You are on page 1of 342

Living in a Network Centric World

Network Fundamentals – Chapter 1


Objectives

• Describe how networks impact our daily


lives.
• Describe the role of data networking in the
human network.
• Identify the key components of any data
network.
• Identify the opportunities and challenges
posed by converged networks.
• Describe the characteristics of network
architectures: fault tolerance, scalability,
quality of service and security.
I t ll d IRC li t d Wiki
How Networks Impact Daily Life

• Explain the benefits of instantaneous


communication and how it supports and
improves our lives.
How Networks Impact Daily Life

• Decide what to wear using online current weather conditions.


• Find the least congested route to your destination, displaying weather
and traffic video from webcams.
• Check your bank balance and pay bills electronically.
• Receive and send e-mail, or make an Internet phone call, at an
Internet cafe over lunch.
• Obtain health information and nutritional advice from experts all over
the world, and post to a forum to share related health or treatment
information.
• Download new recipes and cooking techniques to create a
spectacular dinner.
• Post and share your photographs, home videos, and experiences with
friends or with the world.
How Networks Impact Daily Life

• Describe the characteristics and purpose of


popular communication media such as, IM,
Wikis , Blogs, Podcasting, and Collaboration
Tools
– Instant messaging
• Real time communication
• between 2 or more
• people based on typed text
– Weblogs (Blogs)
• Web pages created
• by an individual
– Podcasting
• Website that contains
• audio files available
• for downloading
How Networks Impact Daily Life

• Explain ways that using information networks


to share and collaborate improves teaching
and learning
How Networks Impact Daily Life
• Communication over a network changes the
way we work
– Intranet, private network

Business application can be accessed remotely as if the employees were on site


Example

• Consider these business scenarios.


– A wheat farmer in Australia uses a laptop enabled with
a Global Positioning System (GPS) to plant a crop with
precision and efficiency. At harvest time, the farmer can
co-ordinate harvesting with the availability of grain
transporters and storage facilities. Using mobile
wireless technology, the grain transporter can monitor
the vehicle in-route in order to maintain the best fuel
efficiency and safe operation. Changes in status can be
relayed to the driver of the vehicle instantly.
Example

• Remote workers, called teleworkers or telecommuters,


use secure remote access services from home or while
traveling. The data network enables them to work as if
they were on-site, with access to all the network-based
tools normally available for their jobs. Virtual meetings and
conferences can be convened which include people in
remote locations. The network provides audio and video
capability so all participants can both see and hear each
other. The information from the meetings can be recorded
to a wiki or blog. The latest versions of the agenda and
minutes can be shared as soon as they are created.
How Networks Impact Daily Life

• Describe ways communication over a


network supports the way we play
• The widespread adoption of the Internet by the
entertainment and travel industries enhances the ability to
enjoy and share many forms of recreation, regardless of
location.
• It is possible to explore places interactively that previously
we could only dream of visiting, as well as preview the
actual destinations before making a trip.
• The details and photographs from these adventures may
be posted online for others to view.
Data Networking Role,
Components, and Challenges
• Basic characteristics of communication
– Rules or agreements are 1st established
– Important information may need to be repeated
– Various modes of communication may impact the
effectiveness of getting the message across.
Rules or agreements are 1st
established

• Before beginning to communicate with each other,


we establish rules or agreements to govern the
conversation.
• These rules, or protocols, must be followed in
order for the message to be successfully delivered
and understood.
• Among the protocols that govern successful
human communication are:
– An identified sender and receiver
– Agreed upon method of communicating (face-to-face,
telephone, letter, photograph)
– Common language and grammar
– Speed and timing of delivery
– Confirmation or acknowledgement requirements
Data Networking Role,
Components, and Challenges
• Describe the role of data networking in
communications
Data Networking Role,
Components, and Challenges

• Being able to reliably communicate to anyone,


anywhere, is becoming increasingly important to
our personal and business lives.
• In order to support the immediate delivery of the
millions of messages being exchanged between
people all over the world, we rely on a web of
interconnected networks.
• These data or information networks vary in size and
capabilities, but all networks have four basic elements in
common:
– Rules or agreements to govern how the messages are sent,
directed, received and interpreted.
– The messages or units of information that travel from one device
to another
– A means of interconnecting these devices - a medium that can
transport the messages from one device to another
– Devices on the network that exchange messages with each other
Data Networking Role,
Components, and Challenges
• Describe the various
elements that make up a
network
– Devices
• These are used to
communicate with one
another
– Medium
• This is how the
devices are connected
together
– Messages
• Information that
travels over the
medium
– Rules
• Governs how
• The standardization of the various elements of the
network enables equipment and devices created
by different companies to work together.
• Experts in various technologies can contribute
their best ideas on how to develop an efficient
network, without regard to the brand or
manufacturer of the equipment.
Data Networking Role,
Components, and Challenges
• Describe the role of converged networks in
communications
– Converged network
• A type of network that can carry voice, video & data
over the same network
Converged networks

• Technology advances are enabling us to consolidate these


disparate networks onto one platform - a platform defined
as a converged network.
• The flow of voice, video, and data traveling over the same
network eliminates the need to create and maintain
separate networks.
• On a converged network there are still many points of
contact and many specialized devices - for example,
personal computers, phones, TVs, personal assistants,
and retail point-of-sale registers - but only one common
network infrastructure.
Converged networks
Network Architecture
Characteristics

• Networks must support a wide range of


applications and services, as well as operate over
many different types of physical infrastructures.
• The term network architecture, in this context,
refers to both the technologies that support the
infrastructure and the programmed services and
protocols that move the messages across that
infrastructure.
Network Architecture
Characteristics
• As the Internet, and networks in general,
evolve, we are discovering that there are four
basic characteristics that the underlying
architectures need to address in order to
meet user expectations
– Fault tolerance
– Scalability
– Quality of service
– Security
Fault Tolerance

• The expectation that the Internet is always available to the millions of


users who rely on it requires a network architecture that is designed
and built to be fault tolerant.
• A fault tolerant network is one that limits the impact of a hardware or
software failure and can recover quickly when such a failure occurs.
• These networks depend on redundant links, or paths, between the
source and destination of a message.
• If one link or path fails, processes ensure that messages can be
instantly routed over a different link transparent to the users on either
end.
• Both the physical infrastructures and the logical processes that direct
the messages through the network are designed to accommodate this
redundancy.
• This is a basic premise of the architecture of current networks.
Network Architecture
Characteristics
• Describe how packet switching helps
improve the resiliency and fault tolerance of
the Internet architecture
Network Architecture
Characteristics
• Describe characteristics of the Internet that
help it scale to meet user demand
– Hierarchical
– Common standards
– Common protocols
Network Architecture
Characteristics
• Explain the factors that necessitate Quality of
Service and the mechanisms necessary to
ensure it
Network Architecture
Characteristics
• Describe how QoS mechanisms work to ensure
quality of service for applications that require it.
Network Architecture
Characteristics
• Describe how to select the appropriate QoS strategy
for a given type of traffic
Network Architecture
Characteristics
• Describe why networks must be secure
Network Architecture
Characteristics
• Describe basic measures to secure data
networks
– Ensure confidentiality through use of
• User authentication
• Data encryption
– Maintain communication integrity through use of
• Digital signatures
– Ensure availability through use of
• Firewalls
• Redundant network
• architecture
• Hardware without a single
• point of failure
Summary
Communicating over the
Network

