Unit A - Connecting to the Network

Similar documents
Connecting to the Network

Full file at

Networking interview questions

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Lab Using Wireshark to Examine Ethernet Frames

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Lab Using Wireshark to Examine Ethernet Frames

Top-Down Network Design

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Linux System Administration

Revision of Previous Lectures

Interface The exit interface a packet will take when destined for a specific network.

Chapter 2. Switch Concepts and Configuration. Part I

Chapter 3: Network Protocols and Communications. Introduction to Networks v5.1

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Top-Down Network Design

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

LOCAL AREA NETWORKS Q&A Topic 4: VLAN

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Lesson 1: Network Communications

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Introduction to LAN Protocols

Hands-On Network Security: Practical Tools & Methods

Fundamentals of Networking Introduction to Networking Devices

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

M242 COMPUTER NETWORS AND SECURITY

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Layer 2 functionality bridging and switching

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10

Fundamentals of Networking Network Terminologies

2. LAN Topologies Gilbert Ndjatou Page 1

IP: Addressing, ARP, Routing

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Switching & ARP Week 3

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

2. What is a characteristic of a contention-based access method?

Introduction to OSPF

The Internet software layers

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

IEEE 802 LANs SECTION C

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Computer Networks Question Bank

Communicating over the Network

VLANs Level 3 Unit 9 Computer Networks

Question 7: What are Asynchronous links?

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: Network Communications and Protocols

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Ethernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

Homework 3 Discussion

CISCO EXAM QUESTIONS & ANSWERS

Chapter 9 Ethernet Part 1

Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open

MODEL ANSWER PAPER SUBJECT: COMPUTER ORGANIZATION & OPERATING SYSTEM (THEORY)

Internetwork Basic. Possible causes of LAN traffic congestion are

The Features and Uses of Computer Networking. Unit 11 Task 1

1: Review Of Semester Provide an overview of encapsulation.

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

CCNA. Course Catalog

Although the CCNA certification exams test you on some difficult and in-depth networking

Different network topologies

Communication Networks

Introducing Campus Networks

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Configuring your VLAN. Presented by Gregory Laffoon

Part3. Local Area Networks (LAN)

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

INTRODUCTION TO ICT.

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

7010INT Data Communications Lecture 7 The Network Layer

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Chapter 3. The Basics of Networking

Chapter 15 Local Area Network Overview

Data Communication and Network. Introducing Networks

Darshan Institute of Engineering & Technology for Diploma Studies

Principles behind data link layer services

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Principles behind data link layer services:

Principles behind data link layer services:

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Networking Devices. Punch_down panels

NT1210 Introduction to Networking. Unit 5:

Routing Between VLANs Overview

EEC-684/584 Computer Networks

NETWORKING COMPONENTS

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

CCNA 3 (v v6.0) Chapter 6 Exam Answers % Full

Chapter 9. Ethernet. Part II

Transcription:

Unit A - Connecting to the Network 1 What is a network? The ability to connect people and equipment no matter where they are in the world. telephone computers television How does your body work as a network? 2

Networking and Its Benefits A CONVERGED NETWORK!!! 3 Networking and Its Benefits SOHO Network Small Office/Home Office sharing of resources Internet Printer 4

Networking and Its Benefits Schools, Corporations Internet 5 Networking and Its Benefits Define the components of an Information network Hosts PCs send and receive information across the network connected to a network device Peripherals not directly connected to the network, but connected to hosts Network devices hub, switch, router Network media used to connect hosts/devices 6

Networking and Its Benefits Clients and servers software installed determines the role of a client or a server Server software enables the server to provide information to other hosts Client software enables the client to request and display information from the server Example: Internet Explorer 7 Networking and Its Benefits Build computer peer-to-peer network and verify The ability to act as both a client and server 8

Network Topologies Physical topology created to record where each host is on the network shows how each host is connected (media, devices, etc) 9 Network Topologies Logical topology how the host uses the network host names, addresses, groups, applications 10

Communication Protocols Primary purpose of a network to communicate Elements of communication Sender (source) has a need to communicate Receiver (destination) receives message and interprets it Channel pathway for information to travel 11 Successful delivery of the message Rules (protocols) must be followed: Identification of the sender and/or receiver Channel in which to communicate (face-to-face) Mode of communication (written or spoken) Language Grammar Speed or timing 12

