top of page
  • Writer's pictureXander Billa

Internetworking Basics

Updated: Sep 15, 2022



Network

In this section we'll talk about Inter networking. What is Network? Network is a group of networking devices connected with each other using a router or switch or some other intermediate and other devices like Printers, Scanners, Access Points etc. Group of Network called Internet. Let's say Bob wants to talk Sally. So he have two options whether he yell on the street by her name or find went to his place and knock his door. In case if he yell and communicate with Sally, he'll disturb the other neighbors or it might be possible she lives in other country, town or city or may be continent so she couldn't hear. And in case of he talk to her on her door that'll be a wise decsion and they can talk without disturbing others. Yelling in a public is called Broadcast in networking. Broadcast is nothing but a sender sends the information to everyone. Talking in a nice way is called Unicast, it is one to one communication. In this scenario there were only two persons to communicate so it was not a big deal...but what if there were are multiple users in a network. Than the yell turns into congestion. To avoid and deal with those congestions there are certain rules and ways.Again, the solution to this problem begins with breaking up a massive network into a number of smaller ones—something called network segmentation.


Hubs and Switches

In a networking neighborhood environment, all of this infrastructure is managed using devices like routers, switches, and bridges.



  • We use switch instead of hub because hubs don’t segment a network; they just connect network segments

  • Hub don't provide any security but switch does

  • Hub broadcast each and every packet he recieve but switch broadcast the very first packet

  • Switch have MAC table hub don'r use any MAC table

  • Switches create separate collision domains with each port.

  • switches are used to segment networks, but they will not isolate broadcast or multicast packets.

The above figure shows a network that’s been segmented with a switch, making each network segment that connects to the switch its own separate collision domain. Doing this results in a lot less yelling! but I really want you to make note of the fact that this network is still one, single broadcast domain, meaning that we’ve really only decreased our screaming and yelling—not eliminated it. For example, if there’s some sort of vital announcement that everyone in our neighborhood needs to hear about, it will definitely still get loud! You can see that the hub used in Figure just extended the one collision domain from the switch port. The result is that John received the data from Bob but, happily, Sally did not, which is good because Bob intended to talk with John directly. If he had needed to send a broadcast instead, everyone, including Sally, would have received it, possibly causing unnecessary congestion.


List of some of the things that commonly cause LAN traffic congestion:
  • Too many hosts in a collision domain

  • Broadcast Storm

  • Too much multicast traffic

  • Low bandwidth

  • Adding hubs for connectivity of network

  • A bunch of ARP broadcast

The main purpose of these switches is to make a LAN work better—to optimize its performance—providing more bandwidth for the LAN’s users.


Collision Domain is an Ethernet term used to describe a network scenario in which one device sends a packet out on a network segment and every other device on that same segment is forced to pay attention no matter what. This isn’t very efficient because if a different device tries to transmit at the same time, a collision will occur, requiring both devices to retransmit, one at a time—not good! This happens a lot in a hub environment

Routers

As our planned community starts to grow, we’ll need to add more streets along with traffic control and even some basic security. We achieve this by adding routers because these convenient devices are used to connect networks and route packets of data from one network to another

Routers are basically employed to efficiently break up a Broadcast Domain—the set of all devices on a network segment, which are allowed to “hear” all broadcasts sent out on that specific segment.


  • If a user wants to communicate in a different network/broadcast domain then the sender need an address called IP Address communicate to the receiver.

  • Used to connect WAN (Wide Area Networks) using Serial Cables.

  • Routers (layer 3 switches) use logical addressing and provide an important capacity called packet switching

  • Routers used to break Broadcast Domain as well as collsion Domains

  • Routers filter the traffic based on access-list

  • Router connect two or more network using a logical IP Address called inter network

  • routers use a routing table, essentially a map of the inter network, to make best path selections for getting data to its proper destination and properly forward packets to remote networks

There are two advantages to using routers in your network:
  • They don't forward broadcast by default.

  • They can filter the network based on layer 3 (Network layer) information such as an IP address.

Here are four ways a router functions in your network:
  • Packet Switching

  • Packet Filtering

  • Internetwork Communication

  • Path Selection


Bridges

Bridges are same as the switch, are used to segment networks, but they will not isolate broadcast or multicast packets. Bridges and switches basically do the same thing—break up collision domains on a LAN. A switch is really just a multiple-port bridge with more brain power. Most bridges have four ports. Which is severely limiting. While switches have variation.


Access Points (APs)

These devices allow wireless devices to connect to a wired network and extend a collision domain from a switch. They’re typically in their own broadcast domain or what we’ll refer to as a Virtual LAN (VLAN).


WLAN Controllers

These are the devices that network administrators or network operations centers use to manage access points in medium to large to extremely large quantities. The WLAN controller automatically handles the configuration of wireless access points and was typically used only in larger enterprise systems


Firewalls & IPS

Firewall control the flow of connection to make the connection more secure. It works on certain security policies. It negotiate the unusual incoming traffic.



There are two types of Firewalls:


Traditional Firewalls -
  • Inspect only network address (IPv4/IPv6) and TCP/UDP port numbers

  • Based on all forward-or-block decision based on those values

Next Generation Firewalls -
  • Allow deep packet inspection. It inspect every Layer of OSI Model of every packet.

  • Ability to block or forward packet based on application awareness. Example: From an enterprise network if someone tries to access the Google or FOX news - allow it but block the games and social media sites.

  • Can utilize the outside service to detect the malicious attacks

  • IPS Devices are used to detect the malicious attacks and virus at packet level

CISCO DNA Center

  • DNA Stands for Digital Network Architecture

  • A centralized management dashboard for complete control of a network

  • Provide a central automation and analytics platform to facilate "Internet Based Networking" - Managing the network dynamically based on the need of applications.

  • Appliance pre-built with CISCO DNA Center software

  • Design your Network

  • Create topology maps & diagram

  • Create wireless profiles and SSIDs

  • Identifying "Golden Images" for software deployments. Golden Images means using the same flavor of OS in all the devices which is bug free.

  • Some DNA Center Example - DN2-HW-APL-XL(Large)

Client & Servers

Client are the devices on a network which is used connects with other devices either host/server to access the resources from the remote device from the internet.

Servers are most powerful devices as compared to clients in order. Servers are responsible to share the information to the remote devices who request for the information and resources.



As we can see here, user need information so he will request to the server for information and resources. and server will provide the information. Let's suppose server is trying to access Google, so he'll request for the html page of Google using an application to request the server and the server will give him html copy.

Recent Posts

See All

VLAN or Virtual LAN

20When it comes to separating the multiple domain we can use a concept called VLAN. In this article I will tell you about VLAN also I will give you a brief on configuration as well. Let’s see about VL

OSI Model

In the late 1970s, the Open Systems Interconnection (OSI) Reference Model was created by the International Organization for Standards (ISO). Way for the data transfer between disparate hosts running d

bottom of page