Download as pdf or txt
Download as pdf or txt
You are on page 1of 212

Chapter 1:

Exploring the Network

Network Basics

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 1: Objectives

Students will be able to:


 Explain how networks affect the way we communicate,
collaborate, and share.
 Explain the basic characteristics of a network that
supports communication in a small to medium-sized
business.
 Explain the topologies and devices used in a small to
medium-sized business network.
 Explain trends in networking that will affect the use of
networks in small to medium-sized business.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 1
1.1 Communicating in a Network-Centric World
1.2 The Network as a Platform
1.3 LANs, WANs, and Internets
1.4 Expanding the Networking
1.5 Summary

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Interconnecting our Lives
Networks in Our Past and Daily Lives

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Interconnecting our Lives
The Global Community

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Interconnecting our Lives
Networking impacts in our daily lives
 Networks Support the Way We Communicate

 Networks Support the Way We Learn

 Networks Support the Way We Work

 Networks Support the Way We Play

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Examples of Today’s Popular Communication Tools

 The existence and broad adoption of the Internet has ushered in new forms of
communication that empower individuals to create information that can be
accessed by a global audience such as:
Instant Messaging
Weblogs (blogs)
Wikis
Podcasting
Collaboration Tools

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Networks Supporting the Way We Learn
 Communication, collaboration, and engagement are fundamental building blocks
of education.
 Robust and reliable networks support and enrich student learning experiences.
 Courses delivered using network or Internet resources are often called online
learning experiences, or e-learning.
 Online courses can contain voice, data, and video, and are available to the
students at any time from any place.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Networks Supporting the Way We Work
 The business networks evolved to enable the transmission of many different
types of information services, including e-mail, video, messaging, and
telephony.
 Today, networks provide a greater integration between related functions and
organizations than was possible in the past.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Networks Supporting the Way We Play

 Describe ways communication over a network supports the


way we play

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Supporting Communication
What is Communication?
Establishing the Rules

 An identified sender and receiver


 Agreed upon method of communicating (face-to-face,
telephone, letter, photograph)
 Common language and grammar
 Speed and timing of delivery
 Confirmation or acknowledgement requirements

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Supporting Communication
Quality of Communication

External factors affecting the success of


communication include:
 The quality of the pathway between the sender and the
recipient
 The number of times the message has to change form
 The number of times the message has to be redirected or
readdressed
 The number of other messages being transmitted
simultaneously on the communication network
 The amount of time allotted for successful communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Supporting Communication
Internal Factors
Internal factors affecting successful communication across the
network include:
 The size of the message
 The complexity of the message
 The importance of the message

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Converged Networks
Traditional Service Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Converged Networks
Planning for the Future

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 End devices
 Intermediary devices
 Network media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Components of a Network
End Devices
Some examples of end devices are:
 Computers (work stations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 TelePresence endpoint
 Security cameras
 Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and barcode
scanners)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
 Network Access Devices (switches, and wireless access
points)
 Internetworking Devices (routers)
 Security Devices (firewalls)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Components of a Network
Network Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Components of a Network
Network Topology Diagrams

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).

Other types of networks include:


 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
LANs and WANs
Local Area Networks (LAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
LANs and WANs
Wide Area Networks (WAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
LANs, WANs, and Internets
The Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
The Internet
Intranet and Extranet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
LANs, WANs, and Internets
Internet Access Technologies

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Connecting to the Internet
Connecting Remote Users to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Connecting to the Internet
Connecting Businesses to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Network Protocols and
Communications

Network Basics

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Protocols
Rules that Govern Communications

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Protocols
Network Protocols
 How the message is formatted or structured
 The process by which networking devices share information
about pathways with other networks
 How and when error and system messages are passed
between devices
 The setup and termination of data transfer sessions

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Protocols
Interaction of Protocols
 Application Protocol – Hypertext Transfer Protocol (HTTP)
 Transport Protocol – Transmission Control Protocol (TCP)
 Internet Protocol – Internet Protocol (IP)
 Network Access Protocols – Data Link & Physical layers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Protocol Suites
Protocol Suites and Industry Standards

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Protocol Suites
TCP/IP Protocol Suite and Communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Network Protocols and Standards
Standards Organizations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Standards Organizations
Open Standards
 The Internet Society (ISOC)
 The Internet Architecture Board (IAB)
 The Internet Engineering Task Force (IETF)
 Institute of Electrical and Electronics Engineers (IEEE)
 The International Organization for Standards (ISO)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Standards Organizations
ISOC, IAB, and IETF

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Standards Organizations
IEEE
 38 societies
 130 journals
 1,300 conferences each year
 1,300 standards and projects
 400,000 members
 160 countries
 IEEE 802.3
 IEEE 802.11

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Standards Organizations
ISO

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Standards Organizations
Other Standards Organization
 The Electronic Industries Alliance (EIA)
 The Telecommunications Industry Association (TIA)
 The International Telecommunications Union –
Telecommunications Standardization Sector (ITU-T)
 The Internet Corporation for Assigned Names and Numbers
(ICANN)
 The Internet Assigned Numbers Authority (IANA)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Reference Models
The Benefits of Using a Layered Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Reference Models
The OSI Reference Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Reference Models
The TCP/IP Reference Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Reference Models
Comparing the OSI and TCP/IP Models

