxy server firewall environment, network requests from multiple clients appear to the outsider as all coming from the same proxy server address.

Page 27: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Wireless Access Points

• $24,000

• $1,665

• $100,000

Page 28: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Wireless Access Points

• Device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards.

• The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself.

• Cost $80 to $$$$ depending on range and standards

• Most operate with the IEEE 802.11 specs

– 802.11a 54 Mbps – 802.11b 11 Mbps– 802.11g 54 Mbps– 802.11n up to 600 Mbps

Page 29: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Wireless Access PointsNetwork Firewalls and Broadband Routers• Many home network router products include

built-in firewall support. The administrative interface of these routers include configuration options for the firewall. Router firewalls can be turned off (disabled), or they can be set to filter certain types of network traffic through so-called firewall rules.

Network Firewalls and Proxy Servers• Another common form of network firewall is a

proxy server. Proxy servers act as an intermediary between internal computers and external networks by receiving and selectively blocking data packets at the network boundary. These network firewalls also provide an extra measure of safety by hiding internal LAN addresses from the outside Internet. In a proxy server firewall environment, network requests from multiple clients appear to the outsider as all coming from the same proxy server address.

Page 30: CECS 5460 – Assignment 3 Stacey VanderHeiden Güney

Wireless Access Points