0% found this document useful (0 votes)
26 views41 pages

Networking Essentials: #Lifekokarolift

Uploaded by

Ankit Bharti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views41 pages

Networking Essentials: #Lifekokarolift

Uploaded by

Ankit Bharti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

#LifeKoKaroLift

Networking Essentials

1
Course:
EdEditit
Networking Essentials
MaMastesterr
tetexxtt stystyleless

2
AIM

✔ To provide you with basic information on the


fundamentals of computer networks

3
Functions of following network devices:
Repeater ,Hub, Switch, Bridge,
Router,Modem

5
IP Address

5
IP Address

● An IP address is a string of numbers separated by periods. IP addresses are


expressed as a set of four numbers — an example address might be 192.158.1.38.
Each number in the set can range from 0 to 255. So, the full IP addressing range goes
from 0.0.0.0 to 255.255.255.255.
● IP addresses are not random. They are mathematically produced and allocated by
the Internet Assigned Numbers Authority (IANA), a division of the Internet
Corporation for Assigned Names and Numbers (ICANN). ICANN is a non-profit
organization that was established in the United States in 1998 to help maintain the
security of the internet and allow it to be usable by all. Each time anyone registers a
domain on the internet, they go through a domain name registrar, who pays a small
fee to ICANN to register the domain.

6
How do IP addresses work

The use of IP addresses typically happens behind the scenes. The process
works like this:
1. Your device indirectly connects to the internet by connecting at first to a network
connected to the internet, which then grants your device access to the internet.
2. When you are at home, that network will probably be your Internet Service
Provider (ISP). At work, it will be your company network.
3. Your IP address is assigned to your device by your ISP.
4. Your internet activity goes through the ISP, and they route it back to you, using
your IP address. Since they are giving you access to the internet, it is their role to
assign an IP address to your device.

7
How do IP addresses work

5. However, your IP address can change. For example, turning your modem or
router on or off can change it. Or you can contact your ISP, and they can change
it for you.

6. When you are out and about – for example, traveling – and you take your
device with you, your home IP address does not come with you. This is because
you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to
access the internet and will be using a different (and temporary) IP address,
8
assigned to you by the ISP of the hotel, airport or coffee shop.
Necessity of using private and public IP
addresses

5
Necessity of Using Public IP Address

● Public IP address is allocated to every computer that connects to the Internet


● Public IP address provides unique address
● Two computers cannot have the same public IP address
● User cannot alter the public IP address that is assigned to a computer
● A public IP address can be either static or dynamic

10
Necessity of Using Private IP
Address
● Private IP number falls within one of the IP address ranges reserved for private
networks such as a Local Area Network (LAN)
● Private IP addresses are used for numbering the computers in a private network
● Private IP is set up in home, school and business LANs in airports and hotels
which makes it possible for the computers in the network to communicate with
each other
● Private IP is used for communication within the network
● To know your private IP, type ipconfig command in the command prompt

11
Quiz / Assessment

1) Two computers cannot have the same public IP address.


a) TRUE b) FALSE
2) A computer with a private IP address connects directly outside the LAN.
a) TRUE b) FALSE
3) Describe the types of public IP address.

12
Classify IPv4 address

5
Classify IPv4 address

14
Address Range of Each Class

CLASS A CLASS B CLASS C CLASS D CLASS E


1-127 128-191 192-223 224-239 240-254

15
Quiz / Assessment

1) IPv4 address is divided into __________ octets.


(a) Eight 8-bit (b) Four 8-bit

(c) Two 16-bit (d) Three 16-


bit

2) What is the address range of Class B IPv4 Address?


(a) 1-127 (b) 128 - 191

(c) 192 - 223 (d)


224 – 239
16
3) Mention the address range of each class in IPv4 addressing.
subnet mask

5
subnet mask

● we need a subnet mask to help devices on a network understand which part of an IP


address identifies the network they are on and which part identifies the specific
device on that network.
● Imagine you're in a big city with many streets. The city's name (like "New York") is
like the network address, identifying the entire city. The street name and house
number (like "Broadway 123") are like the device's address on that network.
● The subnet mask is like a filter that separates the city name from the street name
and house number. It tells your device which part of the IP address is the network
address and which part is the device address, so it knows where to send data.

18
subnet mask

● A subnet mask is a 32-bit number used to mask an IP address


● It divides an IP address into network address and host address
● Subnet mask is formed by setting all network bits to “1” and setting all host bits to
“0”
● Subnetting an IP network is to separate a big network into smaller multiple
networks for reorganization and security purposes
● Bitwise AND operation is used to determine the network address of an IP address

19
Classification of Subnet Mask

Class A
Subnet
Mask
Class B

Class C
20
Quiz / Assessment

1) ___________ divides an IP address into network address and host


address.
a) Router c) IGMP
b) ICMP d) Subnet Mask

2) Classify subnet masks.

21
Subnetting

5
subnet mask

Subnetting is the process of dividing a large network into smaller sub-networks, or


subnets. This division helps in organizing and managing a network more efficiently,
allowing for better control of traffic flow and resource allocation.

23
subnet mask

Benefits of Subnetting:

● Efficient Use of IP Addresses: Subnetting allows for the more efficient allocation of IP addresses. Instead of assigning a single IP address to
each device on a large network, subnetting allows for the creation of smaller subnets, each with its own range of IP addresses. This helps
in conserving IP addresses, which can be crucial in environments where IP address space is limited.
● Improved Network Performance: By dividing a large network into smaller subnets, subnetting can help reduce the size of broadcast
domains. This can lead to a decrease in network congestion and an improvement in overall network performance. Additionally, subnetting
can help isolate network issues to specific subnets, making troubleshooting easier and more efficient.
● Enhanced Security: Subnetting can also help enhance network security. By dividing a large network into smaller subnets, it is possible to
implement more granular security policies. For example, different subnets can be assigned different levels of access permissions, allowing
for more precise control over who can access specific resources on the network. Subnetting can also help in isolating network traffic,
making it more difficult for unauthorized users to gain access to sensitive information.

