WIA1005 Network Technology Foundation: Application Layer and Build A Small Network
WIA1005 Network Technology Foundation: Application Layer and Build A Small Network
WIA1005 Network Technology Foundation: Application Layer and Build A Small Network
Technology Foundation
Chapter 6
Application Layer and Build a
Small Network
Contents
Introduction
Network Services
Small Network
Troubleshooting
Introduction
The application layer is closest to the end user. The
layer that provides the interface between the applications
we use to communicate and the underlying network over
which our messages are transmitted.
Application layer protocols are used to exchange data
between programs running on the source and
destination hosts.
Some of the most widely known application layer
protocols include Hypertext Transfer Protocol (HTTP),
File Transfer Protocol (FTP), Trivial File Transfer
Protocol (TFTP), Internet Message Access Protocol
(IMAP), and Domain Name System (DNS) protocol.
Introduction
The presentation layer has three primary functions:
Formats, or presents, data from the source device into
a compatible form for receipt by the destination
device.
Compression of the data in a way that can be
decompressed by the destination device.
Encryption of the data for transmission and the
decryption of data upon receipt by the destination.
The session layer create and maintain dialogs between
source and destination applications. The session layer
handles the exchange of information to initiate dialogs,
keep them active, and to restart sessions that are
disrupted or idle for a long period of time.
Network Services
Hypertext Transfer Protocol (HTTP)
This protocol transfers files that make up the web
pages of the World Wide Web.
HTTP is a request/response protocol. When a client,
typically a web browser, sends a request to a web
server, The three common message types are GET,
POST, and PUT.
The server will response according to the request.
Bandwidth
Expandability
Fixed / Modular
Services
Small Network
Another important part of network design is reliability.
Even small businesses often rely heavily on their
network for business operation. A failure of the network
can be very costly. In order to maintain a high degree of
reliability, redundancy is required in the network design.
Besides, the types of application and traffic treatment
must be identified.
The common applications include Web, Email, FTP,
DHCP, DNS, and SSH.
Small Network
Small Network
Network administrator needs to plan for the growth of the
small network.
To scale a network, several elements are required:
Network Documentation
Device Inventory
Budget
Traffic Analysis
Type of traffic
Utilization
Small Network
Network administrator needs to secure the network from
attacks.
Vulnerability is the degree of weakness which is
inherent in every network and device.
There are three primary vulnerabilities:
Technological
Configuration
Security policy
Worms
Trojan horses
Network Attacks
Reconnaissance attacks
Access attacks
Denial of service
Small Network
Keeping up-to-date with the latest developments can
lead to a more effective defense against network attacks.
Authentication, authorization, and accounting (AAA) is
the primary framework to set up access control on a
network device.
A firewall can be used to protect users from external
threats.
To protect network devices, it is important to use strong
passwords. Blocking login attempt is required against
brute-force attack.
security passwords min-length
login block-for 120 attempts 3 within 60
Troubleshooting
Troubleshooting is used to analyse the problem,
determine the cause of the error, implement a plan of
action, and resolve the network issue.
Troubleshooting
When a problem has been solved and a solution
implemented, it is important to verify the system
operation. ping, traceroute and show are some of the
verification commands
ping command is an effective way to test connectivity.
The ping command uses the Internet Control Message
Protocol (ICMP) and verifies Layer 3 connectivity.
Troubleshooting
Traceroute is useful in troubleshooting routing loops and
determining the exact next-hop router.
An ICMP "time exceeded" indicates that a router in the
path has seen and discarded the packet. An ICMP
"destination unreachable" indicates that a router has
received the packet, but discarded it because it could not
be delivered.
Troubleshooting
The show commands display relevant information about
the configuration and operation of the device.
show running-config
show arp
show ip route
show protocols
show version
undebug
undebug all
Troubleshooting
Troubleshooting
Administrative can access to a router remotely on virtual
console (VTY) lines using SSH or Telnet. However, log
messages are not displayed by default on virtual console
lines.
To display log messages on a terminal (virtual console)
terminal monitor