SlideShare una empresa de Scribd logo
1 de 19
Networking Brief Overview

             Kristof De Brouwer




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Agenda
       OSI – Model
       WAN
       Convergence
       Wireless
       Q&A




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
OSI Model
     Overview




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
OSI model – definition
       Open System Interconnection
       Conceptual/Reference model
       7 layers
       Simplify complex process
       Describes communication between nodes
       Nodes = computers, routers, switches,…
       Simplifies Internetwork concept




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
OSI Model – Encapsulation




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
OSI Model – Physical Layer
       Defines functions
                     –Electrical
                     –Mechanical
                     –Procedural and functional

       Maintains physical link between nodes
       Examples:
                     –10baseT, 100baseT,RJ45
                     –X.21,v.35




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
OSI Model – Data link Layer
       Provides reliable transit of data across physical link
       2 sub-layers
                     –MAC (media access control): physical addressing
                               MAC address
                              Example: 00-15-58-27-81-9E
                     –LLC (logical link control) : flow control

       Examples:
                     –HDLC, PPP, Ethernet




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential    7
OSI Model – Network Layer
       Provides end-to-end delivery of packets
       Defines logical addressing
       Defines how routing works
       Mapping between physical address (MAC address) and
        logical address (Network address) : ARP
       Examples:
                     –IP ; 144.254.0.1/24




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
OSI Model – Transport Layer
       Re-ordering and re-assembling
       Examples
                     –TCP: provides error-correction
                     –UDP: no error-correction
                     –RTP: Re-ordering




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
WAN
     Overview




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
WAN – Overview
       LAN = Local Area Network


       LANs need to be connected to each other


       WAN can overcome large distances between LANs


       MAN can overcome smaller (metropolitan) distances
        between LANs


       Types of WAN: Frame Relay, ATM, Leased Line, ISDN

© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
WAN – Leased Line
       A leased line is a high-performance and permanently available
        Internet connection carrying voice, data and Internet traffic. A
        leased line is rented from telecommunications providers
       Unlike dial-up connections, a leased line is always active
       Leased lines deliver dedicated, guaranteed bandwidth and are
        supported by Service-Level Agreements (SLA)
       Different types of leased lines are E1, T1, E3, T3 or Frame Relay.
       Leased Lines are normally used by businesses:
                     –Who require high quality 24/7 access
                     –Who are running mission critical applications, cannot afford downtime
                     and require SLAs
                     –With multiple offices that require connectivity
       Leased line is delivered on copper or fiber optic transmission
        network

© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                          12
WAN - MPLS
       MPLS stands for quot;Multiprotocol Label Switching“.


       In an MPLS network, incoming packets are assigned a label by a
        quot;label edge router (LER)quot;. Packets are forwarded along a quot;label
        switch path (LSP)quot; where each quot;label switch router (LSR)quot; makes
        forwarding decisions based solely on the contents of the label. At
        each hop, the LSR strips off the existing label and applies a new
        label which tells the next hop how to forward the packet.


       A big advantage of MPLS is the ability to create end-to-end
        circuits, with specific performance characteristics, across any type
        of transport medium, eliminating the need for overlay networks or
        Layer 2 only control mechanisms.


© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential           13
Convergence
     Overview




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Convergence
       Data, Voice and Video send over IP networks
       Voice traffic inside goes over the corporate IP network
        (VoIP)
       Not possible for calls outside corporate network
       ISDN PRI is used for outside calls, and calls from
        outside towards corporate network (DID)
       E1  one call possible / each channel
                        30 channels = 30 concurrent calls (incoming or
                     outgoing)



© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential      15
Convergence - Qos
       Guarantee “services”
       Prioritize interesting (important) traffic
                     –Voice
                     –Video
                     –Data
       Prevent Congestion
       Manage Congestion
       Tools
                     –Classification & Marking
                     –Congestion Management
                     –Congestion Avoidance
                     –Traffic Conditioning

© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Convergence – QOS (2)

Classification                           Congestion                       Congestion
    and                                  Management                       Avoidance      Traffic          Link-
   Marking                                                                             Conditioning     Efficiency
                                                                                                       Management