Network Fundamentals – Chapter 2

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Describe the structure of a network, including the
devices and media that are necessary for successful
communications.
ƒ Explain the function of protocols in network
communications.
ƒ Explain the advantages of using a layered model to
describe network functionality.
ƒ Describe the role of each layer in two recognized
network models: The TCP/IP model and the OSI
model.
ƒ Describe the importance of addressing and naming
schemes in network communications.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Introduction

ƒ In this chapter, we focus on these aspects of the


information network:
• Devices that make up the network
• Media that connect the devices
• Messages that are carried across the network
• Rules and processes that govern network communications
• Tools and commands for constructing and maintaining
networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Network Structure
ƒ Define the elements of communication
• Communication begins with a message, or information, that
must be sent from one individual or device to another. People
exchange ideas using many different communication methods.
• 3 common elements of communication
¾ message source
¾ the channel
¾ message destination

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
ƒ Define a network
• data or information networks capable of carrying many
different types of communications including traditional
computer data, interactive voice, video, and entertainment
products.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Network Structure
ƒ In theory, a single communication, such as a music video
or an e-mail message, could be sent across a network
from a source to a destination as one massive continuous
stream of bits.
ƒ A better approach is to divide the data into smaller, more
manageable pieces to send over the network.
ƒ This division of the data stream into smaller pieces is
called segmentation.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Network Structure
ƒ Describe how messages are communicated
• Data is sent across a network in small “chunks” called
segments

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Segmentation
ƒ Segmenting messages has two primary benefits.
1. By sending smaller individual pieces from source to destination, many
different conversations can be interleaved on the network.
• The process used to interleave the pieces of separate
conversations together on the network is called multiplexing.

2. Segmentation can increase the reliability of network communications.


™ The separate pieces of each message need not travel the same
pathway across the network from source to destination.
™ If a particular path becomes congested with data traffic or fails,
individual pieces of the message can still be directed to the
destination using alternate pathways.
™ If part of the message fails to make it to the destination, only the
missing parts need to be retransmitted.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Segmentation

ƒ In network communications, each segment of the


message must go through a similar process to ensure
that it gets to the correct destination and can be
reassembled into the content of the original message.

ƒ Various types of devices throughout the network


participate in ensuring that the pieces of the message
arrive reliably at their destination.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Network Structure
ƒ Define the components of a network
•Network components
™ hardware – devices, media
™ software – process, services

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Hardware – Devices, Media

ƒ Devices and media are the


physical elements or hardware
of the network.
ƒ Hardware is often the visible
components of the network
platform such as a laptop, a PC,
a switch, or the cabling used to
connect the devices.
ƒ Occasionally, some
components may not be so
visible. In the case of wireless
media, messages are
transmitted through the air
using invisible radio frequency
or infrared waves.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Software – Services, Processes
ƒ Services and processes are the
communication programs, called
software, that run on the networked
devices.
ƒ A network service provides
information in response to a
request.
ƒ Services include many of the
common network applications
people use every day, like e-mail
hosting services and web hosting
services.
ƒ Processes provide the functionality
that directs and moves the
messages through the network.
ƒ Processes are less obvious to us
but are critical to the operation of
networks.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Network Structure
ƒ End Devices and their Role in the
Network
•End devices form interface with
human network & communications
network
™ Computers (work stations,
laptops, file servers, web
servers)
™ Network printers
™ VoIP phones
™ Security cameras
™ Mobile handheld devices (such
as wireless barcode scanners,
PDAs)

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
End Devices

ƒ In the context of a network, end devices are referred to as hosts.


ƒ A host device is either the source or destination of a message
transmitted over the network. In order to distinguish one host from
another, each host on a network is identified by an address.
ƒ When a host initiates communication, it uses the address of the
destination host to specify where the message should be sent.
ƒ Role of end devices:
• client - Clients are hosts that have software installed that enables them
to request and display the information obtained from the server.
• server - Servers are hosts that have software installed that enables
them to provide information and services, like e-mail or web pages, to
other hosts on the network
• both client and server

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Network Structure
ƒ Identify the role of an intermediary device in a data
network and be able to contrast that role with the role of
an end device
•Role of an intermediary device
™ provides connectivity and ensures data flows
across network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Intermediary Device

ƒ Intermediary device provide connectivity and to work


behind the scenes to ensure that data flows across the
network.
ƒ These devices connect the individual hosts to the network
and can connect multiple individual networks to form an
internetwork.
ƒ Examples of intermediary network devices are:
• Network Access Devices (Hubs, switches, and wireless access
points)
• Internetworking Devices (routers)
• Communication Servers and Modems
• Security Devices (firewalls)

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Network Structure
ƒ Communication across a network is carried on a
medium.
ƒ The medium provides the channel over which the
message travels from source to destination.
ƒ Modern networks primarily use three types of media to
interconnect devices and to provide the pathway over
which data can be transmitted.
ƒ These media are:
•Metallic wires within cables
•Glass or plastic fibers (fiber optic cable)
•Wireless transmission

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Network Types
ƒ Define Local Area Networks (LANs)
•- A network serving a home, building or campus is considered
a Local Area Network (LAN)

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
LAN

ƒ Networks infrastructures can vary greatly in terms of:


•The size of the area covered
•The number of users connected
•The number and types of services available
ƒ An individual network usually spans a single geographical area,
providing services and applications to people within a common
organizational structure, such as a single business, campus or
region.
ƒ This type of network is called a Local Area Network (LAN).
ƒ A LAN is usually administered by a single organization.
ƒ The administrative control that governs the security and access
control policies are enforced on the network level.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Network Types
ƒ Define Wide Area Networks (WANs)
•- LANs separated by geographic distance are connected by a
network known as a Wide Area Network (WAN)

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
WAN

ƒ WANs use specifically designed network devices to make the


interconnections between LANs.
ƒ Because of the importance of these devices to the network,
configuring, installing and maintaining these devices are skills that
are integral to the function of an organization's network.

ƒ LANs and WANs are very useful to individual organizations.


ƒ They connect the users within the organization.
ƒ They allow many forms of communication including exchange e-
mails, corporate training, and other resource sharing.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Network Types
ƒ Define the Internet
•The internet is defined as a
• global mesh of interconnected networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
The Internet – A network of networks

ƒ Although there are benefits to using a LAN or WAN, most


of us need to communicate with a resource on another
network, outside of our local organization.
ƒ Examples of this type of communication include:
• Sending an e-mail to a friend in another country
• Accessing news or products on a website
• Getting a file from a neighbor's computer
• Instant messaging with a relative in another city
• Following a favorite sporting team's performance on a cell phone

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Network Types
ƒ Describe network representations

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 28
network representations

ƒ Network Interface Card - A NIC, or LAN adapter, provides the


physical connection to the network at the PC or other host device.
The media connecting the PC to the networking device plugs directly
into the NIC.

ƒ Physical Port - A connector or outlet on a networking device where


the media is connected to a host or other networking device.