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Data Encapsulation
Protocol Data Units (PDUs)
 Data
 Segment
 Packet
 Frame
 Bits

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Data Encapsulation
Encapsulation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Data Encapsulation
De-encapsulation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Accessing Remote Resources
Using Wireshark to View Network Traffic

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Application Layer

Network Basics

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
4.1 Application Layer Protocols
The Application Layer provides the interface to the network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Application Session and Presentation
OSI and TCP/IP Models Revisited

The key parallels are in the transport and network layer.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Application Session and Presentation
Application Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Application, Session and Presentation
Presentation and Session Layers

Presentation layer has three primary functions:

 Coding and conversion of application layer data


 Compression of the data
 Encryption of the data for transmission and the
decryption of data upon receipt by the destination

Session Layer

 Functions create and maintain dialogs between


source and destination applications
 Handles the exchange of information to initiate
dialogs, keep them active, and to restart sessions

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Application Session and Presentation
Presentation and Session Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Application, Session and Presentation
TCP/IP Application Layer Protocols
Domain Name Service Protocol (DNS) - used to resolve
Internet names to IP addresses

Telnet - a terminal emulation protocol used to provide


remote access to servers and networking devices

Bootstrap Protocol (BOOTP) - a precursor to the DHCP


protocol, a network protocol used to obtain IP address
information during bootup

Dynamic Host Control Protocol (DHCP) - used to assign


an IP address, subnet mask, default gateway and DNS
server to a host

Hypertext Transfer Protocol (HTTP) - used to transfer files


that make up the Web pages of the World Wide Web
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Application, Session and Presentation
TCP/IP Application Layer Protocols
File Transfer Protocol (FTP) - used for interactive file
transfer between systems

Trivial File Transfer Protocol (TFTP) - used for


connectionless active file transfer

Simple Mail Transfer Protocol (SMTP) - used for the


transfer of mail messages and attachments

Post Office Protocol (POP) - used by email clients to


retrieve email from a remote server

Internet Message Access Protocol (IMAP) – another


protocol for email retrieval

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
4.2 Well-Known Application Layer Protocols
and Services

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Everyday Application Layer Protocols
Application Layer Protocols Revisited
Three application layer protocols that are involved in everyday
work or play are:
 Hypertext Transfer Protocol (HTTP)
• browse the web

 Simple Mail Transfer Protocol (SMTP)


• used to enable users to send email

 Post Office Protocol (POP)


• used to enable users to receive email

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Everyday Application Layer Protocols
Hypertext Transfer Protocol / Markup Language
Example
URL: http://www.cisco.com/index.html

 First, the browser interprets the three parts of the URL:


1. http (the protocol or scheme)
2. www.cisco.com (the server name)
3. index.html (the specific file name requested)

 Browser checks with a name server to convert


www.cisco.com into a numeric address
 Using the HTTP protocol requirements sends a GET request
to the server and asks for the file index.html
 Server sends the HTML code for this web page
 Browser deciphers the HTML code and formats the page

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Everyday Application Layer Protocols
HTTP and HTTPS
 Developed to publish
and retrieve HTML
pages
 Used for data transfer
 Specifies a
request/response
protocol
 Three common
message types are
GET, POST, and PUT
 GET is a client
request for data
 POST and PUT are
used to send
messages that upload
data to the web
Presentation_ID
server
© 2008 Cisco Systems, Inc. All rights reserved.60 Cisco Confidential
Everyday Application Layer Protocols
SMTP and POP  Typically use an
application called a Mail
User Agent (email client)
 Allows messages to be
sent
 Places messages that
have been replaced into
the client's mailbox
 SMTP - Send email from
either a client or a server
 POP - Receive email
messages from an email
server
 IMAP - Internet Message
Access Protocol
 Email client provides the
functionality of both
protocols within one
application

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Common Application Layer Protocols
SMTP and POP

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Everyday Application Layer Protocols
SMTP and POP (Continued)
 Operates two
processes: MTA
and MDA
 MTA is used to
forward email
 Addressed to a
user whose
mailbox is on the
local server, mail is
passed to the MDA
 Mail is for a user
not on the local
server, the MTA
routes the email to
the MTA on the
appropriate server

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Everyday Application Layer Protocols
SMTP and POP (Continued)

 MDA accepts a
piece of email from
MTA and performs
the actual delivery
 MDA receives all
the inbound mail
from the MTA and
places it into
mailboxes
 MDA can also
resolve final
delivery issues,
such as virus
scanning,
spam filtering, and
return-receipt
handling

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
Everyday Application Layer Protocols
SMTP and POP (Continued)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
Providing IP Addressing Services
Domain Name Service

A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
Providing IP Addressing Services
Domain Name Service

A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
Providing IP Addressing Services
DNS Message Format
 DNS server stores different types of resource records used
to resolve names
 Contain the name, address, and type of record
 Record types are:
 A - an end device address
 NS - an authoritative name server
 CNAME - the canonical name for an alias; used when
multiple services have the single network address but
each service has its own entry in DNS
 MX - mail exchange record; maps a domain name to a
list of mail exchange servers
 Unable to resolve the name using its stored records,
contacts other servers
 Server temporarily stores the numbered address that
matches the name in cache memory
 Windows ipconfig /displaydns displays all cached DNS
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
Providing IP Addressing Services
DNS Hierarchy
Examples top-
level domains:

.au Australia

.co Colombia

.com business
or industry

.jp Japan

.org non-profit
organization

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
Providing IP Addressing Services
nslookup
 Operating system utility called nslookup allows the user to manually
query the name servers to resolve a given host name
 Utility can be used to troubleshoot name resolution issues and to
verify the current status of the name servers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
Providing IP Addressing Services
Dynamic Host Configuration Protocol
 DHCP allows a host to
obtain an IP address
dynamically
 DHCP server is
contacted and address
requested - chooses
address from a
configured range of
addresses called a pool
and “leases” it to the
host for a set period
 DHCP used for general
purpose hosts such as
end user devices, and
static addressing is
used for network
devices such as
gateways, switches,
servers and printers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
Providing IP Addressing Services
DHCP Operation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
Providing File Sharing Services
File Transfer Protocol
 FTP allow data
transfers between a
client and a server
 FTP client is an
application that runs
on a computer that is
used to push and pull
data from a server
running an FTP
daemon
 To successfully
transfer data, FTP
requires two
connections between
the client and the
server, one for
commands and
replies, the other for
the actual file transfer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73
Transport Layer

Network Fundamentals

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74
5.1 Transport Layer Protocols
5.2 TCP and UDP
5.3 Summary

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75
Objectives
 Explain the need for the transport layer.
 Identify the role of the transport layer as it provides the
end-to-end transfer of data between applications.
 Describe the role of two TCP/IP transport layer protocols:
TCP and UDP.
 Explain the key functions of the transport layer, including
reliability, port addressing, and segmentation.
 Explain how TCP and UDP each handle key functions.
 Identify when it is appropriate to use TCP or UDP and
provide examples of applications that use each protocol

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76
Role of the Transport Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 77
Transportation of Data
Role of the Transport Layer
The Transport Layer is responsible for establishing a temporary
communication session between two applications and delivering data
between them. TCP/IP uses two protocols to achieve this:
 Transmission Control Protocol (TCP)
 User Datagram Protocol (UDP)
Primary Responsibilities of Transport layer Protocols
 Tracking the individual communication between applications on the
source and destination hosts
 Segmenting data for manageability and reassembling segmented
data into streams of application data at the destination
 Identifying the proper application for each communication stream

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 78
Transportation of Data
Conversation Multiplexing
Segmenting the data
 Enables many different
communications, from many
different users, to be
interleaved (multiplexed) on
the same network, at the
same time.
 Provides the means to both
send and receive data when
running multiple applications.
 Header added to each
segment to identify it.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 79
Transportation of Data
Transport Layer Reliability
TCP/IP provides two transport layer protocols, TCP and UDP
Transmission Control Protocol (TCP)
 Provides reliable delivery ensuring that all of the data arrives at the
destination.
 Uses acknowledged delivery and other processes to ensure
delivery.
 Makes larger demands on the network – more overhead.
User Datagram Protocol (UDP)
 Provides just the basic functions for delivery – no reliability.
 Less overhead.
TCP or UDP
 There is a trade-off between the value of reliability and the burden it
places on the network.
 Application developers choose the transport protocol based on the
requirements of their applications.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 80
Introducing TCP and UDP
Introducing TCP

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 81
Introducing TCP and UDP
Introducing TCP
Transmission Control Protocol (TCP)
 RFC 793
 Connection-oriented – creating a session between
source and destination
 Reliable delivery – retransmitting lost or corrupt data
 Ordered data reconstruction – numbering and
sequencing of segments
 Flow control - regulating the amount of data transmitted
 Stateful protocol – keeping track of the session

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 82
Introducing TCP and UDP
Introducing UDP
User Datagram Protocol (UDP)
 RFC 768
 Connectionless
 Unreliable delivery
 No ordered data reconstruction
 No flow control
 Stateless protocol
Applications that use UDP:
 Domain Name System (DNS)
 Video Streaming
 Voice over IP (VoIP)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 83
UDP Communication
UDP Low Overhead vs. Reliability
UDP
 Simple protocol that provides the basic transport layer function
 Used by applications that can tolerate small loss of data
 Used by applications that cannot tolerate delay

Used by
 Domain Name System (DNS)
 Simple Network Management Protocol (SNMP)
 Dynamic Host Configuration Protocol (DHCP)
 Trivial File Transfer Protocol (TFTP)
 IP telephony or Voice over IP (VoIP)
 Online games

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 84
Introducing TCP and UDP
Separating Multiple Communications
Port Numbers are used by TCP and UDP to differentiate between
applications.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 85
Introducing TCP and UDP
TCP and UDP Port Addressing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 86
Introducing TCP and UDP
TCP and UDP Port Addressing
Netstat
 Used to examine TCP connections that are open and
running on a networked host

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 87
TCP communication
TCP Reliability – Ordered Delivery
Sequence numbers used to reassemble segments into
original order

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 88
Protocol Data Units
TCP Flow Control – Congestion Avoidance
Using Dynamic Window Sizes

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89
UDP Communication
Datagram Reassembly

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 90
TCP or UDP
Applications that use TCP

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 91
TCP or UDP
Applications that use UDP

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 92
Network Layer

Network Basics

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 93
Chapter 6: Objectives

Students will be able to:


 Explain how network layer protocols and services
support communications across data networks.
 Explain how routers enable end-to-end connectivity in a
small to medium-sized business network.
 Determine the appropriate device to route traffic in a
small to medium-sized business network.
 Configure a router with basic configurations.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 94
Chapter 6
6.1 Network Layer Protocols
6.2 Routing
6.3 Routers
6.4 Configuring a Cisco Router
6.5 Summary

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 95
Network Layer
Network Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 96
Network Layer Protocols
Network Layer in Communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 97
Network Layer in Communication
The Network Layer
End to End Transport processes
 Addressing end devices
 Encapsulation
 Routing
 De-encapsulating

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 98
Network Layer in Communication
Network Layer Protocols
Common Network Layer Protocols
 Internet Protocol version 4 (IPv4)
 Internet Protocol version 6 (IPv6)

Legacy Network Layer Protocols


 Novell Internetwork Packet Exchange (IPX)
 AppleTalk
 Connectionless Network Service (CLNS/DECNet)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 99
Characteristics of the IP protocol
Characteristics of IP

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 100
Characteristics of the IP protocol
IP - Connectionless

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 101
Characteristics of the IP protocol
IP – Best Effort Delivery

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 102
Characteristics of the IP protocol
IP – Media Independent

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 103
IPv4 Packet
Encapsulating IP

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 104
IPv4 Packet
IPv4 Packet Header
Version, Differentiated Services (DS), Time-to-Live
(TTL),Protocol, Source IP Address, Destination IP Address
Byte 1 Byte 2 Byte 3 Byte 4

IP Header Differentiated Services


Version Total Length
Length
DSCP ECN

Identification Flag Fragment Offset

Time To Live Protocol Header Checksum

Source IP Address

Destination IP Address

Options (optional)
Padding

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 105
IPv4 Packet
IPv4 Header Fields
Internet Header Length (IHL), Total Length, Header Checksum,
Identification, Flags, Fragment Offset
Byte 1 Byte 2 Byte 3 Byte 4

IP Header Differentiated Services


Version Total Length
Length
DSCP ECN

Identification Flag Fragment Offset

Time To Live Protocol Header Checksum

Source IP Address

Destination IP Address

Options (optional)
Padding

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 106
IPv4 Packet
Sample IPv4 Headers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 107
Network Layer in Communication
Introducing IPv6
 Increased address space
 Improved packet handling
 Eliminates the need for NAT
 Integrated security

 4 billion IPv4 addresses


4,000,000,000
 340 undecillion IPv6 addresses
340,000,000,000,000,000,000,000,000,000,000,000,000

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 108
IPv6 Packet
Encapsulating IPv6

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 109
IPv6 Packet
IPv6 Packet Header
Byte 1 Byte 2 Byte 3 Byte 4

Version Traffic Class Flow Label

Next
Payload Length Hop Limit
Header

Source IP Address

Destination IP Address

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 110
Routers
Anatomy of a Router

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 111
Anatomy of a Router
A Router is a Computer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 112
Anatomy of a Router
Router CPU and OS

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 113
Anatomy of a Router
Router Memory

Volatile /
Memory Stores
Non-Volatile
• Running IOS
• Running configuration file
RAM Volatile
• IP routing and ARP tables
• Packet buffer
• Bootup instructions
ROM Non-Volatile • Basic diagnostic software
• Limited IOS
NVRAM Non-Volatile • Startup configuration file
• IOS
Flash Non-Volatile
• Other system files

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 114
Anatomy of a Router
Inside a Router

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 115
Anatomy of a Router
Router Backplane

Double-wide eHWIC slots eHWIC 0 AUX LAN


port interfaces

Console
RJ45 USB
Ports
Two 4 GB flash card slots Console
USB Type B

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 116
Anatomy of a Router
Connecting to a Router

WAN AUX LAN


Interface port interfaces

Console
RJ45

Console
USB Type B

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 117
Anatomy of a Router
LAN and WAN Interfaces

Serial interfaces

LAN interfaces

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 118
Router Boot-up
Cisco IOS

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 119
Router Boot-up
Bootset Files

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 120
Router Boot-up
Router Bootup Process

1.Perform the POST


and load the
bootstrap program

2.Locate and load the


Cisco IOS software

3.Locate and load the


startup configuration
file or enter setup
mode

System Bootstrap, Version 15.0(1r)M15, RELEASE SOFTWARE (fc1)


Technical Support: http://www.cisco.com/techsupport

<output omitted>

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 121
Router Boot-up
Show Versions Output
Router# show version
Cisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M), Version 15.2(4)M1, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Thu 26-Jul-12 19:34 by prod_rel_team

ROM: System Bootstrap, Version 15.0(1r)M15, RELEASE SOFTWARE (fc1)

Router uptime is 10 hours, 9 minutes


System returned to ROM by power-on
System image file is "flash0:c1900-universalk9-mz.SPA.152-4.M1.bin"
Last reload type: Normal Reload
Last reload reason: power-on

<Output omitted>

Cisco CISCO1941/K9 (revision 1.0) with 446464K/77824K bytes of memory.