Communication Protocols Encoding vs. Decoding Encoding Humans converting thoughts into language, symbols, or sounds Computers Decoding messages converted into bits by the sending host each bit encoded into sound, light, or electrical impulses destination host then decodes the signal reverse of encoding 13 Communication Protocols Message formatting and encapsulation Message needs a specific format Compare to parts of a letter Identifier (recipient) Salutation Message Closing Identifier (sender) Encapsulation placing the letter into the envelope De encapsulation letter removed from the envelope 14

Communication Protocols Messages have size restrictions depending on the channel used If the message is broken into smaller pieces, it is easier to understand If the message is too long or too short, will be considered undeliverable. 15 Communication Protocols Timing when to speak; how fast or how slow how long to wait for a response Access Method determines when someone is able to send a message can speak when no one else is talking, otherwise a COLLISON occurs Flow Control timing for negotiations sender might transmit messages faster than the user can handle Response Timeout how long should you wait for a response and what action to take Acknowledgment may be required to ensure message was delivered 16

Communication Protocols Message Patterns Unicast single destination Multicast same message to a group Broadcast all hosts need to receive the message 17 Communication Protocols PROTOCOLS = RULES TO FOLLOW 18

Communication Across a Local Ethernet Network Computers must speak the same language in order to communicate!! 19 Standards in technology Standards rules by which equipment from different vendors operate Benefits of standards: Facilitate design Simplify product development Promote competition Provide consistency Facilitate training More vendor choices for customers 20

Communication Across a Local Ethernet Network IEEE (Institute of Electrical and Electronic Engineers) maintains networking standards 802.3 Ethernet standard A breakdown of terminology 100 Base-T 100 = Speed in Mbps Base = Baseband transmission T = Twisted Pair 21 Communication Across a Local Ethernet Network Physical addressing MAC address (Media Access Control) Ethernet communication each interface has a MAC address each device may look at the data that has been transmitted, but only the interface that matches the destination MAC will respond 22

MAC Addresses by another Name Other names for a MAC address include: physical address hardware address Ethernet address burned-in address data-link layer address (7-layer model) Layer 2 address (of 7-layer model) 23 The Ethernet Frame Preamble beginning of the timing SFD (Start Frame Delimiter) marks the end of the timing, but beginning of the frame Destination MAC Source MAC Length/Type Length tells which protocol receives the data Type number of bytes of data Encapsulation packet of information FCS (Frame Check Sequence) used to check for damaged frames 46-1500 24

Example Ethernet Type Values EtherType value of 0x0800 signals that the frame contains an IPv4 frame. EtherType of 0x0806 indicates an ARP frame EtherType of 0x8100 indicates an IEEE 802.1Q frame -Used with Virtual Lans (vlans) EtherType of 0x86DD indicates an IPv6 frame. 25 Cisco 3-layer Networking Model Cisco has defined a hierarchical model known as the hierarchical internetworking model. This model simplifies the task of building a reliable, scalable, and less expensive hierarchical internetwork because rather than focusing on packet construction, it focuses on the three functional areas, or layers, of your network: Access Distribution Core 26

3-layer Networking Model Core layer: This layer is considered the backbone of the network and includes the high-end switches and high-speed cables such as fiber cables. This layer of the network does not route traffic at the LAN. In addition, no packet manipulation is done by devices in this layer. Rather, this layer is concerned with speed and ensures reliable delivery of packets. Distribution layer: This layer includes LAN-based routers and layer 3 switches. This layer ensures that packets are properly routed between subnets and VLANs in your enterprise. This layer is also called the Workgroup layer. Access layer: This layer includes hubs and switches. This layer is also called the desktop layer because it focuses on connecting client nodes, such as workstations to the network. This layer ensures that packets are delivered to end user computers. 27 The Hierarchical Design Structure (3-layer model) Smaller, more manageable groups allow traffic to remain local on the networks Divided into three layers Access Layer connection to the hosts Distribution Layer interconnects smaller networks Core Layer high speed connection between distribution devices (high-speed backbone > internet) 28

29 Logical Addressing MAC vs. IP IP Address (Logical Address) assigned based on where the host is located assigned by the administrator Parts of an IP address (Network and Host parts) Network same for all hosts connected to the LAN Host unique to each host on the network 30