ƒ Interface - Specialized ports on an internetworking device that


connect to individual networks. Because routers are used to
interconnect networks, the ports on a router are referred to network
interfaces.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Rules that govern communications

ƒ All communication, whether face-to-face or over a


network, is governed by predetermined rules called
protocols.
ƒ These protocols are specific to the characteristics of the
conversation.
ƒ In our day-to-day personal communication, the rules we
use to communicate over one medium, like a telephone
call, are not necessarily the same as the protocols for
using another medium, such as a sending a letter.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Function of Protocol in Network
Communication
ƒ The importance of protocols and how they are used to
facilitate communication over data networks
•A protocol is a set of predetermined rules

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 31
ƒ Successful communication between hosts on a network
requires the interaction of many different protocols.
ƒ A group of inter-related protocols that are necessary to
perform a communication function is called a protocol
suite.
ƒ These protocols are implemented in software and
hardware that is loaded on each host and network device

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 32
Function of Protocol in Network
Communication
ƒ Explain network protocols
•Network protocols are used
to allow devices to
communicate
successfully

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 33
Function of Protocol in Network
Communication
ƒ Describe Protocol suites and industry standards

•A standard is
• a process or protocol that has been endorsed by the
networking industry and ratified by a standards organization

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 34
Function of Protocol in Network
Communication
ƒ Define different protocols and how they interact

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 35
Protocol Suite

ƒ An example of the use of a protocol suite in network communications


is the interaction between a web server and a web browser.
ƒ This interaction uses a number of protocols and standards in the
process of exchanging information between them.
ƒ The different protocols work together to ensure that the messages
are received and understood by both parties.
ƒ Examples of these protocols are:
•Application Protocol
•Transport Protocol
•Internetwork Protocol
•Network Access Protocol

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 36
Application Protocol:

ƒ Hypertext Transfer Protocol (HTTP) is a common protocol


that governs the way that a web server and a web client
interact.
ƒ HTTP defines the content and formatting of the requests
and responses exchanged between the client and server.
ƒ Both the client and the web server software implement
HTTP as part of the application.
ƒ The HTTP protocol relies on other protocols to govern
how the messages are transported between client and
server

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 37
Transport Protocol:

ƒ Transmission Control Protocol (TCP) is the transport


protocol that manages the individual conversations
between web servers and web clients.
ƒ TCP divides the HTTP messages into smaller pieces,
called segments, to be sent to the destination client.
ƒ It is also responsible for controlling the size and rate at
which messages are exchanged between the server and
the client.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 38
Internetwork Protocol:

ƒ The most common internetwork protocol is Internet


Protocol (IP).
ƒ IP is responsible for taking the formatted segments from
TCP, encapsulating them into packets, assigning the
appropriate addresses, and selecting the best path to the
destination host.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 39
Network Access Protocols:

ƒ Network access protocols describe two primary functions,


data link management and the physical transmission of
data on the media.
ƒ Data-link management protocols take the packets from IP
and format them to be transmitted over the media.
ƒ The standards and protocols for the physical media
govern how the signals are sent over the media and how
they are interpreted by the receiving clients.
ƒ Transceivers on the network interface cards implement
the appropriate standards for the media that is being
used.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 40
Function of Protocol in Network
Communication
ƒ Technology independent Protocols
•-Many diverse types of devices can communicate using the
same sets of protocols. This is because protocols specify
network functionality, not the underlying technology to support
this functionality.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 41
ƒ Networking protocols describe the functions that occur
during network communications.
ƒ In the face-to-face conversation example, a protocol for
communicating might state that in order to signal that the
conversation is complete, the sender must remain silent
for two full seconds.
ƒ However, this protocol does not specify how the sender is
to remain silent for the two seconds.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 42
ƒ Looking at the web server example, HTTP does not
specify what programming language is used to create the
browser, which web server software should be used to
serve the web pages, what operating system the software
runs on, or the hardware requirements necessary to
display the browser.
ƒ It also does not describe how the server should detect
errors, although it does describe what the server should
do if an error occurs.
ƒ This means that a computer - and other devices, like
mobile phones or PDAs - can access a web page stored
on any type of web server that uses any form of operating
system from anywhere on the Internet

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 43
Layers with TCP/IP and OSI Model
ƒ Explain the benefits of using a layered model
•Benefits include
™ assists in protocol design
™ fosters competition
™ changes in one layer do not affect other layers
™ provides a common language

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 44
Benefit :

ƒ Assists in protocol design, because protocols that operate


at a specific layer have defined information that they act
upon and a defined interface to the layers above and
below.
ƒ Fosters competition because products from different
vendors can work together.
ƒ Prevents technology or capability changes in one layer
from affecting other layers above and below.
ƒ Provides a common language to describe networking
functions and capabilities.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 45
Protocol and Reference Model

ƒ There are two basic types of networking models: protocol


models and reference models.
ƒ A protocol model provides a model that closely matches
the structure of a particular protocol suite.
ƒ The hierarchical set of related protocols in a suite
typically represents all the functionality required to
interface the human network with the data network.
ƒ The TCP/IP model is a protocol model because it
describes the functions that occur at each layer of
protocols within the TCP/IP suite.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 46
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 47
Layers with TCP/IP and OSI Model
ƒ Describe TCP/IP Mode

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 48
Layers with TCP/IP and OSI Model
ƒ Describe the Communication Process

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 49
Layers with TCP/IP and OSI Model
ƒ Explain protocol data units (PDU) and encapsulation

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 50
Layers with TCP/IP and OSI Model
ƒ Describe the process of sending and receiving
messages

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 51
Layers with TCP/IP and OSI Model
ƒ Explain protocol and
reference models
•A protocol model
• provides a model that
closely matches the
structure of a particular
protocol suite.

•A reference model
• provides a common
reference for
maintaining
consistency within all
types of network
protocols and services.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 52
Layers with TCP/IP and OSI Model
ƒ Define OSI

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 53
Layers with TCP/IP and OSI Model
ƒ Compare OSI and TCP/IP model

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 54
Addressing and Naming Schemes
ƒ Explain how labels in encapsulation headers are used
to manage communication in data networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 55
Addressing and Naming Schemes
ƒ Describe examples of Ethernet MAC Addresses, IP
Addresses, and TCP/UDP Port numbers

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 56
Addressing and Naming Schemes
ƒ Explain how labels in encapsulation headers are used
to manage communication in data networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 57
Addressing and Naming Schemes
ƒ Describe how information in the encapsulation header
is used to identify the source and destination processes
for data communication

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 58
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 59
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 60
Application Layer
Functionality and
Protocols

Network Fundamentals – Chapter 3

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Define the application layer as the source and
destination of data for communication across
networks.
ƒ Explain the role of protocols in supporting
communication between server and client
processes.
ƒ Describe the features, operation, and use of
well-known TCP/IP application layer services
(HTTP, DNS, SMTP).

