THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
|
|
- Pamela McBride
- 5 years ago
- Views:
Transcription
1 THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson
2 Table of Contents Go There! Go There! Go There! Go There! Go There! Go There! Review the OSI Model LAN Devices & Technologies IP Addressing CIDR Notation Routing Transport Layer
3 THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical Review The Model Open Systems Interconnected Reference Model Table of Contents
4 Why A Layered Model? Application Presentation Session Transport Network Data-Link Physical Reduces complexity Standardizes interfaces Facilitates modular engineering Ensures interoperable technology Accelerates evolution Simplifies teaching & learning
5 What is the OSI Model? Each of these different layers has its own set of functions and only communicates with the layers directly above and below and with its opposite layer on other computers.
6 Application Layer Application Presentation Session Transport Network Data-Link Physical Provides network services (processes) to applications. For example, a computer on a LAN can save files to a server using a network redirector supplied by NOSs like Novell. Network redirectors allow applications like Word and Excel to see the network.
7 Presentation Layer Application Presentation Session Transport Network Data-Link Physical Provides data representation and code formatting. Code formatting includes compression and encryption Basically, the presentation layer is responsible for representing data so that the source and destination can communicate at the application layer.
8 Session Layer Application Presentation Session Transport Network Data-Link Physical Provides inter-host communication by establishing, maintaining, and terminating sessions. Session uses dialog control and dialog separation to manage the session Some Session protocols: NFS (Network File System) SQL (Structured Query Language) RCP (Remote Call Procedure) ASP (AppleTalk Session Protocol) SCP (Session Control Protocol) X-window
9 Transport Layer Application Presentation Session Transport Network Data-Link Physical Provides reliability, flow control, and error correction through the use of TCP. TCP segments the data, adding a header with control information for sequencing and acknowledging packets received. The segment header also includes source and destination ports for upper-layer applications TCP is connection-oriented and uses windowing. UDP is connectionless. UDP does not acknowledge the receipt of packets.
10 Network Layer Application Presentation Session Transport Network Data-Link Physical Responsible for logically addressing the packet and path determination. Addressing is done through routed protocols such as IP, IPX, AppleTalk, and DECnet. Path Selection is done by using routing protocols such as RIP, IGRP, EIGRP, OSPF, and BGP. Routers operate at the Network Layer
11 Data-Link Layer Application Presentation Session Transport Network Data-Link Physical Provides access to the media Handles error notification, network topology issues, and physically addressing the frame. Media Access Control through either... Deterministic token passing Non-deterministic broadcast topology (collision domains) Important concept: CSMA/CD
12 Physical Layer Application Presentation Session Transport Network Data-Link Physical Provides electrical, mechanical, procedural and functional means for activating and maintaining links between systems. Includes the medium through which bits flow. Media can be... CAT 5 cable Coaxial cable Fiber Optics cable The atmosphere
13 Peer-to-Peer Communications Peers communicate using the PDU of their layer. For example, the network layers of the source and destination are peers and use packets to communicate with each other. Application Presentation Session Transport Network Data-Link Physical Data Data Data Segments Packets Frames Bits Application Presentation Session Transport Network Data-Link Physical
14 Encapsulation Example Application Presentation Session Transport Network Data-Link Physical You type an message. SMTP takes the data and passes it to the Presentation Layer. Presentation codes the data as ASCII. Session establishes a connection with the destination for the purpose of transporting the data.
15 Encapsulation Example Application Presentation Session Transport Network Data-Link Physical Transport segments the data using TCP and hands it to the Network Layer for addressing Network addresses the packet using IP. Data-Link then encaps. the packet in a frame and addresses it for local delivery (MACs) The Physical layer sends the bits down the wire.
16 THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical LAN Devices & Technologies The Data-Link & Physical Layers Table of Contents
17 Devices What layer device? What does it do? Connects LAN segments; Filters traffic based on MAC addresses; and Separates collision domains based upon MAC addresses.
18 Devices What layer device? What does it do? Since it is a multiport bridge, it can also Connect LAN segments; Filter traffic based on MAC addresses; and Separate collision domains However, switches also offer full-duplex, dedicated bandwidth to segments or desktops.