Processor board ID FTX1636848Z
2 Gigabit Ethernet interfaces
2 Serial(sync/async) interfaces
1 terminal line
DRAM configuration is 64 bits wide with parity disabled.
255K bytes of non-volatile configuration memory.
250880K bytes of ATA System CompactFlash 0 (Read/Write)

<Output omitted>

Technology Package License Information for Module:'c1900'

-----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
ipbase ipbasek9 Permanent ipbasek9
security None None None
data None None None

Configuration register is 0x2142 (will be 0x2102 at next reload)

Router#

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 122
Network Layer
Configuring a Cisco Router

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 123
Configure Initial Settings
Router Configuration Steps
192.168.10.0/24 10.1.1.0/24
.10 G0/0 .10
PC1 .1
209.165.200.224 /30
.1
.225 .226
R1 S0/0/0 R2
.10 .1 .1 .10
PC2 G0/1

192.168.11.0/24 10.1.2.0/24

Router> enable Router> en


Router# configure terminal Router# conf t
Enter configuration commands, one per line. Enter configuration commands, one per line.
End with CNTL/Z. End with CNTL/Z.
Router(config)# hostname R1 OR Router(config)# ho R1
R1(config)# R2(config)#

R1(config)# enable secret class R1(config)# banner motd #


R1(config)# Enter TEXT message. End with the character '#'.
R1(config)# line console 0 ***********************************************
R1(config-line)# password cisco WARNING: Unauthorized access is prohibited!
R1(config-line)# login ***********************************************
R1(config-line)# exit #
R1(config)#
R1(config)# line vty 0 4 R1(config)#
R1(config-line)# password cisco
R1(config-line)# login
R1(config-line)# exit
R1(config)# R1# copy running-config startup-config
R1(config)# service password-encryption Destination filename [startup-config]?
R1(config)# Building configuration...
[OK]
R1#
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 124
Configure Interfaces
Configure LAN Interfaces
192.168.10.0/24 10.1.1.0/24
.10 G0/0 .10
PC1 .1
209.165.200.224 /30
.1
.225 .226
R1 S0/0/0 R2
.10 .1 .1 .10
PC2 G0/1

192.168.11.0/24 10.1.2.0/24

R1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#
R1(config)# interface gigabitethernet 0/0
R1(config-if)# ip address 192.168.10.1 255.255.255.0
R1(config-if)# description Link to LAN-10
R1(config-if)# no shutdown
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0,
changed state to up
R1(config-if)# exit
R1(config)#
R1(config)# int g0/1
R1(config-if)# ip add 192.168.11.1 255.255.255.0
R1(config-if)# des Link to LAN-11
R1(config-if)# no shut
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1,
changed state to up
R1(config-if)# exit
R1(config)#

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 125
Configure Interfaces
Verify Interface Configuration
192.168.10.0/24 10.1.1.0/24
.10 G0/0 .10
PC1 .1
209.165.200.224 /30
.1
.225 .226
R1 S0/0/0 R2
.10 .1 .1 .10
PC2 G0/1

192.168.11.0/24 10.1.2.0/24

R1# show ip interface brief


Interface IP-Address OK? Method Status Protocol

GigabitEthernet0/0 192.168.10.1 YES manual up up


GigabitEthernet0/1 192.168.11.1 YES manual up up
Serial0/0/0 209.165.200.225 YES manual up up
Serial0/0/1 unassigned YES NVRAM administratively down down
Vlan1 unassigned YES NVRAM administratively down down
R1#
R1# ping 209.165.200.226

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 209.165.200.226, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/9 ms

R1#

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 126
Configuring a Cisco Router
Configuring the Default Gateway

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 127
Configuring the Default Gateway
Default Gateway on a Host
.10
PC1 192.168.10.0/24
.1
.10 G0/0
PC2

R1
G0/1
.1

.10
.10 PC1 192.168.10.0/24
PC3
.1
.11 G0/0
.10 192.168.11.0/24 PC2
PC4
R1
G0/1
.1

.10
PC3

.11 192.168.11.0/24
PC4

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 128
Configuring the Default Gateway
Default Gateway on a Switch
S1#show running-config
Building configuration...
!
<output omitted>
service password-encryption
!
hostname S1
!
Interface Vlan1
ip address 192.168.10.50
!
ip default-gateway 192.168.10.1
<output omitted>

.10
PC1 192.168.10.0/24 192.168.11.0/24
.1 .1
S1 G0/0 G0/1 S2
.11 R1
PC2 .50

If the default gateway were not configured on S1, response


packets from S1 would not be able to reach the
administrator at 192.168.11.10. The administrator would not
be able to mange the device remotely.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 129
Ethernet

Network Basics

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 130
Objectives
Upon completion of this chapter you will be able to:
 Describe the operation of the Ethernet sublayers.
 Identify the major fields of the Ethernet frame.
 Describe the purpose and characteristics of the Ethernet MAC address.
 Compare the roles of the MAC address and the IP address.
 Describe the purpose of ARP.
 Explain how ARP requests impact network and host performance.
 Explain basic switching concepts.
 Compare fixed configuration and modular switches.
 Configure a Layer 3 switch.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 131
Chapter 10
10.0 Introduction
10.1 Ethernet Protocol
10.2 Address Resolution Protocol
10.3 LAN Switches
10.4 Summary

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 132
10.1
Ethernet Protocol

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 133
Ethernet Operation
LLC and MAC Sublayers
Ethernet –
 One of the most widely used LAN technologies
 Operates in the data link layer and the physical layer
 Family of networking technologies that are defined in the IEEE 802.2
and 802.3 standards
 Supports data bandwidths of 10, 100, 1000, 10,000, 40,000, and
100,000 Mbps (100 Gbps)