  Identify                                                                Discard                     Fragment
   and/or                                                                 specific
                                      Prioritize,                                                         and
   Mark                                                                  packets to       Control
                                     Protect and                                                      compress
  Traffic.                                                                 avoid         bursts and
                                       Isolate                                                        for WAN
                                                                         congestion       conform
                                    Traffic, based                                                    efficiency
                                                                                           traffic
                                    on Markings

  © 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                                             17
Convergence - VOIP
      + More efficient use of bandwidth and equipment
      + Lower costs for telephony
      + Consolidated voice and data
      + Increased revenues from new services
      + Greater innovation in services
      + Access to new communication devices


      - Return on investment difficult to prove
      - Potential upgrade costs may override potential savings cost




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   18
Convergence – IPPhone
       Obtain power from switch
                     –Switch detects an unpowered phone and sends power down the Ethernet
                     cable
       Load stored image
                     –Firmware stored in non-volatile flash
                     –Initialising software and hardware
       Vlan
                     –Switch sends a CDP packet with vlan information
       Contact TFTP server
                     –Configuration files for the phone
                     –Contains up to 3 CallManagers
       Register with CallManager
                     –TCP connection is made to register with the CallManager
                     –Starting with highest CCM in the list
                     –Phone gets load ID from CallManager (Upgrade if needed)




© 2006 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                        19

Más contenido relacionado

La actualidad más candente

Dell - 9febr2012
Dell - 9febr2012Dell - 9febr2012
Dell - 9febr2012Agora Group
 
Sparton Corp WAN Analysis
Sparton Corp WAN AnalysisSparton Corp WAN Analysis
Sparton Corp WAN Analysistcollins3413
 
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...Juniper Networks
 
Trill spb-comparison-extract
Trill spb-comparison-extractTrill spb-comparison-extract
Trill spb-comparison-extractIssacYuan
 
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesSecure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesCisco Mobility
 
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...SkillFactory
 
Mellanox hpc day 2011 kiev
Mellanox hpc day 2011 kievMellanox hpc day 2011 kiev
Mellanox hpc day 2011 kievVolodymyr Saviak
 
Scalable midsize data center designs
Scalable midsize data center designsScalable midsize data center designs
Scalable midsize data center designsJing Bai
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Key Considerations for MPLS IP-VPN Success
Key Considerations for  MPLS IP-VPN SuccessKey Considerations for  MPLS IP-VPN Success
Key Considerations for MPLS IP-VPN SuccessXO Communications
 
#NSD14 - Sécuriser l'infrastructure réseau des datacenters
#NSD14 - Sécuriser l'infrastructure réseau des datacenters#NSD14 - Sécuriser l'infrastructure réseau des datacenters
#NSD14 - Sécuriser l'infrastructure réseau des datacentersNetSecure Day
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureCisco Mobility
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Johnson Liu
 

La actualidad más candente (17)

Dell - 9febr2012
Dell - 9febr2012Dell - 9febr2012
Dell - 9febr2012
 
Sparton Corp WAN Analysis
Sparton Corp WAN AnalysisSparton Corp WAN Analysis
Sparton Corp WAN Analysis
 
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
Network Configuration Example: Configuring VPLS Pseudowires on MX Series Devi...
 
Ccnp course details
Ccnp course detailsCcnp course details
Ccnp course details
 
Ati sbx908-ds
Ati sbx908-dsAti sbx908-ds
Ati sbx908-ds
 
Trill spb-comparison-extract
Trill spb-comparison-extractTrill spb-comparison-extract
Trill spb-comparison-extract
 
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesSecure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
 
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...
 
Mellanox hpc day 2011 kiev
Mellanox hpc day 2011 kievMellanox hpc day 2011 kiev
Mellanox hpc day 2011 kiev
 
Scalable midsize data center designs
Scalable midsize data center designsScalable midsize data center designs
Scalable midsize data center designs
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Key Considerations for MPLS IP-VPN Success
Key Considerations for  MPLS IP-VPN SuccessKey Considerations for  MPLS IP-VPN Success
Key Considerations for MPLS IP-VPN Success
 
#NSD14 - Sécuriser l'infrastructure réseau des datacenters
#NSD14 - Sécuriser l'infrastructure réseau des datacenters#NSD14 - Sécuriser l'infrastructure réseau des datacenters
#NSD14 - Sécuriser l'infrastructure réseau des datacenters
 