19 Devices What layer device? What does it do? Concentrates LAN connections from multiple devices into one location Repeats the signal (a hub is a multi-port repeater)
20 Devices What layer device? What does it do? Interconnects networks and provides broadcast control Determines the path using a routing protocol or static route Re-encapsulates the packet in the appropriate frame format and switches it out the interface Uses logical addressing (i.e. IP addresses) to determine the path
21 Media Types
22 LAN Technologies Three Most Common Used Today in Networking
23 Ethernet/802.3 Cable Specifications: 10Base2 Called Thinnet; uses coax Max. distance = 185 meters (almost 200) 10Base5 Called Thicknet; uses coax Max. distance = 500 meters 10BaseT Uses Twisted-pair Max. distance = 100 meters 10 means 10 Mbps
24 Ethernet/802.3 Ethernet is broadcast topology. What does that mean? Every devices on the Ethernet segment sees every frame. Frames are addressed with source and destination addresses. When a source does not know the destination or wants to communicate with every device, it encapsulates the frame with a broadcast MAC address: FFFF.FFFF.FFFF What is the main network traffic problem caused by Ethernet broadcast topologies?
25 Ethernet/802.3 Ethernet topologies are also shared media. That means media access is controlled on a first come, first serve basis. This results in collisions between the data of two simultaneously transmitting devices. Collisions are resolved using what method?
26 Ethernet/802.3 CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Describe how CSMA/CD works: A node needing to transmit listens for activity on the media. If there is none, it transmits. The node continues to listen. A collision is detected by a spike in voltage (a bit can only be a 0 or a 1--it cannot be a 2) The node generates a jam signal to tell all devices to stop transmitting for a random amount of time (back-off algorithm). When media is clear of any transmissions, the node can attempt to retransmit.
27 Address Resolution Protocol In broadcast topologies, we need a way to resolve unknown destination MAC addresses. ARP is protocol where the sending device sends out a broadcast ARP request which says, What s you MAC address? If the destination exists on the same LAN segment as the source, then the destination replies with its MAC address. However, if the destination and source are separated by a router, the router will not forward the broadcast (an important function of routers). Instead the router replies with its own MAC address.
28 THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical IP Addressing Subnetting Review Table of Contents
29 Logical Addressing At the network layer, we use logical, hierarchical addressing. With Internet Protocol (IP), this address is a 32-bit addressing scheme divided into four octets. Do you remember the classes 1st octet s value? Class A: Class B: Class C: Class D: (multicasting) Class E: (experimental)
30 Network vs. Host Class A: 2 7 = 126 networks; 2 24 > 16 million hosts N H H H Class B : 2 14 = 16,384 networks; 2 16 > 65,534 hosts N N H H Class C : 2 21 > 2 million networks; 2 8 = 254 hosts N N N H
31 Why Subnet? Remember: we are usually dealing with a broadcast topology. Can you imagine what the network traffic overhead would be like on a network with 254 hosts trying to discover each others MAC addresses? Subnetting allows us to segment LANs into logical broadcast domains called subnets, thereby improving network performance.
32 Four Subnetting Steps To correctly subnet a given network address into subnet addresses, ask yourself the following questions: 1. How many bits do I need to borrow? 2. What s the subnet mask? 3. What s the magic number or multiplier? 4. What are the first three subnetwork addresses? Let s look at each of these questions in detail
33 1. How many bits to borrow? First, you need to know how many bits you have to work with. Second, you must know either how many subnets you need or how many hosts per subnet you need. Finally, you need to figure out the number of bits to borrow.
34 1. How many bits to borrow? How many bits do I have to work with? Depends on the class of your network address. Class C: 8 host bits Class B: 16 host bits Class A: 24 host bits Remember: you must borrow at least 2 bits for subnets and leave at least 2 bits for host addresses. 2 bits borrowed allows = 2 subnets
35 1. How many bits to borrow? How many subnets or hosts do I need? A simple formula: Total Bits = Bits Borrowed + Bits Left TB = BB + BL I need x subnets: 2 BB 2 x I need x hosts: 2 BL 2 x Remember: we need to subtract two to provide for the subnetwork and broadcast addresses.
36 1. How many bits to borrow? Class C Example: Design goals specify at least 5 subnets so how many bits do we borrow? How many bits in the host portion do we have to work with (TB)? What s the BB in our TB = BB + BL formula? (8 = BB + BL) 2 to the what power will give us at least 5 subnets? = 6 subnets
37 1. How many bits to borrow? How many bits are left for hosts? TB = BB + BL 8 = 3 + BL BL = 5 So how many hosts can we assign to each subnet? = 30 hosts
38 1. How many bits to borrow? Class B Example: Design goals specify no more than 126 hosts per subnet, so how many bits do we need to leave (BL)? How many bits in the host portion do we have to work with (TB)? What s the BL in our TB = BB + BL formula? (16 = BB + BL) 2 to the what power will insure no more than 126 hosts per subnet and give us the most subnets? = 126 hosts
39 1. How many bits to borrow? How many bits are left for subnets? TB = BB + BL 16 = BB + 7 BL = 9 So how many subnets can we have? = 510 subnets
40 2. What s the subnet mask? We determine the subnet mask by adding up the decimal value of the bits we borrowed. In the previous Class C example, we borrowed 3 bits. Below is the host octet showing the bits we borrowed and their decimal values We add up the decimal value of these bits and get 224. That s the last non-zero octet of our subnet mask. So our subnet mask is
41 3. What s the magic number? To find the magic number or the multiplier we will use to determine the subnetwork addresses, we subtract the last non-zero octet from 256. In our Class C example, our subnet mask was is our last non-zero octet. Our magic number is = 32
42 Last Non-Zero Octet Memorize this table. You should be able to: Quickly calculate the last non-zero octet when given the number of bits borrowed. Determine the number of bits borrowed given the last non-zero octet. Determine the amount of bits left over for hosts and the number of host addresses available. Bits Borrowed Non-Zero Octet Hosts
43 4. What are the subnets? We now take our magic number and use it as a multiplier. Our Class C address was We borrowed bits in the fourth octet, so that s where our multiplier occurs 1st subnet: nd subnet: rd subnet: We keep adding 32 in the fourth octet to get all six available subnet addresses.
44 Host & Broadcast Addresses Now you can see why we subtract 2 when determining the number of host address. Let s look at our 1st subnet: What is the total range of addresses up to our next subnet, ? to or 32 addresses.32 cannot be assigned to a host. Why?.63 cannot be assigned to a host. Why? So our host addresses are or 30 host addresses--just like we figured out earlier.
45 THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical CIDR Notation A Different Way to Represent a Subnet Mask Table of Contents
46 CIDR Notation Classless Interdomain Routing is a method of representing an IP address and its subnet mask with a prefix. For example: /27 What do you think the 27 tells you? 27 is the number of 1 bits in the subnet mask. Therefore, Also, you know 192 is a Class C, so we borrowed 3 bits!! Finally, you know the magic number is = 32, so the first useable subnet address is !! Let s see the power of CIDR notation.
47 /26 Subnet mask? Bits borrowed? Class C so 2 bits borrowed Magic Number? = 64 First useable subnet address? Third useable subnet address? = 192, so
48 /30 Subnet mask? Bits borrowed? Class C so 6 bits borrowed Magic Number? = 4 Third useable subnet address? = 12, so Second subnet s broadcast address? = 11, so
49 /28 What kind of address is ? Class C, so 4 bits borrowed Last non-zero octet is 240 Magic number is = is a multiple of 16 so is a subnet address--the second subnet address!! What s the broadcast address of ? = 47, so
50 /29 What kind of address is ? Class C, so 5 bits borrowed Last non-zero octet is 248 Magic number is = 8 Subnets are.8,.16,.24,.32, ect. So belongs to the third subnet address ( ) and is a host address. What broadcast address would this host use to communicate with other devices on the same subnet? It belongs to.24 and the next is.32, so 1 less is.31 ( )
51 No Worksheet Needed! After some practice, you should never need a subnetting worksheet again. The only information you need is the IP address and the CIDR notation. For example, the address /26 You can quickly determine that the first subnet address is How? Class C, 2 bits borrowed = 64, so For the rest of the addresses, just do multiples of 64 (.64,.128,.192).
