Escolar Documentos
Profissional Documentos
Cultura Documentos
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
The OSI Model will be used throughout your entire networking career!
Memorize it!
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
This layer deal with networking applications. Examples: Email Web browsers PDU - User Data
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
This layer is responsible for presenting the data in the required format which may include: Encryption Compression PDU - Formatted Data
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
This layer establishes, manages, and terminates sessions between two communicating hosts.
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
This layer breaks up the data from the sending host and then reassembles it in the receiver.
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
Sometimes referred to as the Cisco Layer. Makes Best Path Determination decisions based on logical addresses (usually IP addresses).
PDU - Packets
10
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
This layer provides reliable transit of data across a physical link. Makes decisions based on physical addresses (usually MAC addresses).
PDU - Frames
11
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
This is the physical media through which the data, represented as electronic signals, is sent from the source host to the destination host. Examples: CAT5 (what we have) Coaxial (like cable TV) Fiber optic
PDU - Bits
12
Host Layers
7 Application
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical
These layers only exist in the source and destination host computers.
13
Media Layers
7 Application
6 Presentation
5 Session 4 Transport 3 Network 2 Data Link 1 Physical These layers manage the information out in the LAN or WAN between the source and destination hosts.
14
15
Encapsulation Process
16
17
18
19
20
UTP Implementation
EIA/TIA specifies an RJ-45 connector for UTP cable.
21
Connection Media
The registered jack (RJ-45) connector and jack are the most common. In some cases the type of connector on a network interface card (NIC) does not match the media that it needs to connect to. The attachment unit interface (AUI) connector allows different media to connect when used with the appropriate transceiver. A transceiver is an adapter that converts one type of connection to another.
22
Ethernet Standards
The Ethernet standard specifies that each of the pins on an RJ-45 connector have a particular purpose. A NIC transmits signals on pins 1 & 2, and it receives signals on pins 3 & 6.
23
Remember
A straight-thru cable has T568B on both ends. A crossover (or cross-connect) cable has T568B on one end and T568A on the other. A console cable had T568B on one end and reverse T568B on the other, which is why it is also called a rollover cable.
24
Straight-Thru or Crossover
Use straight-through cables for the following cabling: Switch to router Switch to PC or server Hub to PC or server Use crossover cables for the following cabling: Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC 25
26
27
Coaxial Cable
28
29
30
31
32
33
MAC Address
MAC address is 48 bits in length and expressed as twelve hexadecimal digits.MAC addresses are sometimes referred to as burned-in addresses (BIA) because they are burned into read-only memory (ROM) and are copied into random-access memory (RAM) when the NIC initializes.
35
Bridge
Bridges are Data Link layer devices.Connected host addresses are learned and stored on a MAC address table.Each bridge port has a unique MAC address
36
Bridges
37
Bridging Graphic
38
Switch
Switches are Data Link layer devices.
Full Duplex
Another capability emerges when only two nodes are connected. In a network that uses twisted-pair cabling, one pair is used to carry the transmitted signal from one node to the other node. A separate pair is used for the return or received signal. It is possible for signals to pass through both pairs simultaneously. The capability of communication in both directions at once is known as full duplex.
40
41
42
Microsegmentation
A switch is simply a bridge with many ports. When only one node is connected to a switch port, the collision domain on the shared media contains only two nodes. The two nodes in this small segment, or collision domain, consist of the switch port and the host connected to it. These small physical segments are called micro segments.
43
Peer-to-Peer Network
In a peer-to-peer network, networked computers act as equal partners, or peers. As peers, each computer can take on the client function or the server function. At one time, computer A may make a request for a file from computer B, which responds by serving the file to computer A. Computer A functions as client, while B functions as the server. At a later time, computers A and B can reverse roles. In a peer-to-peer network, individual users control their own resources. Peer-topeer networks are relatively easy to install and operate. As networks grow, peer-topeer relationships become increasingly difficult to coordinate.
44
Client/Server Network
In a client/server arrangement, network services are located on a dedicated computer called a server. The server responds to the requests of clients. The server is a central computer that is continuously available to respond to requests from clients for file, print, application, and other services. Most network operating systems adopt the form of a client/server relationship.