24
subnet mask

Given network: 192.168.1.0/24

Choose a Suitable Subnet Mask:

Let's say we want to create 4 subnets. To do this, we need to borrow 2 bits from the host portion of the IP address, as 2^2 = 4
subnets.

Subnet mask for 4 subnets: 255.255.255.192 (/26) - 26 bits for the network portion.

25
subnet mask

Determine the Number of Subnets and Hosts per Subnet:

Number of subnets = 2^2 = 4

Number of hosts per subnet = 2^(remaining bits) - 2 = 2^(8-6) - 2 = 2^2 - 2 = 4 - 2 = 2

Calculate the Subnet Address and Broadcast Address:

Subnet 1: 192.168.1.0/26 (Subnet Address: 192.168.1.0, Broadcast Address: 192.168.1.63)

Subnet 2: 192.168.1.64/26 (Subnet Address: 192.168.1.64, Broadcast Address: 192.168.1.127)

Subnet 3: 192.168.1.128/26 (Subnet Address: 192.168.1.128, Broadcast Address: 192.168.1.191)

Subnet 4: 192.168.1.192/26 (Subnet Address: 192.168.1.192, Broadcast Address: 192.168.1.255)

Determine the Range of Usable IP Addresses:

26
subnet mask

Subnet 1: 192.168.1.1 to 192.168.1.62 (Usable: 192.168.1.1 - 192.168.1.62)

Subnet 2: 192.168.1.65 to 192.168.1.126 (Usable: 192.168.1.65 - 192.168.1.126)

Subnet 3: 192.168.1.129 to 192.168.1.190 (Usable: 192.168.1.129 - 192.168.1.190)

Subnet 4: 192.168.1.193 to 192.168.1.254 (Usable: 192.168.1.193 - 192.168.1.254)

27
Port number

5
Port Number

What are Port Numbers?


Port numbers are 16-bit unsigned integers, ranging from 0 to 65535.
They are divided into three ranges:
Well-known ports (0-1023): Reserved for system services or widely used
applications (e.g., HTTP on port 80, HTTPS on port 443).
Registered ports (1024-49151): Assigned to specific applications by the Internet
Assigned Numbers Authority (IANA) (e.g., SSH on port 22, SMTP on port 25).
Dynamic or private ports (49152-65535): Used for ephemeral purposes, such as
temporary connections.

29
Port Number

How Port Numbers Work:


When a computer sends data over a network, it includes the destination port
number along with the destination IP address.
On the receiving end, the operating system uses the port number to determine which
application or service should receive the incoming data.
This allows multiple applications to run simultaneously on a single device, each
communicating through its own port number.

30
Port Number

Commonly Used Ports:

Port 80: Used for HTTP (Hypertext Transfer Protocol) traffic, which is the protocol
used for accessing websites.
Port 443: Used for HTTPS (Hypertext Transfer Protocol Secure) traffic, which is
HTTP encrypted with SSL/TLS.
Port 22: Used for SSH (Secure Shell) traffic, which provides secure access to a remote
computer.
Port 25: Used for SMTP (Simple Mail Transfer Protocol) traffic, which is used for
sending email.
31
Port Number

Port Number Assignments:


Well-known ports are assigned by the IANA, while registered ports can be requested by
application developers or organizations for specific purposes.
Ports are assigned based on the protocol being used (e.g., TCP or UDP) and the type of
service or application.
Firewalls and Port Numbers:
Firewalls can block or allow traffic based on port numbers. For example, a firewall might
block incoming traffic on port 80 to prevent unauthorized access to a web server.
Network administrators use firewalls to control which ports are open or closed to protect
their network from unauthorized access or attacks.
32
Firewall

5
Firewall

A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted internal network and untrusted external networks, such as the
internet, to prevent unauthorized access while allowing legitimate communication.

34
Firewall

Types of Firewalls:
Packet Filtering Firewalls:
Examines packets of data as they pass through the firewall.
Filters packets based on predefined rules (e.g., source/destination IP address, port
number, protocol).
Can be simple and fast but offer limited security features.

35
Firewall

Stateful Inspection Firewalls:

Keeps track of the state of active connections and makes decisions based on the
context of the traffic.
Provides higher security by considering the state of the connection, not just
individual packets.

36
Firewall

Proxy Firewalls:

Acts as an intermediary between internal and external systems.


Requests from internal clients are forwarded to the proxy, which then initiates a new
request to the external server.
Provides additional security by hiding internal IP addresses and filtering content.

37
Firewall

Next-Generation Firewalls (NGFW):

Incorporate features of traditional firewalls, plus additional security measures such


as intrusion prevention, application awareness, and deep packet inspection.
Can identify and block sophisticated attacks, including malware and application-
layer attacks.

38
Firewall

Functions of a Firewall:
Stateful Inspection: Keeps track of the state of active connections to make more
informed decisions about allowing or blocking traffic.
Proxy Services: Acts as an intermediary for client requests, enhancing security by
filtering content and hiding internal network details.
Virtual Private Network (VPN) Support: Supports secure remote access through
VPN tunnels, allowing remote users to securely connect to the internal network.

39
Firewall

Benefits of Firewalls:
Improved Security:Protects against unauthorized access and cyber threats, such as
malware, viruses, and denial-of-service (DoS) attacks.
Network Segmentation: Allows for the creation of security zones within a network,
improving overall network security.
Regulatory Compliance: Helps organizations comply with regulatory requirements
regarding network security and data protection.

40
#RahoAmbitious

Thank you!

44

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy