Beruflich Dokumente
Kultur Dokumente
Table of Contents
Go There! Go There! Go There! Go There! Go There! Go There!
Review the OSI Model LAN Devices & Technologies IP Addressing CIDR Notation Routing Transport Layer
Arhitectura Internet - 2
Componente Internet
ntre dou sau mai multe entiti ce comunic ntre ele, precum i aciunile ce sunt ntreprinse odat cu transmiterea sau recepia unui mesaj sau a unui alt eveniment.
Reduces complexity Standardizes interfaces Facilitates modular engineering Ensures interoperable technology Accelerates evolution Simplifies teaching & learning
Application Layer
Application Presentation Session Transport Network Data-Link Physical
Provides network services (processes) to applications. For example, a computer on a LAN can save files to a server using a network redirector supplied by NOSs like Novell. Network redirectors allow applications like Word and Excel to see the network.
Presentation Layer
Application Presentation Session Transport Network Data-Link Physical
Provides data representation and code formatting. Code formatting includes compression and encryption Basically, the presentation layer is responsible for representing data so that the source and destination can communicate at the application layer.
Session Layer
Application Presentation Session Transport Network Data-Link Physical Provides inter-host communication by establishing, maintaining, and terminating sessions. Session uses dialog control and dialog separation to manage the session Some Session protocols:
NFS (Network File System) SQL (Structured Query Language) RCP (Remote Call Procedure) ASP (AppleTalk Session Protocol) SCP (Session Control Protocol) X-window
Transport Layer
Application Presentation Session Transport Network Data-Link Physical Provides reliability, flow control, and error correction through the use of TCP. TCP segments the data, adding a header with control information for sequencing and acknowledging packets received. The segment header also includes source and destination ports for upper-layer applications TCP is connection-oriented and uses windowing. UDP is connectionless. UDP does not acknowledge the receipt of packets.
Network Layer
Application Presentation Session Transport Network Data-Link Physical
Responsible for logically addressing the packet and path determination. Addressing is done through routed protocols such as IP, IPX, AppleTalk, and DECnet. Path Selection is done by using routing protocols such as RIP, IGRP, EIGRP, OSPF, and BGP. Routers operate at the Network Layer
Data-Link Layer
Application Presentation Session Transport Network Data-Link Physical
Provides access to the media Handles error notification, network topology issues, and physically addressing the frame. Media Access Control through either...
Deterministictoken passing Non-deterministicbroadcast topology (collision domains)
Physical Layer
Application Presentation Session Transport Network Data-Link Physical
Provides electrical, mechanical, procedural and functional means for activating and maintaining links between systems. Includes the medium through which bits flow. Media can be...
CAT 5 cable Coaxial cable Fiber Optics cable The atmosphere
Peer-to-Peer Communications
Peers communicate using the PDU of their layer. For example, the network layers of the source and destination are peers and use packets to communicate with each other.
Application
Presentation Data
Application
Presentation
Data
Data Segments Packets Frames Bits
Session Transport
Network Data-Link Physical
Session Transport
Network Data-Link Physical
Encapsulation Example
Application Presentation Session Transport Network Data-Link Physical
You type an email message. SMTP takes the data and passes it to the Presentation Layer. Presentation codes the data as ASCII. Session establishes a connection with the destination for the purpose of transporting the data.
Encapsulation Example
Application Presentation Session Transport Network Data-Link Physical
Transport segments the data using TCP and hands it to the Network Layer for addressing Network addresses the packet using IP. Data-Link then encaps. the packet in a frame and addresses it for local delivery (MACs) The Physical layer sends the bits down the wire.
Devices
What layer device?
Devices
What does it do?
What layer device? Since it is a multiport bridge, it can also
Connect LAN segments; Filter traffic based on MAC addresses; and Separate collision domains
Devices
What layer device?
Devices
What does it do? What layer device?
Interconnects networks and provides broadcast control Determines the path using a routing protocol or static route Re-encapsulates the packet in the appropriate frame format and switches it out the interface Uses logical addressing (i.e. IP addresses) to determine the path
Media Types
LAN Technologies
Ethernet/802.3
Cable Specifications:
10Base2
Called Thinnet; uses coax Max. distance = 185 meters (almost 200)
10Base5
Called Thicknet; uses coax Max. distance = 500 meters
10BaseT
Uses Twisted-pair Max. distance = 100 meters
10 means 10 Mbps
Ethernet/802.3
Ethernet is broadcast topology.
What does that mean?
Every devices on the Ethernet segment sees every frame. Frames are addressed with source and destination ______ addresses. When a source does not know the destination or wants to communicate with every device, it encapsulates the frame with a broadcast MAC address: FFFF.FFFF.FFFF
What is the main network traffic problem caused by Ethernet broadcast topologies?
Ethernet/802.3
Ethernet topologies are also shared media. That means media access is controlled on a first come, first serve basis. This results in collisions between the data of two simultaneously transmitting devices. Collisions are resolved using what method?
Ethernet/802.3
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Describe how CSMA/CD works:
A node needing to transmit listens for activity on the media. If there is none, it transmits. The node continues to listen. A collision is detected by a spike in voltage (a bit can only be a 0 or a 1--it cannot be a 2) The node generates a jam signal to tell all devices to stop transmitting for a random amount of time (back-off algorithm). When media is clear of any transmissions, the node can attempt to retransmit.
IP Addressing
Subnetting Review
Logical Addressing
At the network layer, we use logical, hierarchical addressing. With Internet Protocol (IP), this address is a 32-bit addressing scheme divided into four octets. Do you remember the classes 1st octets value?
Class Class Class Class Class A: 1 - 126 B: 128 - 191 C: 192 - 223 D: 224 - 239 (multicasting) E: 240 - 255 (experimental)
N
Class B :
N
Class C :
Why Subnet?
Remember: we are usually dealing with a broadcast topology. Can you imagine what the network traffic overhead would be like on a network with 254 hosts trying to discover each others MAC addresses? Subnetting allows us to segment LANs into logical broadcast domains called subnets, thereby improving network performance.
Remember: you must borrow at least 2 bits for subnets and leave at least 2 bits for host addresses. 2 2 bits borrowed allows 2 - 2 = 2 subnets
I need x subnets:
I need x hosts:
2 2x BL 2 2x
BB
Remember: we need to subtract two to provide for the subnetwork and broadcast addresses.
1
128
1
64
1
32 16 8 4 2 1
We add up the decimal value of these bits and get 224. Thats the last non-zero octet of our subnet mask. So our subnet mask is 255.255.255.224
We keep adding 32 in the fourth octet to get all six available subnet addresses.
.32 cannot be assigned to a host. Why? .63 cannot be assigned to a host. Why? So our host addresses are .33 - .62 or 30 host addresses--just like we figured out earlier.
CIDR Notation
A Different Way to Represent a Subnet Mask
CIDR Notation
Classless Interdomain Routing is a method of representing an IP address and its subnet mask with a prefix. For example: 192.168.50.0/27 What do you think the 27 tells you?
27 is the number of 1 bits in the subnet mask. Therefore, 255.255.255.224 Also, you know 192 is a Class C, so we borrowed 3 bits!! Finally, you know the magic number is 256 - 224 = 32, so the first useable subnet address is 197.168.50.32!!
202.151.37.0/26
Subnet mask?
255.255.255.192
Bits borrowed?
Class C so 2 bits borrowed
Magic Number?
256 - 192 = 64
198.53.67.0/30
Subnet mask?
255.255.255.252
Bits borrowed?
Class C so 6 bits borrowed
Magic Number?
256 - 252 = 4
200.39.89.0/28
What kind of address is 200.39.89.0?
Class C, so 4 bits borrowed Last non-zero octet is 240 Magic number is 256 - 240 = 16 32 is a multiple of 16 so 200.39.89.32 is a subnet address--the second subnet address!!
194.53.45.0/29
What kind of address is 194.53.45.26?
Class C, so 5 bits borrowed Last non-zero octet is 248 Magic number is 256 - 248 = 8 Subnets are .8, .16, .24, .32, ect. So 194.53.45.26 belongs to the third subnet address (194.53.45.24) and is a host address.
What broadcast address would this host use to communicate with other devices on the same subnet?
It belongs to .24 and the next is .32, so 1 less is .31 (194.53.45.31)
No Worksheet Needed!
After some practice, you should never need a subnetting worksheet again. The only information you need is the IP address and the CIDR notation. For example, the address 221.39.50/26 You can quickly determine that the first subnet address is 221.39.50.64. How?
Class C, 2 bits borrowed 256 - 192 = 64, so 221.39.50.64
For the rest of the addresses, just do multiples of 64 (.64, .128, .192).
The Key!!
MEMORIZE THIS TABLE!!!
Bits Non-Zero Borrowed Octet Hosts 2 192 62 3 224 30 4 240 14 5 248 6 6 252 2
1. 2. 3. 4. 5. 6. 7.
Answers
Routing Basics
Path Determination & Packet Switching
A Routers Functions
A router is responsible for determining the packets path and switching the packet out the correct port. A router does this in five steps:
1. De-encapsulates the packet 2. Performs the ANDing operation 3. Looks for entry in routing table 4. Re-encapsulates packet into a frame 5. Switches the packet out the correct interface
Multi-protocol Routing
Routers are capable of running multiple routing protocols (RIP, IGRP, OSPF, etc.) as well as running multiple routed protocols (IP, IPX, AppleTalk). For a router to be able use different routing and routing protocols, you must enable the protocols using the appropriate commands.
Default Routes
A default route is usually to a border or gateway router that all routers on a network can send packets to if they do not know the route for a particular network.
Convergence
Convergence means that all routers share the same information about the network. In other words, each router knows its neighbor routers routing table Every time there is a topology change, routing protocols update the routers until the network is said to have converged again. The time of convergence varies depending upon the routing protocol being used.
Distance-vector Routing
Each router receives a routing table periodically from its directly connected neighboring routers. For example, in the graphic, Router B receives information from Router A. Router B adds a distance-vector number (such as a number of hops), and then passes this new routing table to its other neighbor, Router C.
Link-state Routing
Link-state protocols maintain complex databases that summarize routes to the entire network. Each time a new route is added or a route goes down, each router receives a message and then recalculates a spanning tree algorithm and updates its topology database.
LINK-STATE
Gets common view of entire network topology
Calculates the shortest path to other routers Event triggered updates: fast convergence
Passes copies of routing tables Passes link-state routing updates to neighbors to all routers in the system.
Hybrid Routing
Ciscos proprietary routing protocol, EIGRP, is considered a hybrid. EIGRP uses distance-vector metrics. However, it uses event-triggered topology changes instead of periodic passing of routing tables.
Transport Layer
A Quick Review
Flow Control
Slow down, youre overloading my memory buffer!!
UDP
User Datagram Protocol Connectionless No Acknowledgements Applications:
Routing Protocols Streaming Audio Gaming Video Conferencing