Ethernet standards –
 Define Layer 2 protocols and Layer 1 technologies
 Two separate sub layers of the data link layer to operate - Logical
link control (LLC) and the MAC sublayers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 134
Ethernet Operation
LLC and MAC Sublayers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 135
Ethernet Operation
LLC and MAC Sublayers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 136
Ethernet Operation
LLC and MAC Sublayers
LLC
 Handles communication between upper and lower layers
 Takes the network protocol data and adds control
information to help deliver the packet to the destination
MAC
 Constitutes the lower sublayer of the data link layer
 Implemented by hardware, typically in the computer NIC
 Two primary responsibilities:
• Data encapsulation
• Media access control

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 137
Ethernet Operation
MAC Sublayer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 138
Ethernet Operation
MAC Sublayer
Data encapsulation
 Frame assembly before transmission and frame disassembly upon
reception of a frame
 MAC layer adds a header and trailer to the network layer PDU

Provides three primary functions:


 Frame delimiting – identifies a group of bits that make up a frame,
synchronization between the transmitting and receiving nodes
 Addressing – each Ethernet header added in the frame contains the
physical address (MAC address) that enables a frame to be delivered
to a destination node
 Error detection - each Ethernet frame contains a trailer with a cyclic
redundancy check (CRC) of the frame contents

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 139
Ethernet Operation
MAC Sublayer
Media Access Control
 Responsible for the placement of frames on the media and the
removal of frames from the media
 Communicates directly with the physical layer
 If multiple devices on a single medium attempt to forward data
simultaneously, the data will collide resulting in corrupted, unusable
data
 Ethernet provides a method for controlling how the nodes share
access through the use a Carrier Sense Multiple Access (CSMA)
technology

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 140
Ethernet Operation
Media Access Control
Carrier Sense Multiple Access (CSMA) process
 Used to first detect if the media is carrying a signal
 If no carrier signal is detected, the device transmits its data
 If two devices transmit at the same time - data collision

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 141
Ethernet Operation
Media Access Control

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 142
Ethernet Operation
Media Access Control
The two commonly used methods are:
CSMA/Collision Detection
 The device monitors the media for the presence of a data signal
 If a data signal is absent, indicating that the media is free, the device
transmits the data
 If signals are then detected that show another device was transmitting
at the same time, all devices stop sending and try again later
 While Ethernet networks are designed with CSMA/CD technology, with
today’s intermediate devices, collisions do not occur and the processes
utilized by CSMA/CD are really unnecessary
 Wireless connections in a LAN environment still have to take collisions
into account

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 143
Ethernet Operation
Media Access Control
The two commonly used methods are:
CSMA/Collision Avoidance (CSMA/CA) media access
method
 Device examines the media for the presence of data signal-
if the media is free, the device sends a notification across
the media of its intent to use it
 The device then sends the data.
 Used by 802.11 wireless networking technologies

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 144
Ethernet Operation
Media Access Control

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 145
Ethernet Operation
MAC Address: Ethernet Identity
 Layer 2 Ethernet MAC address is a 48-bit binary value
expressed as 12 hexadecimal digits
 IEEE requires a vendor to follow two simple rules:
• Must use that vendor's assigned OUI as the first 3 bytes
• All MAC addresses with the same OUI must be
assigned a unique value in the last 3 bytes

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 146
Ethernet Operation
Frame Processing

 MAC addresses assigned to workstations, servers, printers, switches,


and routers
 Example MACs: 00-05-9A-3C-78-00, 00:05:9A:3C:78:00, or
0005.9A3C.7800.
 Forwarded message to an Ethernet network, attaches header
information to the packet, contains the source and destination MAC
address
 Each NIC views information to see if the destination MAC address in
the frame matches the device’s physical MAC address stored in RAM
 No match, the device discards the frame
 Matches the destination MAC of the frame, the NIC passes the frame
up the OSI layers, where the decapsulation process takes place

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 147
Ethernet Frame Attributes
Ethernet Encapsulation

 Early versions of Ethernet were relatively slow at 10 Mbps


 Now operate at 10 Gigabits per second and faster
 Ethernet frame structure adds headers and trailers around the Layer 3
PDU to encapsulate the message being sent

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 148
Ethernet Frame Attributes
Ethernet Frame Size

 Ethernet II and IEEE 802.3 standards define the minimum


frame size as 64 bytes and the maximum as 1518 bytes
 Less than 64 bytes in length is considered a "collision
fragment" or "runt frame”
 If size of a transmitted frame is less than the minimum or
greater than the maximum, the receiving device drops the
frame
 At the physical layer, different versions of Ethernet vary in
their method for detecting and placing data on the media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 149
Ethernet Frame Attributes
Ethernet Frame Size

The figure displays the fields contained in the


802.1Q VLAN tag
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 150
Ethernet Frame Attributes
Introduction to the Ethernet Frame

Preamble and Length/Type Data and


Start Frame Field Pad Fields
Delimiter Fields Defines the exact Contain the
Used for length of the encapsulated
synchronization frame's data field/ data from a
between the describes which higher layer,
sending and protocol is an IPv4
receiving devices implemented packet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 151
Ethernet Frame Attributes
Introduction to the Ethernet Frame