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Introduction
ƒ Most of us experience the Internet through the World
Wide Web, e-mail services, and file-sharing programs.
ƒ These applications, and many others, provide the
human interface to the underlying network, enabling us
to send and receive information with relative ease
ƒ Typically the applications that we use are intuitive,
meaning we can access and use them without knowing
how they work.
ƒ However, for network professionals, it is important to
know how an application is able to format, transmit and
interpret messages that are sent and received across
the network.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Applications – The Interface Between
Human and Data Networks
ƒ applications provide the means for generating and receiving data
that can be transported on the network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
OSI Model

ƒ The Open Systems Interconnection reference model is


a layered, abstract representation created as a
guideline for network protocol design.
ƒ The OSI model divides the networking process into
seven logical layers, each of which has unique
functionality and to which are assigned specific
services and protocols.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
OSI Model

ƒ In this model, information is passed from one layer to


the next, starting at the Application layer on the
transmitting host, proceeding down the hierarchy to the
Physical layer, then passing over the communications
channel to the destination host, where the information
proceeds back up the hierarchy, ending at the
Application layer.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Applications – The Interface Between
Human and Data Networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Application Layer

ƒ The Application layer, Layer seven, is the top layer of


both the OSI and TCP/IP models. It is the layer that
provides the interface between the applications we use
to communicate and the underlying network over which
our messages are transmitted.
ƒ Application layer protocols are used to exchange data
between programs running on the source and
destination hosts.
ƒ There are many Application layer protocols and new
protocols are always being developed.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
TCP/IP Protocol Suite
ƒ Although the TCP/IP protocol suite was developed prior to the
definition of the OSI model, the functionality of the TCP/IP
application layer protocols fit roughly into the framework of the top
three layers of the OSI model: Application, Presentation and
Session layers.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
TCP/IP Protocol Suite

ƒ Most TCP/IP application layer protocols were


developed before the emergence of personal
computers, graphical user interfaces and multimedia
objects.
ƒ As a result, these protocols implement very little of the
functionality that is specified in the OSI model
Presentation and Session layers.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
OSI & TCP/IP Protocol Suite

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Presentation Layer
ƒ The Presentation layer has three primary functions:
1. Coding and conversion of Application layer data to ensure
that data from the source device can be interpreted by the
appropriate application on the destination device.
2. Compression of the data in a manner that can be
decompressed by the destination device.
3. Encryption of the data for transmission and the decryption of
data upon receipt by the destination.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Presentation Layer
ƒ Presentation layer implementations are not typically associated
with a particular protocol stack.
ƒ The standards for video and graphics are examples. Some well-
known standards for video include QuickTime and Motion Picture
Experts Group (MPEG).
ƒ QuickTime is an Apple Computer specification for video and audio,
and MPEG is a standard for video compression and coding.

ƒ Among the well-known graphic image formats are Graphics


Interchange Format (GIF), Joint Photographic Experts Group
(JPEG), and Tagged Image File Format (TIFF).
ƒ GIF and JPEG are compression and coding standards for graphic
images, and TIFF is a standard coding format for graphic images.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Session Layer

ƒ As the name of the Session layer implies, functions at this layer


create and maintain dialogs between source and destination
applications.
ƒ The Session layer handles the exchange of information to initiate
dialogs, keep them active, and to restart sessions that are
disrupted or idle for a long period of time.

ƒ Most applications, like web browsers or e-mail clients, incorporate


functionality of the OSI layers 5, 6 and 7.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
OSI and TCP/IP Model
ƒ Describe the role protocols play in networking and be able to
identify several message properties that can be defined by a
protocol

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
OSI and TCP/IP Model
ƒ The most widely-known TCP/IP Application layer protocols are
those that provide for the exchange of user information.
ƒ These protocols specify the format and control information
necessary for many of the common Internet communication
functions.
ƒ Among these TCP/IP protocols are:
Domain Name Service Protocol (DNS) is used to resolve Internet
names to IP addresses.
Hypertext Transfer Protocol (HTTP) is used to transfer files that make
up the Web pages of the World Wide Web.
Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail
messages and attachments.
Telnet, a terminal emulation protocol, is used to provide remote access
to servers and networking devices.
File Transfer Protocol (FTP) is used for interactive file transfer between
systems.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Application Layer
Software

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Application vs Application Layer Software

ƒ Application is any computer program that is used to


complete a task
ƒ Application layer software is the software necessary to
format data for the network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Application Layer Software

ƒ The functions associated with the Application layer


protocols enable our human network to interface with
the underlying data network.
ƒ When we open a web browser or an instant message
window, an application is started, and the program is
put into the device's memory where it is executed.
ƒ Each executing program loaded on a device is referred
to as a process.
ƒ Within the Application layer, there are two forms of
software programs or processes that provide access to
the network: applications and services.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Network-Aware Applications

ƒ Applications are the software programs used by people


to communicate over the network.
ƒ Some end-user applications are network-aware,
meaning that they implement the application layer
protocols and are able to communicate directly with the
lower layers of the protocol stack.
ƒ E-mail clients and web browsers are examples of these
types of applications.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Application layer Services

ƒ Other programs may need the assistance of Application


layer services to use network resources, like file
transfer or network print spooling.
ƒ Though transparent to the user, these services are the
programs that interface with the network and prepare
the data for transfer.
ƒ Different types of data - whether it is text, graphics, or
video - require different network services to ensure that
it is properly prepared for processing by the functions
occurring at the lower layers of OSI model.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Making
Provisions for
Applications
and Services

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 28
The Client/Server model

ƒ In the client/server model, the device requesting the information is


called a client and the device responding to the request is called a
server.
ƒ Client and server processes are considered to be in the Application
layer.
ƒ The client begins the exchange by requesting data from the server,
which responds by sending one or more streams of data to the
client.
ƒ Application layer protocols describe the format of the requests and
responses between clients and servers.
ƒ In addition to the actual data transfer, this exchange may also
require control information, such as user authentication and the
identification of a data file to be transferred.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 29
The Client/Server model
ƒ Describe the roles of client and server processes in data networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 30
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 31
Server

ƒ In a general networking context, any device that


responds to requests from client applications is
functioning as a server.
ƒ A server is usually a computer that contains information
to be shared with many client systems.
ƒ For example, web pages, documents, databases,
pictures, video, and audio files can all be stored on a
server and delivered to requesting clients.
ƒ In other cases, such as a network printer, the print
server delivers the client print requests to the specified
printer
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 32
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 33
Application Layer Services and Protocols
ƒ List common Application Layers services and protocols

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 34
Application Layer Services and Protocols

ƒ A single application may employ many different


supporting Application layer services; thus what
appears to the user as one request for a web page
may, in fact, amount to dozens of individual requests.
ƒ And for each request, multiple processes may be
executed.
ƒ For example, a client may require several individual
processes to formulate just one request to a server.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 35
Application Layer Services and Protocols

ƒ Additionally, servers typically have multiple clients


requesting information at the same time.
ƒ For example, a Telnet server may have many clients
requesting connections to it.
ƒ These individual client requests must be handled
simultaneously and separately for the network to
succeed.
ƒ The Application layer processes and services rely on
support from lower layer functions to successfully
manage the multiple conversations.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 36
The Peer-to-Peer Model