Meraki Datasheet MR12
Meraki Datasheet MR12Meraki Datasheet MR12
Meraki Datasheet MR12
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)
 
1800sg
1800sg1800sg
1800sg
 

Destacado (14)

Nicaragua ppt.zip
Nicaragua ppt.zipNicaragua ppt.zip
Nicaragua ppt.zip
 
Power point nicaragua
Power point nicaraguaPower point nicaragua
Power point nicaragua
 
Nicaragua
NicaraguaNicaragua
Nicaragua
 
Nicaragua
NicaraguaNicaragua
Nicaragua
 
Posición geográfica de nicaragua
Posición geográfica de nicaraguaPosición geográfica de nicaragua
Posición geográfica de nicaragua
 
Nicaragua
NicaraguaNicaragua
Nicaragua
 
Ventajas De Nicaragua
Ventajas De NicaraguaVentajas De Nicaragua
Ventajas De Nicaragua
 
Libro de estudios sociales 10mo grado
Libro de estudios sociales 10mo gradoLibro de estudios sociales 10mo grado
Libro de estudios sociales 10mo grado
 
Libro de estudios sociales 7mo grado
Libro de estudios sociales 7mo gradoLibro de estudios sociales 7mo grado
Libro de estudios sociales 7mo grado
 
ATLAS DE NICARAGUA
ATLAS DE NICARAGUAATLAS DE NICARAGUA
ATLAS DE NICARAGUA
 
Diapositivas Nicaragua Libre Sandino
Diapositivas  Nicaragua Libre SandinoDiapositivas  Nicaragua Libre Sandino
Diapositivas Nicaragua Libre Sandino
 
Hidrografía de nicaragua
Hidrografía de nicaraguaHidrografía de nicaragua
Hidrografía de nicaragua
 
Santo Tomás de Aquino
Santo Tomás de AquinoSanto Tomás de Aquino
Santo Tomás de Aquino
 
Presentazioni efficaci EFFETTO WOW
Presentazioni efficaci EFFETTO WOWPresentazioni efficaci EFFETTO WOW
Presentazioni efficaci EFFETTO WOW
 

Similar a PRESENTACION FINAL Nicaragua

Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:Cisco Canada
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Jeff Green
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 
Dcna technology update
Dcna technology updateDcna technology update
Dcna technology updateRamana Rongala
 
Framework for the New IP - Phil O'Reilly
Framework for the New IP - Phil O'ReillyFramework for the New IP - Phil O'Reilly
Framework for the New IP - Phil O'Reillyscoopnewsgroup
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data CenterCisco Russia
 
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsCisco Russia
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relayjuliusbangaw
 
從INTEL技術談網路卡
從INTEL技術談網路卡從INTEL技術談網路卡
從INTEL技術談網路卡zman
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
Scalar Brocade Toronto Roadshow 2013
Scalar Brocade Toronto Roadshow 2013Scalar Brocade Toronto Roadshow 2013
Scalar Brocade Toronto Roadshow 2013patmisasi
 
Cisco SFPOC48SR
Cisco SFPOC48SRCisco SFPOC48SR
Cisco SFPOC48SRsavomir
 
Eng.abd elrhman(cv u)
Eng.abd elrhman(cv u)Eng.abd elrhman(cv u)
Eng.abd elrhman(cv u)INOGHOST
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1Waqas Ahmed Nawaz
 

Similar a PRESENTACION FINAL Nicaragua (20)

Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
Dcna technology update
Dcna technology updateDcna technology update
Dcna technology update
 
Framework for the New IP - Phil O'Reilly
Framework for the New IP - Phil O'ReillyFramework for the New IP - Phil O'Reilly
Framework for the New IP - Phil O'Reilly
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data Center
 
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
 
BRKCRS-2110.pdf
BRKCRS-2110.pdfBRKCRS-2110.pdf
BRKCRS-2110.pdf
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
 
E s switch_v6_ch01
E s switch_v6_ch01E s switch_v6_ch01
E s switch_v6_ch01
 
從INTEL技術談網路卡
從INTEL技術談網路卡從INTEL技術談網路卡
從INTEL技術談網路卡
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
Scalar Brocade Toronto Roadshow 2013
Scalar Brocade Toronto Roadshow 2013Scalar Brocade Toronto Roadshow 2013
Scalar Brocade Toronto Roadshow 2013
 
