Length: 3 Days
Print Friendly, PDF & Email

Introduction to Networking, Hands-on Workshop

Integrated-Network-SoS

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network.

Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols permit organizations to communicate globally, which plays a crucial role in modern digital communications.

Similar to the way that speaking the same language simplifies communication between two people, network protocols make it possible for devices to interact with each other because of predetermined rules built into devices’ software and hardware.

Today most computers do this through TCP/IP, which is typically built into computers and is largely automated. Still, it’s helpful to understand the TCP/IP model, particularly when you’re setting up a computer to connect with other systems.

Any given interaction may be between two computer systems, or it may involve hundreds of systems. But, like passing a letter or a package from hand to hand, each transaction occurs between just two computers at a time. For this to happen, the two computers need to know, ahead of time, how they are expected to communicate.

Computers do this through protocols. A protocol is an agreed-upon set of rules that are hard and fast. When computers all use the same protocol, information can be transferred. When they don’t, it’s chaos.

TCP and IP are two separate computer network protocols.

IP is the part that obtains the address to which data is sent. TCP is responsible for data delivery once that IP address has been found.

There are thousands of different network protocols that are necessary to use network devices swiftly and safely – all working together to facilitate that usage. They all perform one of three primary actions:

  • Network management — Network management protocols define and describe the various procedures needed to effectively operate a computer network. These protocols affect various devices on a single network — including computers, routers and servers — to ensure each one, and the network as a whole, perform optimally.
  • Communication — Communication protocols allow different network devices to communicate with each other. They are used in both analog and digital communications and can be used for important processes, ranging from transferring files between devices to accessing the internet.
  • Security — Security protocols, also called cryptographic protocols, work to ensure that the network and the data sent over it are protected from unauthorized users. Common functions of security network protocols include encryption, transportation and entity authentication.

Also, there are dozens of other network protocols. Some of the more common ones include hypertext transfer protocol (HTTP), secure socket shell (SSH) and short message service (SMS).

The United States Department of Defense (DoD) developed the Internet Protocol suite from research at DARPA (Defense Advanced Research Projects Agency). For this reason, the model is also sometimes referred to as the DoD model.

Introduction to Networking Course by Tonex

Introduction to Networking, Hands-on Workshop is a 3-day hands-on training workshop.

Networking Workshop is a structured approach to the concepts and principles of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, how the most important protocols function, and their basic configuration.

TCP/IP is the communications protocol suite on which the Internet and most commercial networks operate. In this course, we will cover a comprehensive technical overview of TCP/IP. Extensive hands-on exercises provide the practical experience you need to configure a host, employ TCP/IP tools, use application services and access TCP/IP-based internetworking.

Course Agenda

Overview and Introductions

  • Networking 101
  • Network Functions and Layers
  • WANs, MANs and LANs
  • Physical Layer: Wireless and Optical
  • Fundamentals of Ethernet LANs
  • IP and Ethernet Switching
  • Fundamentals of Cybersecurity
  • Network
  • Emerging Networking Technologies

Basics of TCP/IP Stack

  • Architectural Overview of the TCP/IP Protocol Suite
  • Key TCP/IP application services
  • Introducing TCP/IP protocol architecture
  • TCP/IP layering
  • Components of TCP/IP networks
  • The Internet Protocol (IP)
  • Fundamental internetworking concepts
  • Internet addressing IP address classes A, B, C, D, E
  • Addressing
  • Subnetting
  • IP Routing
  • Dynamic Host Configuration Protocol (DHCP)
  • Host Name Resolution
  • Domain Name System (DNS) Overview

Overview and Introduction to Ethernet

  • Ethernet Protocol Basics
  • Ethernet in the OSI Model
  • Different Ethernet Versions
  • Defining a LAN
  • Topology Options
  • Ethernet MAC Addresses
  • Spanning Tree
  • Understanding VLANs
  • 1Q Encapsulation
  • Gigabit Ethernet
  • Encapsulation
  • Auto-Negotiation
  • Ethernet QoS
  • Ethernet Workshop

The TCP/IP Stack Operation

  • Application Layer
  • Applications and Management Protocols
  • File transfer protocols: FTP, TFTP
  • Network Virtual Terminal (TELNET)
  • Employing DNS BIND
  • SMTP, POP3, IMAP4
  • Layer 4: Transport Layer (TCP, UDP and SCTP)
  • The Transmission Control Protocol (TCP)
  • The User Datagram Protocol (UDP)
  • Layer 3: IP Layer
  • IP Addressing
  • IP Subnet Addressing
  • IP Subnet Addressing Lab
  • Basic IP Network configuration/Addressing Lab
  • IP address resolution
  • Private IP addresses: application proxy firewalls
  • Resolving MAC addresses with ARP
  • Using RARP, BOOTP and DHCP
  • Introduction to IPv6
  • Basic IP Network configuration/Addressing Lab
  • IPv4/v6 Subnet Addressing Workshop

IP Routing Protocols

  • Basics of IP Routing
  • IP Routing with RIP Lab
  • Interior and Exterior Gateway Protocols
  • OSPF and BGP routing protocols
  • Routing with BGP
  • Exterior Routing with BGP
  • Internetworking with IP Routers
  • Implementing routed networks
  • Common IP routing protocols: RIP, OSPF
  • Subdividing IP networks (subnetting)
  • Control messages on IP networks: ICMP
  • Classless Inter-Domain Routing (CIDR)
  • Network Address Translation (NAT)
  • Troubleshooting problems
  • IP Routing Workshop

Autoconfiguration and Name Services

  • DHCP in a Routed Network
  • The ipconfig /release Command
  • The ipconfig /renew Command
  • DNS: Names Instead of Numbers
  • A Distributed Service
  • The DNS Tree
  • Generic Top-Level Domains
  • Sponsored Top-Level Domains
  • Country Domains
  • Name Server
  • Primary and Secondary Servers
  • DNS Database
  • Name and Number Organizations
  • Dynamic DNS
  • Troubleshooting

Security in TCP/IP

  • Threats
  • Disaster Threats
  • Attack Threats
  • Attacks
  • Malicious Code
  • Types of Attackers
  • Solutions
  • Securing Systems
  • User Authentication
  • Security-Related Protocols and IPSec
  • IPSec Components
  • IPSec Session
  • Virtual Private Networks (VPNs)
  • MPLS VPNs
  • Establishing a VPN Connection
  • PPTP Encapsulation and Encryption
  • L2TP Encapsulation and Encryption

IP Management, Services and QoS

  • Managing TCP/IP networks
  • Simple Network Management Protocol (SNMP)
  • SNMP evolution: MIB I and II, RMON, SNMPv2, SNMPv3
  • Quality of Service (QoS) with IP Networks
  • Basic IP Unicast Service
  • IP Multicast Service
  • IP Voice Service
  • IP Video Services
  • Basics of QoS
  • Scheduling
  • Marking
  • Policing
  • Introduction to MPLS
  • IP Management Workshop
  • IP QoS Workshop

Labs and Exercises

  • Working with Binary, Decimal and Hexadecimal Numbers
  • IP Addressing and Subnetting
  • Address Resolution Protocol
  • Multicasting
  • IP Processes
  • Capturing and Analyzing an IP Datagram
  • Routing
  • Using Wireshark
  • UDP Transactions and TCP Processes
  • DHCP Process
  • Domain Name System (DNS)
  • ICMP Messaging
  • TCP Applications
  • Telnet
  • FTP
  • HTTP
  • UDP Applications
  • Voice over IP
  • Internet Protocol version 6 (IPv6)
  • Security
  • Spoofing
  • Ethical Hacking
  • Wireless IP Security and Hacking

Introduction to Networking

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.