ƒ In addition to the client/server model for networking,


there is also a peer-to-peer model.
ƒ Peer-to-peer networking involves two distinct forms:
peer-to-peer network design and peer-to-peer
applications (P2P).
ƒ Both forms have similar features but in practice work
very differently.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 37
Peer-to-Peer Networks

ƒ In a peer-to-peer network, two or more computers are


connected via a network and can share resources
(such as printers and files) without having a dedicated
server.
ƒ Every connected end device (known as a peer) can
function as either a server or a client.
ƒ One computer might assume the role of server for one
transaction while simultaneously serving as a client for
another.
ƒ The roles of client and server are set on a per request
basis.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 38
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 39
Peer-to-peer networking

ƒ Unlike the client/server model, which uses dedicated servers, peer-


to-peer networks decentralize the resources on a network.
ƒ Instead of locating information to be shared on dedicated servers,
information can be located anywhere on any connected device.
ƒ Most of the current operating systems support file and print sharing
without requiring additional server software.
ƒ Because peer-to-peer networks usually do not use centralized user
accounts, permissions, or monitors, it is difficult to enforce security
and access policies in networks containing more than just a few
computers.
ƒ User accounts and access rights must be set individually on each
peer device.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 40
P2P Application
ƒ Compare and contrast client server networking with peer-to-peer
networking and peer-to-peer applications

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 41
Peer-to-Peer Applications

ƒ A peer-to-peer application (P2P), unlike a peer-to-peer network,


allows a device to act as both a client and a server within the same
communication.
ƒ In this model, every client is a server and every server a client.
ƒ Both can initiate a communication and are considered equal in the
communication process.
ƒ However, peer-to-peer applications require that each end device
provide a user interface and run a background service.
ƒ When you launch a specific peer-to-peer application it invokes the
required user interface and background services.
ƒ After that the devices can communicate directly.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 42
Peer-to-Peer Applications

ƒ Some P2P applications use a hybrid system where


resource sharing is decentralized but the indexes that
point to resource locations are stored in a centralized
directory.
ƒ In a hybrid system, each peer accesses an index server
to get the location of a resource stored on another peer.
ƒ The index server can also help connect two peers, but
once connected, the communication takes place
between the two peers without additional
communication to the index server.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 43
DNS Services and Protocols

ƒ The Transport layer uses an addressing scheme called


a port number.
ƒ Port numbers identify applications and Application layer
services that are the source and destination of data.
ƒ Server programs generally use predefined port
numbers that are commonly known by clients.
ƒ As we examine the different TCP/IP Application layer
protocols and services, we will be referring to the TCP
and UDP port numbers normally associated with these
services.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 44
DNS Services and Protocols

ƒ Some of these services are:


–Domain Name System (DNS) - TCP/UDP Port 53
–Hypertext Transfer Protocol (HTTP) - TCP Port 80
–Simple Mail Transfer Protocol (SMTP) - TCP Port 25
–Post Office Protocol (POP) - UDP Port 110
–Telnet - TCP Port 23
–Dynamic Host Configuration Protocol - UDP Port 67
–File Transfer Protocol (FTP) - TCP Ports 20 and 21

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 45
DNS

ƒ In data networks, devices are labeled with numeric IP


addresses, so that they can participate in sending and
receiving messages over the network.
ƒ However, most people have a hard time remembering
this numeric address.
ƒ Hence, domain names were created to convert the
numeric address into a simple, recognizable name.
ƒ On the Internet these domain names, such as
www.cisco.com , are much easier for people to
remember than 198.132.219.25, which is the actual
numeric address for this server

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 46
DNS

ƒ The Domain Name System (DNS) was created for domain name to
address resolution for these networks.
ƒ DNS uses a distributed set of servers to resolve the names
associated with these numbered addresses.
ƒ The DNS protocol defines an automated service that matches
resource names with the required numeric network address.
ƒ It includes the format for queries, responses, and data formats.
DNS protocol communications use a single format called a
message.
ƒ This message format is used for all types of client queries and
server responses, error messages, and the transfer of resource
record information between servers.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 47
DNS
ƒ Describe the features of the DNS protocol and how this protocol
supports DNS services

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 48
nslookup

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 49
DNS
ƒ The Domain Name System uses a hierarchical system to create a
name database to provide name resolution. The hierarchy looks
like an inverted tree with the root at the top and branches below.
ƒ At the top of the hierarchy, the root servers maintain records about
how to reach the top-level domain servers, which in turn have
records that point to the secondary level domain servers and so
on.
ƒ The different top-level domains represent the either the type of
organization or the country or origin. Examples of top-level
domains are:
.au - Australia
.co - Colombia
.com - a business or industry
.jp - Japan
.org - a non-profit organization

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 50
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 51
HTTP Protocol

ƒ When a web address (or URL) is typed into a web


browser, the web browser establishes a connection to
the web service running on the server using the HTTP
protocol.
ƒ URLs (or Uniform Resource Locator) and URIs
(Uniform Resource Identifier) are the names most
people associate with web addresses.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 52
ƒ Browsers can interpret and present many data types,
such as plain text or Hypertext Markup Language
(HTML, the language in which web pages are
constructed).
ƒ Other types of data, however, may require another
service or program, typically referred to as plug-ins or
add-ons.
ƒ To help the browser determine what type of file it is
receiving, the server specifies what kind of data the file
contains.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 53
HTTP Protocol

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 54
HTTP Protocol
ƒ Describe the features of the HTTP protocol and how this protocol
supports the delivery of web pages to the client

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 55
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 56
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 57
HTTP Process
ƒ First, the browser interprets the three parts of the URL:
1. http (the protocol or scheme)
2. www.cisco.com(the server name)
3. web-server.htm (the specific file name requested).

ƒ The browser then checks with a name server to convert


www.cisco.com <http://www.cisco.com > into a numeric address,
which it uses to connect to the server.
ƒ Using the HTTP protocol requirements, the browser sends a GET
request to the server and asks for the file web-server.htm.
ƒ The server in turn sends the HTML code for this web page to the
browser.
ƒ Finally, the browser deciphers the HTML code and formats the
page for the browser window.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 58
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 59
HTTP Protocol
ƒ The Hypertext Transfer Protocol (HTTP), one of the protocols in
the TCP/IP suite, was originally developed to publish and retrieve
HTML pages and is now used for distributed, collaborative
information systems.
ƒ HTTP is used across the WWW for data transfer and is one of the
most used application protocols.
ƒ HTTP specifies a request/response protocol.
ƒ When a client, typically a web browser, sends a request message
to a server, the HTTP protocol defines the message types the
client uses to request the web page and also the message types
the server uses to respond.
ƒ The three common message types are GET, POST, and PUT.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 60
E-mail Services

ƒ E-mail, the most popular network service, has


revolutionized how people communicate through its
simplicity and speed.
ƒ Yet to run on a computer or other end device, e-mail
requires several applications and services.
ƒ Two example Application layer protocols are Post
Office Protocol (POP) and Simple Mail Transfer
Protocol (SMTP), shown in the figure.
ƒ As with HTTP, these protocols define client/server
processes.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 61
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 62
E-mail Server Processes - MTA and MDA
ƒ The e-mail server operates two separate processes:
–Mail Transfer Agent (MTA)
–Mail Delivery Agent (MDA)

ƒ The Mail Transfer Agent (MTA) process is used to forward e-mail.