Cisco SFPOC48SR
Cisco SFPOC48SRCisco SFPOC48SR
Cisco SFPOC48SR
 
Eng.abd elrhman(cv u)
Eng.abd elrhman(cv u)Eng.abd elrhman(cv u)
Eng.abd elrhman(cv u)
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
 

Más de enriquebio2

Cooperación Técnica
Cooperación TécnicaCooperación Técnica
Cooperación Técnicaenriquebio2
 
Métodos de recolección Y ASPECTOS A CONSIDERAR
Métodos de recolección Y ASPECTOS A CONSIDERARMétodos de recolección Y ASPECTOS A CONSIDERAR
Métodos de recolección Y ASPECTOS A CONSIDERARenriquebio2
 
Marco Legal y de Residuos Sólidos en México
Marco Legal y de Residuos Sólidos en MéxicoMarco Legal y de Residuos Sólidos en México
Marco Legal y de Residuos Sólidos en Méxicoenriquebio2
 
Exposición final Bárbara1Cuba
Exposición final Bárbara1CubaExposición final Bárbara1Cuba
Exposición final Bárbara1Cubaenriquebio2
 
DISEÑO DE MACRORUTAS
DISEÑO DE MACRORUTASDISEÑO DE MACRORUTAS
DISEÑO DE MACRORUTASenriquebio2
 
Procuraduría de Protección al Ambiente del Estado de México
Procuraduría de Protección al Ambiente del Estado de México Procuraduría de Protección al Ambiente del Estado de México
Procuraduría de Protección al Ambiente del Estado de México enriquebio2
 
Características Químicas RSU
Características Químicas RSUCaracterísticas Químicas RSU
Características Químicas RSUenriquebio2
 
ALMACENAMIENTO RSU
ALMACENAMIENTO RSUALMACENAMIENTO RSU
ALMACENAMIENTO RSUenriquebio2
 
COSTOS DE SERVICIOS DE LIMPIA
COSTOS DE SERVICIOS DE LIMPIACOSTOS DE SERVICIOS DE LIMPIA
COSTOS DE SERVICIOS DE LIMPIAenriquebio2
 
Residuos Peligrosos y Desarrollo SustentableTareas Pendientes
Residuos  Peligrosos y Desarrollo SustentableTareas PendientesResiduos  Peligrosos y Desarrollo SustentableTareas Pendientes
Residuos Peligrosos y Desarrollo SustentableTareas Pendientesenriquebio2
 
Producción Más Limpia, Eficiencia Energética y Administración Ambiental en Pl...
Producción Más Limpia, Eficiencia Energética y Administración Ambiental en Pl...Producción Más Limpia, Eficiencia Energética y Administración Ambiental en Pl...
Producción Más Limpia, Eficiencia Energética y Administración Ambiental en Pl...enriquebio2
 
PLAN DE ACCION PERU
PLAN DE ACCION PERUPLAN DE ACCION PERU
PLAN DE ACCION PERUenriquebio2
 
Suelos Contaminados en México (Bases Legales para la Prevención y Remediación)
Suelos Contaminados en México (Bases Legales para la Prevención y Remediación)Suelos Contaminados en México (Bases Legales para la Prevención y Remediación)
Suelos Contaminados en México (Bases Legales para la Prevención y Remediación)enriquebio2
 
TRATAMIENTO FÍSICO, QUÍMICO
TRATAMIENTO FÍSICO, QUÍMICOTRATAMIENTO FÍSICO, QUÍMICO
TRATAMIENTO FÍSICO, QUÍMICOenriquebio2
 
Plan de acción en base a los conocimientos Rep. Dominicana (Manuel)
Plan de acción en base a los conocimientos Rep. Dominicana (Manuel)Plan de acción en base a los conocimientos Rep. Dominicana (Manuel)
Plan de acción en base a los conocimientos Rep. Dominicana (Manuel)enriquebio2
 
Suelos Contaminados en México
Suelos Contaminados en MéxicoSuelos Contaminados en México
Suelos Contaminados en Méxicoenriquebio2
 