45
46
When the packet arrives at a router connected to the destination network, the router uses the IP address to locate the particular computer connected to that network.
Accordingly, every IP address has two parts.
47
48
Internet Addresses
IP Addressing is a hierarchical structure.An IP address combines two identifiers into one number. This number must be a unique number, because duplicate addresses would make routing impossible.The first part identifies the system's network address.The second part, called the host part, identifies which particular machine it is on the network.
49
IP Address Classes
IP addresses are divided into classes to define the large, medium, and small networks.
Class A addresses are assigned to larger networks. Class B addresses are used for medium-sized networks, & Class C for small networks.
50
51
52
53
Class A Addresses
The Class A address was designed to support extremely large networks, with more than 16 million host addresses available. Class A IP addresses use only the first octet to indicate the network address. The remaining three octets provide for host addresses.
54
Class B Addresses
The Class B address was designed to support the needs of moderate to large-sized networks.A Class B IP address uses the first two of the four octets to indicate the network address. The other two octets specify host addresses.
55
Class C Addresses
The Class C address space is the most commonly used of the original address classes.This address space was intended to support small networks with a maximum of 254 hosts.
56
Class D Addresses
The Class D address class was created to enable multicasting in an IP address. A multicast address is a unique network address that directs packets with that destination address to predefined groups of IP addresses. Therefore, a single station can simultaneously transmit a single stream of data to multiple recipients.
57
Class E Addresses
A Class E address has been defined. However, the Internet Engineering Task Force (IETF) reserves these addresses for its own research. Therefore, no Class E addresses have been released for use in the Internet.
58
IP Address Ranges
The graphic below shows the IP address range of the first octet both in decimal and binary for each IP address class.
59
IPv4
As early as 1992, the Internet Engineering Task Force (IETF) identified two specific concerns: Exhaustion of the remaining, unassigned IPv4 network addresses and the increase in the size of Internet routing tables. Over the past two decades, numerous extensions to IPv4 have been developed. Two of the more important of these are subnet masks and classless interdomain routing (CIDR).
60
61
Network Address
62
Broadcast Address
63
Introduction to Subnetting
Subnetting a network means to use the subnet mask to divide the network and break a large network up into smaller, more efficient and manageable segments, or subnets. With subnetting, the network is not limited to the default Class A, B, or C network masks and there is more flexibility in the network design. Subnet addresses include the network portion, plus a subnet field and a host field.The ability to decide how to divide the original host portion into the new subnet and host fields provides addressing flexibility for the network administrator.
65
66
67
68
69
Network printers, application servers, and routers should be assigned static IP addresses.
70
ARP Request - Broadcast to all hosts What is the hardware address for IP address 128.0.10.4?
ARP Reply
SIEMENS NIXDORF SIEMENS NIXDORF
71
Fig. 32 How does ARP work? (TI1332EU02TI_0004 The Network Layer, 47)
72
Fig. 33 The ARP command (TI1332EU02TI_0004 The Network Layer, 47)
Router
73
Fig. 34 Proxy-ARP concept (TI1332EU02TI_0004 The Network Layer, 49)
B A B
Broadcast Message to all: If your IP address matches B then please tell me your Ethernet address
Yes, I know the destination network, let me give you my Ethernet address
74
RARP
Reverse Address Resolution Protocol (RARP) associates a known MAC addresses with an IP addresses. A network device, such as a diskless workstation, might know its MAC address but not its IP address. RARP allows the device to make a request to learn its IP address. Devices using RARP require that a RARP server be present on the network to answer RARP requests.
75
DHCP
Dynamic host configuration protocol (DHCP) is the successor to BOOTP. Unlike BOOTP, DHCP allows a host to obtain an IP address dynamically without the network administrator having to set up an individual profile for each device. All that is required when using DHCP is a defined range of IP addresses on a DHCP server.As hosts come online, they contact the DHCP server and request an address. The DHCP server chooses an address and leases it to that host. With DHCP, the entire network configuration of a computer can be obtained in one message. This includes all of the data supplied by the BOOTP message, plus a leased IP address and a subnet mask. The major advantage that DHCP has over BOOTP is that it allows users to be mobile.
76