ƒ The MTA receives messages from the MUA or from another MTA
on another e-mail server.
ƒ Based on the message header, it determines how a message has
to be forwarded to reach its destination.
ƒ If the mail is addressed to a user whose mailbox is on the local
server, the mail is passed to the MDA.
ƒ If the mail is for a user not on the local server, the MTA routes the
e-mail to the MTA on the appropriate server.
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 63
Pop and SMTP Protocols
ƒ Describe the features of the POP and SMTP protocols, and how
these protocols support e-mail services

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 64
Telnet
ƒ Describe the features of the Telnet protocol and identify several of
its uses in examining and managing networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 65
SMB
ƒ Describe the features of the SMB protocol and the role it plays in
supporting file sharing in Microsoft-based networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 66
Gnutella
ƒ Describe the features of the Gnutella protocol and the role it plays
in supporting P2P services

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 67
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 68
Tea Break

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 69
Q and A

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 70
Lucky Draw

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 71
Thank You

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 72
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 73
OSI Transport Layer

Network Fundamentals – Chapter 4

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain the role of Transport Layer protocols and
services in supporting communications across data
networks
ƒ Analyze the application and operation of TCP
mechanisms that support reliability
ƒ Analyze the application and operation of TCP
mechanisms that support reassembly and manage
data loss.
ƒ Analyze the operation of UDP to support
communicate between two processes on end devices

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Transport Layer Role and Services
ƒ Explain the purpose of the Transport layer

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Transport Layer Role and Services
ƒ Major functions of the transport layer and the role it
plays in data networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Transport Layer Role and Services
ƒ Supporting Reliable Communication

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Transport Layer Role and Services
ƒ Identify the basic characteristics of the UDP and TCP
protocols

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Transport Layer Role and Services
ƒ Identify how a port number is represented and describe
the role port numbers play in the TCP and UDP
protocols.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Transport Layer Role and Services
ƒ Describe the role of segments in the transport layer and
the two principle ways segments can be marked for
reassembly.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Application and Operation of TCP Mechanisms
ƒ Trace the steps that show how the TCP reliability
mechanism works as part of a session

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Application and Operation of TCP Mechanisms
ƒ Describe the role of port numbers in establishing TCP
sessions and directing segments to server process

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Application and Operation of TCP Mechanisms
ƒ Trace the steps in the handshake in the establishment
of TCP sessions

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Application and Operation of TCP Mechanisms
ƒ Trace the steps in the handshake in the termination of
TCP sessions

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Managing TCP Sessions
ƒ Describe how TCP sequence numbers are used to
reconstruct the data stream with segments placed in
the correct order

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Managing TCP Sessions
ƒ Trace the steps used by the TCP protocol in which
sequence numbers and acknowledgement numbers are
used to manage exchanges in a conversation

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Managing TCP Sessions
ƒ Describe the retransmission.remedy for lost data
employed by TCP

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Managing TCP Sessions
ƒ Describe the mechanisms in TCP that manage the
interrelationship between window size, data loss and
congestion during a session

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
UDP Protocol
ƒ Describe the characteristics of the UDP protocol and
the types of communication for which it is best suited

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
UDP Protocol
ƒ Describe in detail the process specified by the UDP
protocol to reassemble PDUs at the destination device

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
UDP Protocol
ƒ Describe how servers use port numbers to identify a
specified application layer process and direct segments
to the proper service or application

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
UDP Protocol
ƒ Trace the steps as the UDP protocol and port numbers
are utilized in client-server communication.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
OSI Network Layer

Network Fundamentals – Chapter 5

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Identify the role of the Network Layer, as it describes
communication from one end device to another end device
ƒ Examine the most common Network Layer protocol, Internet
Protocol (IP), and its features for providing connectionless and
best-effort service
ƒ Understand the principles used to guide the division or grouping
of devices into networks
ƒ Understand the hierarchical addressing of devices and how this
allows communication between networks
ƒ Understand the fundamentals of routes, next hop addresses and
packet forwarding to a destination network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Network Layer Protocols and Internet Protocol
(IP)
ƒ Define the basic role of the Network Layer in data
networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Network Layer Protocols and Internet Protocol
(IP)
ƒ Identify the basic characteristics and the role of the
IPv4 protocol

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Network Layer Protocols and Internet Protocol
(IP)
ƒ Describe the implications for the use of the IP protocol
as it is connectionless

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Network Layer Protocols and Internet Protocol
(IP)
ƒ Describe the implications for the use of the IP protocol
as it is considered an unreliable protocol

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Network Layer Protocols and Internet Protocol
(IP)
ƒ Describe the implications for the use of the IP as it is
media independent

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Network Layer Protocols and Internet Protocol
(IP)
ƒ Describe the role of framing in the Transport Layer and
explain that segments are encapsulated as packets

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Network Layer Protocols and Internet Protocol
(IP)
ƒ Identify the major header fields in the IPv4 protocol and
describe each field's role in transporting packets

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Grouping Devices into Networks and
Hierarchical Addressing
ƒ List several different reasons for grouping devices into
sub-networks and define several terms used to identify
the sub-networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Grouping Devices into Networks and
Hierarchical Addressing
ƒ List several ways in which dividing a large network can
increase network performance

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Grouping Devices into Networks and
Hierarchical Addressing
ƒ List several ways in which dividing a large network can
increase network security

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Grouping Devices into Networks and
Hierarchical Addressing
ƒ Explain the communication problems that emerge when
very large numbers of devices are included in one large
network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Grouping Devices into Networks and
Hierarchical Addressing
ƒ Describe how hierarchical addressing solves the
problem of devices communicating across networks of
networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Grouping Devices into Networks and
Hierarchical Addressing
ƒ Describe the purpose of further subdividing networks
into smaller networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Describe the role of an intermediary gateway device in
allowing devices to communicate across sub-divided
networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Trace the steps of an IP packet as it traverses
unchanged via routers from sub network to sub-network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Describe the role of a gateway and the use of a simple
route table in directing packets toward their ultimate
destinations

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Define a route and its three key parts

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Describe the purpose and use of the destination
network in a route

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Describe the purpose and use of the next hop in a route

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Trace the steps of several IP packets as they are
routed through several gateways from devices on one
sub network to devices on other sub networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Describe the purpose of routing protocols and the need
for both static and dynamic routes

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Explain how routes are manually configured to build
routing table

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
ƒ Explain the role of routing protocols in building the
routing table

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Addressing the Network
– IPv4

Network Fundamentals – Chapter 6

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain the structure IP addressing and demonstrate the ability
to convert between 8-bit binary and decimal numbers.
ƒ Given an IPv4 address, classify by type and describe how it is
used in the network
ƒ Explain how addresses are assigned to networks by ISPs and
within networks by administrators
ƒ Determine the network portion of the host address and explain
the role of the subnet mask in dividing networks.
ƒ Given IPv4 addressing information and design criteria, calculate
the appropriate addressing components.
ƒ Use common testing utilities to verify and test network
connectivity and operational status of the IP protocol stack on a
host.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
IP Addressing Structure
ƒ Describe the dotted decimal structure of a binary IP
address and label its parts