Frame Check Sequence Field


Used to detect errors in a frame
with cyclic redundancy check, if
calculations match at source and
receiver, no error occurred.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 152
Ethernet MAC
MAC Addresses and Hexadecimal

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 153
Ethernet MAC
MAC Address Representations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 154
Ethernet MAC
Unicast MAC Address

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 155
Ethernet MAC
Broadcast MAC Address

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 156
Ethernet MAC
Multicast MAC Address

Multicast MAC address is a


Range of IPV4 multicast addresses
special value that begins with
is 224.0.0.0 to 239.255.255.255
01-00-5E in hexadecimal

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 157
MAC and IP
MAC and IP
MAC address
 This address does not change
 Similar to the name of a person
 Known as physical address because physically assigned to the host NIC

IP address
 Similar to the address of a person
 Based on where the host is actually located
 Known as a logical address because assigned logically
 Assigned to each host by a network administrator

Both the physical MAC and logical IP addresses are required for a
computer to communicate just like both the name and address of a person
are required to send a letter
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 158
Ethernet MAC
End-to-End Connectivity, MAC, and IP

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 159
10.2
Address Resolution Protocol

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 160
ARP
Introduction to ARP
ARP Purpose –
 Sending node needs a way to find the MAC address of the
destination for a given Ethernet link
ARP protocol provides two basic functions:
 Resolving IPv4 addresses to MAC addresses
 Maintaining a table of mappings

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 161
ARP
ARP Functions/Operation
ARP Table –
 Used to find the data link layer address that is mapped to the
destination IPv4 address
 As a node receives frames from the media, it records the source IP
and MAC address as a mapping in the ARP table

ARP request –
 Layer 2 broadcast to all devices on the Ethernet LAN
 The node that matches the IP address in the broadcast will reply
 If no device responds to the ARP request, the packet is dropped
because a frame cannot be created

Static map entries can be entered in an ARP table, but


this is rarely done
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 162
ARP
ARP Functions/Operation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 163
ARP
ARP Functions/Operation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 164
ARP
ARP Functions/Operation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 165
ARP
ARP Functions/Operation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 166
ARP
ARP Functions/Operation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 167
ARP
ARP Role in Remote Communication
 If the destination IPv4 host is on the local network, the
frame will use the MAC address of this device as the
destination MAC address

 If the destination IPv4 host is not on the local network, the


source uses the ARP process to determine a MAC address
for the router interface serving as the gateway

 In the event that the gateway entry is not in the table, an


ARP request is used to retrieve the MAC address
associated with the IP address of the router interface

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 168
ARP
Removing Entries from an ARP Table

 ARP cache timer removes ARP entries that have not been
used for a specified period of time

 Commands may also be used to manually remove all or


some of the entries in the ARP table

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 169
ARP
ARP Tables on Networking Devices

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 170
Network Access
Physical Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 171
Purpose of the Physical Layer
The Physical Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 172
Purpose of the Physical Layer
Physical Layer Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 173
Purpose of the Physical Layer
Physical Layer Standards

Standard
Networking Standards
organization
• ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45)
ISO • ISO 11801: Network cabling standard similar to EIA/TIA 568.

• TIA-568-C: Telecommunications cabling standards, used by nearly all


voice, video and data networks.
• TIA-569-B: Commercial Building Standards for Telecommunications
EIA/TIA Pathways and Spaces
• TIA-598-C: Fiber optic color coding
• TIA-942: Telecommunications Infrastructure Standard for Data Centers

ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA

ITU-T • G.992: ADSL

• 802.3: Ethernet
IEEE • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification)
• 802.15: Bluetooth

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 174
Characteristics of the Physical Layer
Physical Layer Functions

Physical Frame Encoding Signalling


Media
Components Technique Method
• UTP • Manchester Encoding • Changes in the
• Coaxial • Non-Return to Zero (NRZ) electromagnetic field
• Connectors techniques • Intensity of the
Copper • NICs • 4B/5B codes are used with electromagnetic field
cable • Ports Multi-Level Transition Level 3 • Phase of the
• Interfaces (MLT-3) signaling electromagnetic wave
• 8B/10B
• PAM5
• Single-mode Fiber • Pulses of light • A pulse equals 1.
• Multimode Fiber • Wavelength multiplexing using • No pulse is 0.
• Connectors different colors
Fiber Optic
• NICs
cable • Interfaces
• Lasers and LEDs
• Photoreceptors
• Access Points • DSSS (direct-sequence spread- • Radio waves
Wireless • NICs spectrum)
media • Radio • OFDM (orthogonal frequency
• Antennae division multiplexing)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 175
Characteristics of the Physical Layer
Physical Components

SHDSL Management Gigabit Ethernet


Interface Ports Interfaces

USB Type A
Connector

FastEthernet USB Mini-B


Switch ports Connector

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 176
Characteristics of the Physical Layer
Frame Encoding Techniques
 Manchester encoding
 Non-Return to Zero (NRZ)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 177
Characteristics of the Physical Layer
Signaling Method
Asynchronous
Bursty data Signal

Arbitrary gap of time

Synchronous
Signal
Data transitions align with bit time slots

Bit time slot

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 178
Characteristics of the Physical Layer
Signaling Method

Amplitude modulation

Frequency modulation

Phase modulation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 179
Characteristics of the Physical Layer
Signaling Method