Características Biológicas
Características BiológicasCaracterísticas Biológicas
Características Biológicasenriquebio2
 

Más de enriquebio2 (20)

INTRODUCCION
INTRODUCCIONINTRODUCCION
INTRODUCCION
 
CENICA
CENICACENICA
CENICA
 
Cooperación Técnica
Cooperación TécnicaCooperación Técnica
Cooperación Técnica
 
Métodos de recolección Y ASPECTOS A CONSIDERAR
Métodos de recolección Y ASPECTOS A CONSIDERARMétodos de recolección Y ASPECTOS A CONSIDERAR
Métodos de recolección Y ASPECTOS A CONSIDERAR
 
Marco Legal y de Residuos Sólidos en México
Marco Legal y de Residuos Sólidos en MéxicoMarco Legal y de Residuos Sólidos en México
Marco Legal y de Residuos Sólidos en México
 
Exposición final Bárbara1Cuba
Exposición final Bárbara1CubaExposición final Bárbara1Cuba
Exposición final Bárbara1Cuba
 
DISEÑO DE MACRORUTAS
DISEÑO DE MACRORUTASDISEÑO DE MACRORUTAS
DISEÑO DE MACRORUTAS
 
Procuraduría de Protección al Ambiente del Estado de México
Procuraduría de Protección al Ambiente del Estado de México Procuraduría de Protección al Ambiente del Estado de México
Procuraduría de Protección al Ambiente del Estado de México
 
EdoMex PROPAEM
EdoMex PROPAEMEdoMex PROPAEM
EdoMex PROPAEM
 
Características Químicas RSU
Características Químicas RSUCaracterísticas Químicas RSU
Características Químicas RSU
 
ALMACENAMIENTO RSU
ALMACENAMIENTO RSUALMACENAMIENTO RSU
ALMACENAMIENTO RSU
 
COSTOS DE SERVICIOS DE LIMPIA
COSTOS DE SERVICIOS DE LIMPIACOSTOS DE SERVICIOS DE LIMPIA
COSTOS DE SERVICIOS DE LIMPIA
 
Residuos Peligrosos y Desarrollo SustentableTareas Pendientes
Residuos  Peligrosos y Desarrollo SustentableTareas PendientesResiduos  Peligrosos y Desarrollo SustentableTareas Pendientes
Residuos Peligrosos y Desarrollo SustentableTareas Pendientes
 
Producción Más Limpia, Eficiencia Energética y Administración Ambiental en Pl...
Producción Más Limpia, Eficiencia Energética y Administración Ambiental en Pl...Producción Más Limpia, Eficiencia Energética y Administración Ambiental en Pl...
Producción Más Limpia, Eficiencia Energética y Administración Ambiental en Pl...
 
PLAN DE ACCION PERU
PLAN DE ACCION PERUPLAN DE ACCION PERU
PLAN DE ACCION PERU
 
Suelos Contaminados en México (Bases Legales para la Prevención y Remediación)
Suelos Contaminados en México (Bases Legales para la Prevención y Remediación)Suelos Contaminados en México (Bases Legales para la Prevención y Remediación)
Suelos Contaminados en México (Bases Legales para la Prevención y Remediación)
 
TRATAMIENTO FÍSICO, QUÍMICO
TRATAMIENTO FÍSICO, QUÍMICOTRATAMIENTO FÍSICO, QUÍMICO
TRATAMIENTO FÍSICO, QUÍMICO
 
Plan de acción en base a los conocimientos Rep. Dominicana (Manuel)
Plan de acción en base a los conocimientos Rep. Dominicana (Manuel)Plan de acción en base a los conocimientos Rep. Dominicana (Manuel)
Plan de acción en base a los conocimientos Rep. Dominicana (Manuel)
 
Suelos Contaminados en México
Suelos Contaminados en MéxicoSuelos Contaminados en México
Suelos Contaminados en México
 
Características Biológicas
Características BiológicasCaracterísticas Biológicas
Características Biológicas
 