Access Layer Devices Most basic level Made up of: host devices first line of networking devices hub, switch, workstations Hub or switch 31 Access Layer Device A HUB Accepts data signal from one port and sends it (regenerates) out all other ports multiport repeater Collisions results in message being garbled and unreadable occur when two or more hosts send a message at the same time (undesirable in a network) NOT VERY SMART a hub will not recognize there is a collision and sends it to all ports 32

Hubs And Collision Domains Collision domain area where the collision has occurred. More collision domains = better performance How many collision domains exist in the graphic shown? 33 Access Layer Device A SWITCH SMARTER THAN A HUB dedicated bandwidth out each port no need to share with other ports (unlike a hub) Can forward messages to a specific host by looking in its MAC table If destination MAC is not in its MAC table, floods the network out all ports looking for a response Only the host with the correct MAC address will respond 34

More Stuff on Switches How does the MAC table get built? keeps track of frames being sent between hosts records the information when there is a response -records the source MAC address of frames received Collision Domains each port on a switch is its own collision domain 8 port switch = 8 collision domains 35 Broadcasts If there is only one destination MAC in a message, how can you contact everyone else? send a broadcast MAC hexidecimal digits FFFF.FFFF.FFFF (FF:FF:FF:FF:FF:FF) Useful when hosts need to send information but doesn't know what hosts are to receive it Switches and hubs send the broadcast out to everyone on their network. (Broadcast Domain) 36

ARP Request Sent when the sending host knows the destination IP, but not the MAC Will discover the MAC address of any local host on the network 37 Distribution Layer Devices and Communication Methods Responsible for making sure local traffic stays local on the network Traffic destined for other networks will be passed on. 38

Distribution Layer Devices The Router Routers directs traffic based on the destination IP address Routers build routing tables; switches build MAC tables Routers decode packets; switches decode frames Routers look at only the network portion of the IP address finds the best path to take to get to the destination Routers do not forward broadcasts!!! 39 Default Gateway Used when a host wants to send data to a host on a different network. Must be set on the workstation connected to the routing device the router interface connected to the PC 40

Routing Tables and ARP tables Used by routers to store information The diagram to the right shows two networks connected together via a router. The router maintains an ARP table and ROUTING table with information similar to the tables shown above. 41 Types of Routing Dynamic information is obtained from neighboring routers Static manually entered by the network administrator What happens to a message that contains an IP destination address that does not exist in the routing table? It is dropped unless... A default route is set last resort type of router will send it to the router it thinks may have the destination IP 42

Distribution Layer Devices and Communication Methods LAN Local Area Network Under the same administrative control 43 Plan, Implement and Verify a Local Network Consider the following before beginning: Number and type of hosts Applications to be run on the network Data and devices to be shared Speed requirements (bandwidth) Level of security Reliability of the network Connectivity requirements 44

Building the Network Physical environment temperature control availability/placement of outlets Physical configuration location of devices how are devices connected location/length of cable runs hardware configurations (hosts, servers) Logical configuration size of broadcast & collision domains IP addressing scheme Naming Permissions Sharing 45 Multifunction Devices Integrated routers Linksys wireless router problem = single point of failure Cisco Integrated Services Router (ISR) performs services of three different devices router switch wireless access point 46

Implement and Document the Network Develop a prototype tests network design 47 Sharing Resources Main reason for networking sharing resources File sharing Print sharing Consider this before sharing: security issues permissions granted Windows XP and Windows 7 users use Simple File Sharing (default) 48

Simple file sharing in Windows 7 It is pretty easy and common It is to be used to share file/folder with other users that use Windows XP, Vista or 7 in the same workgroup. Other users are allowed to access the shared file/folder without doing authentication with username and password, and so we call it simple file sharing. However, please don t enable this simple file sharing when your computer is connected to public network (at library, airport, restaurant, etc), because the other public users can also access the shared file/folder without authentication after you have enabled it. It s not safe! 49 Summary Information networks carry data using hosts as clients, servers, or both. All computer communication involves a source, destination, and channel. Rules called protocols govern computer communications. Larger networks are divided into smaller, more manageable ones using a layered hierarchical design. Each network host needs both a physical MAC address and a logical IP address. Good network design requires a network plan. 50