52 The Key!! MEMORIZE THIS TABLE!!! Bits Borrowed Non-Zero Octet Hosts
53 Practice On Your Own Below are some practice problems. Take out a sheet of paper and calculate... Bits borrowed Last non-zero octet Second subnet address and broadcast address / / / / /28 6. Challenge: /19 Answers 7. Challenge: /16
54 THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical Routing Basics Path Determination & Packet Switching Table of Contents
55 A Router s Functions A router is responsible for determining the packet s path and switching the packet out the correct port. A router does this in five steps: 1. De-encapsulates the packet 2. Performs the ANDing operation 3. Looks for entry in routing table 4. Re-encapsulates packet into a frame 5. Switches the packet out the correct interface
56 Routed v. Routing Protocols What is a routed protocol? Routed protocols are protocols that enable data to be transmitted across a collection of networks or internetworks using a hierarchical addressing scheme. Examples include IP, IPX and AppleTalk. A routable protocol provides both a network and node number to each device on the network. Routers AND the address to discover the network portion of the address. An example of a protocol that is not routable is NetBEUI because it does not have a network/node structure.
57 Routed v. Routing Protocols What is a routing protocol? A routing protocol is a protocol that determines the path a routed protocol will follow to its destination. Routers use routing protocols to create a map of the network. These maps allow path determination and packet switching. Maps become part of the router s routing table. Examples of routing protocols include: RIP, IGRP, EIGRP, & OSPF
58 Multi-protocol Routing Routers are capable of running multiple routing protocols (RIP, IGRP, OSPF, etc.) as well as running multiple routed protocols (IP, IPX, AppleTalk). For a router to be able use different routing and routing protocols, you must enable the protocols using the appropriate commands.
59 Dynamic v. Static Routing Dynamic routing refers to the process of allowing the router to determine the path to the destination. Routing protocols enable dynamic routing where multiple paths to the same destination exist.
60 Dynamic v. Static Routing Static routing means that the network administrator directly assigns the path router are to take to the destination. Static routing is most often used with stub networks where only one path exists to the destination.
61 Default Routes A default route is usually to a border or gateway router that all routers on a network can send packets to if they do not know the route for a particular network.
62 Routing Protocol Classes Routing protocols can be divided into three classes: Distance vector: determines the route based on the direction (vector) and distance to the destination Link-state: opens the shortest path first to the destination by recreating an exact topology of the network in its routing table Hybrid: combines aspects of both
63 Convergence Convergence means that all routers share the same information about the network. In other words, each router knows its neighbor routers routing table Every time there is a topology change, routing protocols update the routers until the network is said to have converged again. The time of convergence varies depending upon the routing protocol being used.
64 Distance-vector Routing Each router receives a routing table periodically from its directly connected neighboring routers. For example, in the graphic, Router B receives information from Router A. Router B adds a distance-vector number (such as a number of hops), and then passes this new routing table to its other neighbor, Router C.
65 Link-state Routing Link-state protocols maintain complex databases that summarize routes to the entire network. Each time a new route is added or a route goes down, each router receives a message and then recalculates a spanning tree algorithm and updates its topology database.
66 Comparing the Two DISTANCE-VECTOR LINK-STATE Views network topology from neighbor s perspective Adds distance vectors from router to router Frequent, periodic updates: slow convergence Passes copies of routing tables to neighbors Gets common view of entire network topology Calculates the shortest path to other routers Event triggered updates: fast convergence Passes link-state routing updates to all routers in the system.
67 Hybrid Routing Cisco s proprietary routing protocol, EIGRP, is considered a hybrid. EIGRP uses distance-vector metrics. However, it uses event-triggered topology changes instead of periodic passing of routing tables.
68 THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical Transport Layer A Quick Review Table of Contents
69 Transport Layer Functions Synchronization of the connection Three-way handshake Flow Control Slow down, you re overloading my memory buffer!! Reliability & Error Recovery Windowing: How much data can I send before getting an acknowledgement? Retransmission of lost or unacknowledged segments
70 Transport s Two Protocols TCP Transmission Control Protocol Connection-oriented Acknowledgment & Retransmission of segments Windowing Applications: File Transfer E-Commerce UDP User Datagram Protocol Connectionless No Acknowledgements Applications: Routing Protocols Streaming Audio Gaming Video Conferencing
1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationChapter 6: Network Communications and Protocols
Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols
More informationNetwork Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationOSI Model with Protocols. Layer Name PDU Address Protocols Device
NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation
More informationOSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationHands-On Network Security: Practical Tools & Methods
Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationCCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Access Control ALOHA FDMA, TDMA, CDMA OSI Model Internetworking
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationOSI Network Layer. Chapter 5
OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network
More informationChapter 7 Routing Protocols
Chapter 7 Routing Protocols Nonroutable Protocols In the early days of networking, networks were small collections of computers linked together For the purposes of sharing information and expensive peripherals
More informationAppleTalk. Chapter Goals. Introduction CHAPTER
35 CHAPTER Chapter Goals Describe the development history of the protocol, used almost exclusively in Macintosh computers. Describe the components of networks and extended network. Discuss the primary
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationFundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1
Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary
More informationChapter 7: Routing Dynamically. Routing & Switching
Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based
More informationStudy Guide. Module Two
Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?
More informationCCNA MCQS with Answers Set-1
CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.
More informationISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI
ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI ISO/OSI Model ISO: International Organization for Standardization OSI: Open Systems Interconnection
More informationRaj Jain. The Ohio State University Columbus, OH
Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting
More informationIntroduction to Routing
1 Introduction to Routing Session 2 Presentation_ID.scr 1 Agenda Addressing Concepts Routing Protocols Statics and Defaults 3 ISO OSI Reference Model Routing Information Protocol (RIP and RIPv2) L7 L6
More informationWhy we need to divide network?
Content Introduction Layer 3 IP Protocol IP-Header: www.ietf.org and RFC-760 Addressing Schemes Subnetting Routing Layer 3 Solution in Trains Communication Matrix (Information Based Communication) 53 Why
More informationConfiguring EIGRP. 2001, Cisco Systems, Inc.
Configuring EIGRP 4-1 EIGRP Overview 4-2 What Is EIGRP? IPX Routing Protocols IP Routing Protocols AppleTalk Routing Protocol Enhanced IGRP IP Routing Protocols AppleTalk Routing Protocol IPX Routing Protocols
More informationTable of Contents. Cisco TCP/IP
Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing
More informationWhy dynamic route? (1)
Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationImi :... Data:... Nazwisko:... Stron:...
Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationTCP/IP and the OSI Model
TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationChapter -4 OSI Reference Model
Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces
More informationLinux System Administration
IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address
More informationNetwork Technologies. Unit 5, Chapter 8 Switching and Routing. Cisco Learning Institute Network+ Fundamentals and Certification
Network Technologies Unit 5, Chapter 8 Switching and Routing Cisco Learning Institute Network+ Fundamentals and Certification Copyright 2005 by Pearson Education, Inc. Upper Saddle River, New Jersey 07458
More informationTCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02
TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)
More informationFINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material
FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding
More informationIntroduction to Open System Interconnection Reference Model
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
More informationSEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide?