Último

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

PRESENTACION FINAL Nicaragua

  • 1. Networking Brief Overview Kristof De Brouwer © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Agenda  OSI – Model  WAN  Convergence  Wireless  Q&A © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. OSI Model Overview © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. OSI model – definition  Open System Interconnection  Conceptual/Reference model  7 layers  Simplify complex process  Describes communication between nodes  Nodes = computers, routers, switches,…  Simplifies Internetwork concept © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. OSI Model – Encapsulation © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. OSI Model – Physical Layer  Defines functions –Electrical –Mechanical –Procedural and functional  Maintains physical link between nodes  Examples: –10baseT, 100baseT,RJ45 –X.21,v.35 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. OSI Model – Data link Layer  Provides reliable transit of data across physical link  2 sub-layers –MAC (media access control): physical addressing  MAC address Example: 00-15-58-27-81-9E –LLC (logical link control) : flow control  Examples: –HDLC, PPP, Ethernet © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. OSI Model – Network Layer  Provides end-to-end delivery of packets  Defines logical addressing  Defines how routing works  Mapping between physical address (MAC address) and logical address (Network address) : ARP  Examples: –IP ; 144.254.0.1/24 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. OSI Model – Transport Layer  Re-ordering and re-assembling  Examples –TCP: provides error-correction –UDP: no error-correction –RTP: Re-ordering © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. WAN Overview © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. WAN – Overview  LAN = Local Area Network  LANs need to be connected to each other  WAN can overcome large distances between LANs  MAN can overcome smaller (metropolitan) distances between LANs  Types of WAN: Frame Relay, ATM, Leased Line, ISDN © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. WAN – Leased Line  A leased line is a high-performance and permanently available Internet connection carrying voice, data and Internet traffic. A leased line is rented from telecommunications providers  Unlike dial-up connections, a leased line is always active  Leased lines deliver dedicated, guaranteed bandwidth and are supported by Service-Level Agreements (SLA)  Different types of leased lines are E1, T1, E3, T3 or Frame Relay.  Leased Lines are normally used by businesses: –Who require high quality 24/7 access –Who are running mission critical applications, cannot afford downtime and require SLAs –With multiple offices that require connectivity  Leased line is delivered on copper or fiber optic transmission network © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. WAN - MPLS  MPLS stands for quot;Multiprotocol Label Switching“.  In an MPLS network, incoming packets are assigned a label by a quot;label edge router (LER)quot;. Packets are forwarded along a quot;label switch path (LSP)quot; where each quot;label switch router (LSR)quot; makes forwarding decisions based solely on the contents of the label. At each hop, the LSR strips off the existing label and applies a new label which tells the next hop how to forward the packet.  A big advantage of MPLS is the ability to create end-to-end circuits, with specific performance characteristics, across any type of transport medium, eliminating the need for overlay networks or Layer 2 only control mechanisms. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Convergence Overview © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Convergence  Data, Voice and Video send over IP networks  Voice traffic inside goes over the corporate IP network (VoIP)  Not possible for calls outside corporate network  ISDN PRI is used for outside calls, and calls from outside towards corporate network (DID)  E1  one call possible / each channel  30 channels = 30 concurrent calls (incoming or outgoing) © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Convergence - Qos  Guarantee “services”  Prioritize interesting (important) traffic –Voice –Video –Data  Prevent Congestion  Manage Congestion  Tools –Classification & Marking –Congestion Management –Congestion Avoidance –Traffic Conditioning © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Convergence – QOS (2) Classification Congestion Congestion and Management Avoidance Traffic Link- Marking Conditioning Efficiency Management Identify Discard Fragment and/or specific Prioritize, and Mark packets to Control Protect and compress Traffic. avoid bursts and Isolate for WAN congestion conform Traffic, based efficiency traffic on Markings © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Convergence - VOIP + More efficient use of bandwidth and equipment + Lower costs for telephony + Consolidated voice and data + Increased revenues from new services + Greater innovation in services + Access to new communication devices - Return on investment difficult to prove - Potential upgrade costs may override potential savings cost © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Convergence – IPPhone  Obtain power from switch –Switch detects an unpowered phone and sends power down the Ethernet cable  Load stored image –Firmware stored in non-volatile flash –Initialising software and hardware  Vlan –Switch sends a CDP packet with vlan information  Contact TFTP server –Configuration files for the phone –Contains up to 3 CallManagers  Register with CallManager –TCP connection is made to register with the CallManager –Starting with highest CCM in the list –Phone gets load ID from CallManager (Upgrade if needed) © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. Convergence – Callmanager  Primary Functions –Call processing: Route the call from source to destination –Signalling and Device Control Set up all signalling connections between call endpoints Direct devices (ip phones, gateways, …) to setup and tear down streaming connections –Dial Plan administration Configure the list CCM uses to determine call routing –Phone Features Hold, transfer, forward, conference, … Speed dials, last-number redial, … –Directory Services LDAP database Authenticate and authorize users © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. Convergence – VOIP Protocols  Skinny Client Control Protocol (SCCP) –Communication between CallManager and IP phones –Call setup and teardown  H.323 –VoIP signalling and Call Control Signalling for Call Setup and teardown Control function for: Opening and closing channels (that carry the media stream) Negotiation of audio, video and codec's between the endpoints Determination of master / slave –Based on ISDN Q.931  RTP –Real Time Protocol –Carries voice payload across IP network –Uses UDP  RTCP –Real Time Control Protocol –Provides statistics on the call –For every RTP stream, there’s an RTCP stream as well © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. Convergence – VOIP on OSI Model Application Softphone, CallManager Applications Presentation Codec’s (G.711, G.729, …) Session H.323 / SIP / MGCP / SCCP Transport RTP/UDP (Media), TCP/UDP (signalling) Network IP Data-link Ethernet, Point-to-Point protocol, HDLC, … Physical … © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. Wireless Overview © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Wireless - Mode  Infrastructure Mode In Infrastructure Mode, clients communicate through an Access Point (AP). The AP is a point at which wireless clients can access the network. The AP attaches to the Ethernet wired backbone and controls traffic flow to and from the network. The remote devices do not communicate directly with eachother ... They communicate to the AP.  Ad-hoc Mode Ad-hoc Mode is used to establish a peer-to-peer network between two or more clients. There’s no need for a 3rd party to be involved. You can compare Ad-hoc to a cross-cable between two clients. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. Wireless – Frequency & Modulation  Frequencies Three bands are defined as unlicenced: - 900 Mhz - 2,4 Ghz - 5 Ghz 1 Mbps 2 Mbps 5,5 Mbps Each range has different charactaristics. 11 Mbps The lower frequencies exhibit better range, but with limited bandwidth and hence lower data rates. Higher frequencies have less range and subject to greater attenuation from solid objects. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. Wireless – Frequency & Modulation (2)  DSSS Direct Sequence Spread Spectrum. 14 channels (13 for europe) are defined in the Direct Sequence (DS) channel set. Each channel is 22 Mhz wide, and 5 Mhz apart from the next: In the DS channel system, only three non-overlapping (hence non-interfering) channels are possible (such as channels 1, 6 and 11). 6 1 11 6 1 11 11 6 6 1 111 6 1 11 6 1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Wireless – Frequency & Modulation (3)  OFDM Orthogonal Frequency Division Multiplexing. OFDM is a multi-carrier system, meaning one high-speed data stream is broken into a number of lower-speed data streams, which are then transmitted in parallel (simultaniously). Essentially, this allows sub- channels to overlap, providing a high spectral efficiency. This channel system supports twelve non-overlapping channels. 10 5 4 1 11 9 6 3 12 8 7 2 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Wireless – Authentication There’s two steps involved in connecting to a wireless AP. First the client station must be authenticated. If the authentication passes, the station can then be associated. Only when both these steps have completed, traffic can pass.  Shared Key Authentication Shared Key authentication is considered insecure:  only available in combination with WEP (Wired Equivalent Privacy) WEP uses a key known by both transmitter and receiver to encrypt and decrypt data signals.  AP sends random ASCII string to client. Client encrypts using WEP and sends encrypted data back to AP. AP verifies encrypted string. Both unencrypted & encrypted string can be intercepted, which makes it possible to reverse engineer the used WEP key!! © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Wireless – Authentication (2)  Open Authentication Open authentication is considered insecure:  no user verification  any device can authenticate  authentication traffic is sent in clear text Which is best, Open or Shared Key? Although still not concidered secure, Open Authentication in combination with WEP ends up being the better choice.The station will get authenticated and associated automatically, but it will still need the correct WEP key to encrypt/decrypt data. Since Open Authentication doesn’t send out data which makes reverse engineering of the key possible, unencrypted packets will just be discarded. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Wireless – Authentication (3)  SSID Based Authentication Service Set Identifier (SSID) is a code attached to all packets on a wireless network to identify each packet as part of that network. All wireless devices attempting to communicate with each other must share the same SSID SSID’s can be broadcasted, for everyone to see, or can be ‘hidden’, so only client stations that know the exact SSID string are able to authenticate. Hiding the SSID is concidered an extremely weak form of wireless security. Although the average user may not be able to see a network, the SSID can still be seen using the appropriate tools. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Wireless – Authentication (3)  MAC Address Authentication Permits AP’s to filter based on client MAC addresses, allowing only those clients that are in the “allow list” to be authenticated. A possible security risk using this type of authentication is “spoofing” or altering the client’s MAC address to still gain access to the network. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
  • 32. Wireless – Network Authentication  Network Authentication All protocols used for network authentication (except WPA and Radius) are based on the Extensible Authentication Protocol (EAP). EAP is an authentication framework which provides common functions and mechanisms used in (amongst others) the following authentication methods: -LEAP Lightweight EAP (Developed by Cisco) Supports the use of dynamic WEP keys and mutual authentication (between client and Radius server). LEAP allows for clients to re- authenticate frequently, providing a new WEP key with each successful authentication. -PEAP Protected EAP Uses server-side public key certificates to authenticate clients by creating an encrypted tunnel between the client and the authentication server. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 33. Wireless – Security - WEP Wired Equivalent Privacy Uses a security scheme that utilizes a combination of secret user keys and system-generated values.. These keys are used to encrypt and decrypt data. Both the client station and the AP need the same key to be able to communicate. The key can be either 40, 128 or 256 bits in length, but is fairly easy to “hack”. - TKIP Temporary Key Integrity Protocol TKIP is used by WPA, and was developed to replace WEP. It makes use of a mechanism called “key mixing”, ensuring every data packet is sent with its own unique encryption key. This makes decoding the keys somewhat more complex. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
  • 34. Wireless – Network Authentication - EAP-FAST Flexible Authentication via Secure Tunneling (Developed by Cisco) Developed to replace LEAP. Like PEAP, EAP-FAST makes use of a secure tunnel. However, this tunnel is established using a pre-shared key. - WPA Wi-Fi Protected Access Uses TKIP, which was developed to replace WEP and its weaknesses. Features two different modes of operation: Enterprise Mode: Makes use of the Radius architecture, authenticating to a dedicated Radius authentication server. Pre-Shared Key (PSK) mode: Makes use of a static key or “passphrase” known by both the client and the AP. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Wireless - Roaming  Roaming occurs when a wireless client, currently associated to a certain AP moves out of that AP’s coverage area. In such case the client needs to associate to another AP that does have coverage for that area. The process of client association shifting between different AP’s is called roaming. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. Wireless – Next Generation  Current Situation: AP’s are “intelligent”. They process 802.11 frames They have limited QoS (Quality of Service) functionalities They have certain security features ....  requires processing power and memory  requires “complex” configuration of the AP’s  New (NextGen) Situation: “Centralized WLAN”, which is based on a controller architecture. The central controller will take over the intelligent functions. Lightweight Access Point Protocol (LWAPP) is used to handle authentication and encryption between the AP’s and the controller.  processing & memory intensive tasks shift to controller  requires much less configuration on the AP’s  significantly eases management © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36

Notas del editor

  1. Provides reliable transit of data across physical link2 sub-layersMAC (media access control): physical addressing MAC addressExample: 00-15-58-27-81-9LLC (logical link control) : flow controlData link protocol defines a linkExamples:HDLC, PPP, EthernetProvides reliable transit of data across physical link2 sub-layersMAC (media access control): physical addressing MAC addressExample: 00-15-58-27-81-9LLC (logical link control) : flow controlData link protocol defines a linkExamples:HDLC, PPP, EthernetProvides end-to-end delivery of packetsDefines logical addressingDefines how routing worksMapping between physical address (MAC address) and logical address (Network address) : ARPExamples:IP ; 144.254.0.1/24Explained further in Routing session