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
IP Addressing Structure
ƒ Describe the general role of 8-bit binary in network
addressing and convert 8-bit binary to decimal

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
IP Addressing Structure
ƒ Practice converting 8-bit binary to decimal

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
IP Addressing Structure
ƒ Convert decimal to 8-bit binary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
IP Addressing Structure
ƒ Practice converting decimal to 8-bit binary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Classify and Define IPv4 Addresses
ƒ Name the three types of addresses in the network and
describe the purpose of each type

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Classify and Define IPv4 Addresses
ƒ Determine the network, broadcast and host addresses
for a given address and prefix combination

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Classify and Define IPv4 Addresses
ƒ Name the three types of communication in the Network
Layer and describe the characteristics of each type

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Classify and Define IPv4 Addresses
ƒ Identify the address ranges reserved for these special
purposes in the IPv4 protocol

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Classify and Define IPv4 Addresses
ƒ Define public address and private address

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Classify and Define IPv4 Addresses
ƒ Describe the purpose of several special addresses

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Classify and Define IPv4 Addresses
ƒ Identify the historic method for assigning addresses
and the issues associated with the method

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Assigning Addresses
ƒ Explain the importance of using a structured process to
assign IP addresses to hosts and the implications for
choosing private vs. public addresses

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Assigning Addresses
ƒ Explain how end user devices can obtain addresses
either statically through an administrator or dynamically
through DHCP

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Assigning Addresses
ƒ Explain which types of addresses should be assigned
to devices other than end user devices

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Assigning Addresses
ƒ Describe the process for requesting IPv4 public
addresses, the role ISPs play in the process, and the
role of the regional agencies that manage IP address
registries

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Assigning Addresses
ƒ Identify different types of ISPs and their roles in
providing Internet connectivity

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Assigning Addresses
ƒ Identify several changes made to the IP protocol in
IPv6 and describe the motivation for migrating from
IPv4 to IPv6.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Determine the network portion of the host
address and the role of the subnet mask
ƒ Describe how the subnet mask is used to create and
specify the network and host portions of an IP address

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Determine the network portion of the host
address and the role of the subnet mask
ƒ Use the subnet mask and ANDing process to extract
the network address from the IP address.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Determine the network portion of the host
address and the role of the subnet mask
ƒ Use ANDing logic to determine an outcome.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Determine the network portion of the host
address and the role of the subnet mask
ƒ Observe the steps in the ANDing of an IPv4 host
address and subnet mask

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Calculating Addresses
ƒ Use the subnet mask to divide a network into smaller
networks and describe the implications of dividing
networks for network planners

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Calculating Addresses
ƒ Extract network addresses from host addresses using
the subnet mask

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Calculating Addresses
ƒ Calculate the number of hosts in a network range given
an address and subnet mask

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Calculating Addresses
ƒ Given a subnet address and subnet mask, calculate the
network address, host addresses and broadcast
address

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Calculating Addresses
ƒ Given a pool of addresses and masks, assign a host
parameter with address, mask and gateway

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Calculating Addresses
ƒ Given a diagram of a multi-layered network, address
range, number of hosts in each network and the ranges
for each network, create a network scheme that
assigns addressing ranges to each network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Testing the Network Layer
ƒ Describe the general purpose of the ping command,
trace the steps of its operation in a network, and use
the ping command to determine if the IP protocol is
operational on a local host

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 31
Testing the Network Layer
ƒ Use ping to verify that a local host can communicate
with a gateway across a local area network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 32
Testing the Network Layer
ƒ Use ping to verify that a local host can communicate via
a gateway to a device in remote network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 33
Testing the Network Layer
ƒ Use tracert/traceroute to observe the path between two
devices as they communicate and trace the steps of
tracert/traceroute's operation

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 34
Testing the Network Layer
ƒ Describe the role of ICMP in the TCP/IP suite and its
impact on the IP protocol

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 35
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 36
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 37
OSI Data Link Layer

Network Fundamentals – Chapter 7

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain the role of Data Link layer protocols in data transmission.
ƒ Describe how the Data Link layer prepares data for transmission
on network media.
ƒ Describe the different types of media access control methods.
ƒ Identify several common logical network topologies and describe
how the logical topology determines the media access control
method for that network.
ƒ Explain the purpose of encapsulating packets into frames to
facilitate media access.
ƒ Describe the Layer 2 frame structure and identify generic fields.
ƒ Explain the role of key frame header and trailer fields including
addressing, QoS, type of protocol and Frame Check Sequence.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Data Link Layer – Accessing the Media
ƒ Describe the service the Data Link Layer provides as it
prepares communication for transmission on specific
media

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Data Link Layer – Accessing the Media
ƒ Describe why Data Link layer protocols are required to
control media access

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Data Link Layer – Accessing the Media
ƒ Describe the role of framing in preparing a packet for
transmission on a given media

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Data Link Layer – Accessing the Media
ƒ Describe the role the Data Link layer plays in linking the
software and hardware layers

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Data Link Layer – Accessing the Media
ƒ Identify several sources for the protocols and standards
used by the Data Link layer

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Media Access Control Techniques
ƒ Explain the necessity for controlling access to the
media

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Media Access Control Techniques
ƒ Identify two media access control methods for shared
media and the basic characteristics of each

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Media Access Control Techniques
ƒ Define Full Duplex and Half Duplex as it relates to
Media Access Control for non-shared media

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Media Access Control Techniques
ƒ Describe the purpose of a logical topology and identify
several common logical topologies

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Media Access Control Techniques
ƒ Contrast logical and physical topologies

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Media Access Control Techniques
ƒ Identify the characteristics of point-to-point topology
and describe the implications for media access when
using this topology

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Media Access Control Techniques
ƒ Identify the characteristics of multi-access topology and
describe the implications for media access when using
this topology

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Media Access Control Techniques
ƒ Identify the characteristics of ring topology and describe
the implications for media access when using this
topology

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Media Access Control Addressing and
Framing Data
ƒ Describe the purpose of encapsulating packets into
frames to facilitate the entry and exit of data on media

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Media access control addressing and framing
data
ƒ Describe the role of the frame header in the Data Link
layer and identify the fields commonly found in
protocols specifying the header structure

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Media access control addressing and framing
data
ƒ Describe the role of addressing in the Data Link layer
and identify cases where addresses are needed and
cases where addresses are not needed

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Media access control addressing and framing
data
ƒ Describe the importance of the trailer in the Data Link
layer and its implications for use on Ethernet, a "non-
reliable" media

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
OSI Physical Layer

Network Fundamentals – Chapter 8

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain the role of Physical layer protocols and
services in supporting communication across data
networks.
- Describe the role of signals used to represent bits as a frame
as the frame is transported across the local media

ƒ Describe the purpose of Physical layer signaling and


encoding as they are used in networks
ƒ Identify the basic characteristics of copper, fiber and
wireless network media
ƒ Describe common uses of copper, fiber and wireless
network media

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Physical Layer Protocols & Services
ƒ Describe the purpose of the Physical layer in the
network and identify the basic elements that enable this
layer to fulfill its function