SEMESTER 1 Chapter 5 OSI Network Layer V 4.0 5.1.1.1 What services does the network layer provide? What are the 4 basic processes used at the network layer? What is the PDU of the network layer? What information
More informationCHAPTER 4: ROUTING DYNAMIC. Routing & Switching
CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationPlanning for Information Network
Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including
More informationCCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)
CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationThis tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
More informationComputer Networks (Introduction to TCP/IP Protocols)
Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationCCNA 4 - Final Exam (B)
CCNA 4 - Final Exam (B) 1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) improper placement of enterprise level servers addition of hosts to a physical segment
More informationTERM EXAMS CS610- COMPUTER NETWORKS
MUHAMMAD FAISAL MIT 4 th Semester Al-Barq Campus (VGJW01) Gujranwala faisalgrw123@gmail.com MEGA File Solved MCQ s For Final TERM EXAMS CS610- COMPUTER NETWORKS Question No: 1 ( Marks: 1 ) - Please choose
More informationEIGRP 04/01/2008. Routing Protocols and Concepts Chapter 9 Modified by Tony Chen
EIGRP Routing Protocols and Concepts Chapter 9 Modified by Tony Chen 04/01/2008 1 Introduction 2 EIGRP Roots of EIGRP: IGRP -Developed in 1985 to overcome RIPv1 s limited hop count -Distance vector routing
More informationComputer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols
Computer Networks Lecture 9 Network and transport layers, IP, TCP, UDP protocols Network layer The Network layer, or OSI Layer 3, provides services to exchange the individual pieces of data over the network
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationGAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS
GAYATRI COMPUTERS Prepared by : VENKAT.G 1 What is Networking? Module 1: NETWORK BASICS Networking: Connecting two or more computers or network devices(routers/print Servers / Firewall Devices..etc) for
More informationWindows NT Server Operating System. Server. Unicast Routing Principles. White Paper. Abstract
Windows NT Server Operating System Server Unicast Routing Principles White Paper Abstract With Windows NT Server 4.0, the implementation and configuration of routing has become much easier. Windows NT
More informationQuestion 7: What are Asynchronous links?
Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:
More informationCCNA. Course Catalog
CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)
More informationComputer Networks Principles LAN - Ethernet
Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2
More informationCS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
More informationWritten and provided by. Expert Reference Series of White Papers. TCP/IP Overview COURSES.
Written and provided by Expert Reference Series of White Papers TCP/IP Overview 1-800-COURSES www.globalknowledge.com Table of Contents TCP/IP Overview...1 Document ID: 13769...1 Introduction...1 TCP/IP
More informationIP Routing & Bridging
CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If
More informationEnhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER
40 CHAPTER Chapter Goals Identify the four key technologies employed by (EIGRP). Understand the Diffusing Update Algorithm (DUAL), and describe how it improves the operational efficiency of EIGRP. Learn
More informationVU Mobile Powered by S NO Group All Rights Reserved S NO Group 2012
1 CS610 COMPUTER NETWORKS Final Term Solved MCQs Mega File (Latest All in One) The protocol address of the next hop must be to an equivalent hardware address before a packet can be sent. Encrypted Decrypted
More informationSection 1. General Networking Theory
Section 1 General Networking Theory This chapter ensures you are prepared for questions in the Cisco Certified Internetwork Expert (CCIE) written exam that deal with general networking theories. General
More informationChapter 9. Ethernet. Part II
Chapter 9 Ethernet Part II CCNA1-1 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go
More informationInternetwork Basic. Possible causes of LAN traffic congestion are
Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible
More information9.1. Routing Protocols
9.1. Routing Protocols Each organization that has been assigned a network address from an ISP is considered an autonomous system (AS). That organization is free to create one large network, or divide the
More informationInternetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1
Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationNetWare Link-Services Protocol
44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell
More informationCS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network
CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationIntroduction to routing in the Internet
Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by
More informationTable of Contents. Cisco Introduction to EIGRP
Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP
More informationInterconnecting Cisco Networking Devices Part 1
ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 2 Version 1.0 Student Guide Editorial, Production, and Web Services: 07.25.07 DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO
More informationPrinciples behind data link layer services
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.
ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation
More informationSection 6. Implementing EIGRP ICND2
ICND2 Section 6 Implementing EIGRP Enhanced Interior Gateway Routing Protocol (EIGRP) was introduced in Cisco IOS Release 9.21 as an enhancement to the limitations of IGRP. IGRP was developed by Cisco
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationPrinciples behind data link layer services:
Data Link Layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationSEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0
SEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0 3.1.1 What are the four routing RIP, RIPv2, EIGRP, OSPFv2 protocols that are the focus of this course? 3.1.1.2 What are routing protocols?
More informationBuilding the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles
Building the Routing Table Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Introducing the Routing Table R1# show ip route Codes: C - connected,
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationES623 Networked Embedded Systems
ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationCS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request
CS 455/555 Intro to Networks and Communications Link Layer Addressing, ernet, and a Day in the Life of a Web Request Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu
More informationSignificance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak
Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet
More informationFundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security
Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services
More information