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 180
Characteristics of the Physical Layer
Bandwidth

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 181
Characteristics of the Physical Layer
Throughput

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 182
Network Media
Copper Cabling

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 183
Copper Cabling
Characteristics of Copper Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 184
Copper Cabling
Copper Media

Unshielded Twisted Pair (UTP) cable Shielded Twisted Pair (STP) cable

Coaxial cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 185
Copper Cabling
Unshielded Twisted-Pair (UTP) Cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 186
Copper Cabling
Shielded Twisted-Pair (STP) Cable

Braided or Foil Shield

Foil Shields

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 187
Copper Cabling
Coaxial Cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 188
Copper Cabling
Cooper Media Safety

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 189
UTP Cabling
Properties of UTP Cabling

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 190
UTP Cabling
UTP Cabling Standards

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 191
UTP Cabling
UTP Connectors

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 192
UTP Cabling
Types of UTP Cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 193
UTP Cabling
LAN Cabling Areas

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 194
UTP Cabling
Testing UTP Cables

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 195
Fiber Optic Cabling
Properties of Fiber Optic Cabling

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 196
Fiber Optic Cabling
Fiber Media Cable Design

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 197
Fiber Optic Cabling
Types of Fiber Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 198
Fiber Optic Cabling
Network Fiber Connectors

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 199
Fiber Optic Cabling
Testing Fiber Cables

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 200
Fiber Optic Cabling
Fiber versus Copper
Implementation issues Copper media Fibre-optic

Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps

Relatively short Relatively High


Distance (1 – 100 meters) (1 – 100,000 meters)

High
Immunity to EMI and RFI Low
(Completely immune)

High
Immunity to electrical hazards Low
(Completely immune)

Media and connector costs Lowest Highest

Installation skills required Lowest Highest

Safety precautions Lowest Highest

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 201
Network Media
Wireless Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 202
Wireless Media
Properties of Wireless Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 203
Wireless Media
Types of Wireless Media
• IEEE 802.11 standards
• Commonly referred to as Wi-Fi.
• Uses CSMA/CA
• Variations include:
• 802.11a: 54 Mbps, 5 GHz
• 802.11b: 11 Mbps, 2.4 GHz
• 802.11g: 54 Mbps, 2.4 GHz
• 802.11n: 600 Mbps, 2.4 and 5 GHz
• 802.11ac: 1 Gbps, 5 GHz
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz

• IEEE 802.15 standard


• Supports speeds up to 3 Mbps
• Provides device pairing over distances from 1 to
100 meters.

• IEEE 802.16 standard


• Provides speeds up to 1 Gbps
• Uses a point-to-multipoint topology to provide
wireless broadband access.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 204
Wireless Media
Wireless LAN

Cisco Linksys EA6500 802.11ac wireless router


Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 205
Wireless Media
802.11 Wi-Fi Standards

Maximum Backwards
Standard Frequency
Speed compatible

802.11a 54 Mbps 5 GHz No

802.11b 11 Mbps 2.4 GHz No

802.11g 54 Mbps 2.4 GHz 802.11b

802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g

1.3 Gbps 2.4 GHz and 5.5


802.11ac (1300 Mbps) GHz
802.11b/g/n

7 Gbps 2.4 GHz, 5 GHz and


802.11ad (7000 Mbps) 60 GHz
802.11b/g/n/ac

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 206
Network Access
Summary
In this chapter, you learned:
 The TCP/IP network access layer is the equivalent of the OSI
data link layer (Layer 2) and the physical layer (Layer 1).
 The data link layer is responsible for the exchange of frames
between nodes over a physical network media.
 Among the different implementations of the data link layer
protocols, there are different methods of controlling access to
the media.
 The actual media access control method used depends on
the topology and media sharing.
 LAN and WAN topologies can be physical or logical.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 207
Network Access
Summary
In this chapter, you learned:
 It is the logical topology that influences the type of network
framing and media access control used.
 WANs are commonly interconnected using the point-to-point,
hub and spoke, or mesh physical topologies.
 In shared media LANs, end devices can be interconnected
using the star, bus, ring, or extended star (hybrid) physical
topologies.
 All data link layer protocols encapsulate the Layer 3 PDU
within the data field of the frame.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 208
Network Access
Summary
In this chapter, you learned:
 The OSI physical layer provides the means to transport the
bits that make up a data link layer frame across the network
media.
 Hardware components such as network adapters (NICs),
interfaces and connectors, cable materials, and cable
designs are all specified in standards associated with the
physical layer.
 The physical layer standards address three functional areas:
physical components, frame encoding technique, and
signaling method.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 209
Network Access
Summary
In this chapter, you learned:
 Using the proper media is an important part of network
communications.
 Wired communication consists of copper media and fiber
cable.
 There are three main types of copper media used in
networking: unshielded-twisted pair (UTP), shielded-twisted
pair (STP), and coaxial cable. UTP cabling is the most
common copper networking media.
 Optical fiber cable has become very popular for
interconnecting infrastructure network devices.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 210
Network Access
Summary
In this chapter, you learned:
 Wireless media carry electromagnetic signals that represent
the binary digits of data communications using radio or
microwave frequencies.
 The number of wireless enabled devices continues to
increase.
 Wireless has become the medium of choice for home
networks and is quickly gaining in popularity in enterprise
networks.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 211
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 212

You might also like