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Physical Layer Protocols & Services
ƒ Describe the role of bits in representing a frame as it is
transported across the local media.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Physical Layer Protocols & Services
ƒ Describe the role of signaling in the physical media.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Physical Layer Protocols & Services
ƒ Distinguish who establishes and maintains standards
for the Physical layers compared to those for the other
layers of the network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Physical Layer Protocols & Services
ƒ Identify hardware components associated with the
Physical layer that are governed by standards

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Physical Layer Signaling and Encoding
ƒ Explain that network communication at this layer
consists of individual bits encoded onto the Physical
layer and describe the basic encoding techniques.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Physical Layer Signaling and Encoding
ƒ Describe the role of encoding as it applies to the
transmission of bits and explain the value of treating a
collection of bits as a code.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Physical Layer Signaling and Encoding
ƒ Define the terms bandwidth, throughput, and goodput

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Characteristics & Uses of Network Media
ƒ Identify several media characteristics defined by
Physical layer standards.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Characteristics & Uses of Network Media
ƒ Describe the impact interference has on throughput and
the role of proper cabling in reducing interference

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Characteristics & Uses of Network Media
ƒ Identify the basic characteristics of UTP cable

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Characteristics & Uses of Network Media
ƒ Identify the basic characteristics of STP and Coaxial
cable

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Characteristics & Uses of Network Media
ƒ Identify types of safety issues when working with
copper cabling

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Characteristics & Uses of Network Media
ƒ Identify several primary characteristics of fiber cabling
and its main advantages over other media

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Characteristics & Uses of Network Media
ƒ Describe the role of radio waves when using air as the
media and the increased need for security in wireless
communications

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Characteristics & Uses of Network Media
ƒ Identify the characteristics used to categorize
connectors, describe some common uses for the same
connectors, and identify the consequences for
misapplying a connector in a given situation

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Ethernet

Network Fundamentals – Chapter 9

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Identify the basic characteristics of network media used in
Ethernet.
ƒ Describe the physical and data link features of Ethernet.
ƒ Describe the function and characteristics of the media access
control method used by Ethernet protocol.
ƒ Explain the importance of Layer 2 addressing used for data
transmission and determine how the different types of
addressing impacts network operation and performance.
ƒ Compare and contrast the application and benefits of using
Ethernet switches in a LAN as apposed to using hubs.
ƒ Explain the ARP process.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Characteristics of Network Media used in
Ethernet
ƒ Identify several characteristics of Ethernet in its early
years.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Characteristics of Network Media used in
Ethernet
ƒ Describe the emergence of the LAN switch as a key
innovation for managing collisions on Ethernet-based
networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Characteristics of Network Media used in
Ethernet
ƒ Identify the characteristics of state-of-the-art Ethernet
and describe its utilization of cabling and point-to-point
topography

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Physical and Data Link Features of Ethernet
ƒ Standards and Implementation

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Physical and Data Link Features of Ethernet
ƒ Describe how the Ethernet operates across two layers
of the OSI model

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Physical and Data Link Features of Ethernet
ƒ Logic Link Control – Connecting the Upper Layers

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Physical and Data Link Features of Ethernet
ƒ Media Access Control (MAC)

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Physical and Data Link Features of Ethernet
ƒ Physical Implementations of the Ethernet

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Function and Characteristics of the Media
Access Control Method
ƒ MAC in Ethernet

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Function and Characteristics of the Media
Access Control Method
ƒ Carrier Sense Multiple Access with Collision Detection

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Function and Characteristics of the Media
Access Control Method
ƒ Ethernet Timing

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Layer 2 addressing and its Impact on Network
Operation and Performance
ƒ The Frame – Encapsulating the Packet

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Layer 2 addressing and its Impact on Network
Operation and Performance
ƒ The Ethernet MAC Address

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Layer 2 addressing and its Impact on Network
Operation and Performance
ƒ Hexadecimal Numbering and Addressing

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Layer 2 addressing and its Impact on Network
Operation and Performance
ƒ Another Layer of Addressing

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Layer 2 addressing and its Impact on Network
Operation and Performance
ƒ Ethernet Unicast, Multicast and Broadcast

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Compare and Contrast the Use of Ethernet
Switches versus Hubs in a LAN.
ƒ Legacy Ethernet – Using Hubs

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Compare and Contrast the Use of Ethernet
Switches versus Hubs in a LAN.
ƒ Ethernet – Using Switches

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Compare and Contrast the Use of Ethernet
Switches versus Hubs in a LAN.
ƒ Describe how a switch can eliminate collisions,
backoffs and re- transmissions, the leading factors in
reduced throughput on a hub-based Ethernet network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Explain the Address Resolution Protocol
(ARP) process.
ƒ Mapping IP to MAC Addresses

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Explain the Address Resolution Protocol
(ARP) process.
ƒ ARP – Destinations Outside the Local Network

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Explain the Address Resolution Protocol
(ARP) process.
ƒ ARP – Removing Address Mappings

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Explain the Address Resolution Protocol
(ARP) process.
ƒ ARP Broadcasts - Issues

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Planning and Cabling
Networks

Network Fundamentals – Chapter 10

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Identify the basic network media required to make a LAN
connection.
ƒ Identify the types of connections for intermediate and end device
connections in a LAN.
- Identify the pin out configurations for straight-through and crossover
cables.
- Identify the different cabling types, standards and ports used for
WAN connections.
- Define the role of device management connections when using
Cisco equipment.
ƒ Design an addressing scheme for an inter-network and assign
ranges for hosts, network devices and the router interface.
ƒ Compare and contrast the importance of network designs

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Basic Network Media Required to Make a LAN
Connection.
ƒ Select the appropriate hardware, including the cabling,
to install several computers together in a LAN

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Basic Network Media Required to Make a LAN
Connection.
ƒ To identify some key aspects of the devices they will be
employing in a LAN

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Basic Network Media Required to Make a LAN
Connection.
ƒ Connect two computers with a switch

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Types of Connections in a LAN
ƒ Given a specific network connection, identify the type of
cable required to make the connection

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Types of Connections in a LAN
ƒ Identify the correct cable to use in connecting
intermediate and end devices in a LAN.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Types of Connections in a LAN
ƒ Identify the pinout of the straight-through and cross-
over cables

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Types of Connections in a LAN
ƒ Recognize that a different class of cables is used to
connect WANs, and that the cables, standards and
ports are different than those in use by LANs.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Types of Connections in a LAN
ƒ Define the role of device management connections
when using Cisco equipment.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Design an Addressing Scheme for an Inter-
network.
ƒ Design an address scheme for an internetwork and
assign ranges for hosts, network devices and the router
interface

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Design an Addressing Scheme for an Inter-
network.
ƒ Calculate the address ranges for sub networks

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Importance of Network Designs
ƒ Given a network scenario, develop an appropriate
networking scheme

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Importance of Network Designs
ƒ Determine the total number of hosts in a network,
accounting for present and future requirements

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Importance of Network Designs
ƒ Given a network requirement, determine the optimum
number of sub networks in the larger internetwork.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Importance of Network Designs
ƒ Describe how to count the segments between router
interfaces.

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Summary

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18

You might also like