Professional Documents
Culture Documents
NB_instructorPPT_Chapter1 - Copy
NB_instructorPPT_Chapter1 - Copy
Network Basics
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 1: Objectives
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 1
1.1 Communicating in a Network-Centric World
1.2 The Network as a Platform
1.3 LANs, WANs, and Internets
1.4 Expanding the Networking
1.5 Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Interconnecting our Lives
Networks in Our Past and Daily Lives
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Interconnecting our Lives
The Global Community
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Interconnecting our Lives
Networking impacts in our daily lives
Networks Support the Way We Communicate
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Examples of Today’s Popular Communication Tools
The existence and broad adoption of the Internet has ushered in new forms of
communication that empower individuals to create information that can be
accessed by a global audience such as:
Instant Messaging
Weblogs (blogs)
Wikis
Podcasting
Collaboration Tools
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Networks Supporting the Way We Learn
Communication, collaboration, and engagement are fundamental building blocks
of education.
Robust and reliable networks support and enrich student learning experiences.
Courses delivered using network or Internet resources are often called online
learning experiences, or e-learning.
Online courses can contain voice, data, and video, and are available to the
students at any time from any place.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Networks Supporting the Way We Work
The business networks evolved to enable the transmission of many different
types of information services, including e-mail, video, messaging, and
telephony.
Today, networks provide a greater integration between related functions and
organizations than was possible in the past.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Networks Supporting the Way We Play
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Supporting Communication
What is Communication?
Establishing the Rules
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Supporting Communication
Quality of Communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Supporting Communication
Internal Factors
Internal factors affecting successful communication across the
network include:
The size of the message
The complexity of the message
The importance of the message
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Converged Networks
Traditional Service Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Converged Networks
Planning for the Future
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
End devices
Intermediary devices
Network media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Components of a Network
End Devices
Some examples of end devices are:
Computers (work stations, laptops, file servers, web servers)
Network printers
VoIP phones
TelePresence endpoint
Security cameras
Mobile handheld devices (such as smartphones, tablets,
PDAs, and wireless debit / credit card readers and barcode
scanners)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Components of a Network
Network Infrastructure Devices
Examples of intermediary network devices are:
Network Access Devices (switches, and wireless access
points)
Internetworking Devices (routers)
Security Devices (firewalls)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Components of a Network
Network Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Components of a Network
Network Topology Diagrams
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
LANs and WANs
Local Area Networks (LAN)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
LANs and WANs
Wide Area Networks (WAN)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
LANs, WANs, and Internets
The Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
The Internet
Intranet and Extranet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
LANs, WANs, and Internets
Internet Access Technologies
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Connecting to the Internet
Connecting Remote Users to the Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Connecting to the Internet
Connecting Businesses to the Internet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Network Protocols and
Communications
Network Basics
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Protocols
Rules that Govern Communications
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Protocols
Network Protocols
How the message is formatted or structured
The process by which networking devices share information
about pathways with other networks
How and when error and system messages are passed
between devices
The setup and termination of data transfer sessions
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Protocols
Interaction of Protocols
Application Protocol – Hypertext Transfer Protocol (HTTP)
Transport Protocol – Transmission Control Protocol (TCP)
Internet Protocol – Internet Protocol (IP)
Network Access Protocols – Data Link & Physical layers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Protocol Suites
Protocol Suites and Industry Standards
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Protocol Suites
TCP/IP Protocol Suite and Communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Network Protocols and Standards
Standards Organizations
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Standards Organizations
Open Standards
The Internet Society (ISOC)
The Internet Architecture Board (IAB)
The Internet Engineering Task Force (IETF)
Institute of Electrical and Electronics Engineers (IEEE)
The International Organization for Standards (ISO)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Standards Organizations
ISOC, IAB, and IETF
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Standards Organizations
IEEE
38 societies
130 journals
1,300 conferences each year
1,300 standards and projects
400,000 members
160 countries
IEEE 802.3
IEEE 802.11
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Standards Organizations
ISO
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Standards Organizations
Other Standards Organization
The Electronic Industries Alliance (EIA)
The Telecommunications Industry Association (TIA)
The International Telecommunications Union –
Telecommunications Standardization Sector (ITU-T)
The Internet Corporation for Assigned Names and Numbers
(ICANN)
The Internet Assigned Numbers Authority (IANA)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Reference Models
The Benefits of Using a Layered Model
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Reference Models
The OSI Reference Model
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Reference Models
The TCP/IP Reference Model
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Reference Models
Comparing the OSI and TCP/IP Models
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Data Encapsulation
Protocol Data Units (PDUs)
Data
Segment
Packet
Frame
Bits
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Data Encapsulation
Encapsulation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Data Encapsulation
De-encapsulation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Accessing Remote Resources
Using Wireshark to View Network Traffic
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Application Layer
Network Basics
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
4.1 Application Layer Protocols
The Application Layer provides the interface to the network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Application Session and Presentation
OSI and TCP/IP Models Revisited
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Application Session and Presentation
Application Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Application, Session and Presentation
Presentation and Session Layers
Session Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Application Session and Presentation
Presentation and Session Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Application, Session and Presentation
TCP/IP Application Layer Protocols
Domain Name Service Protocol (DNS) - used to resolve
Internet names to IP addresses
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
4.2 Well-Known Application Layer Protocols
and Services
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Everyday Application Layer Protocols
Application Layer Protocols Revisited
Three application layer protocols that are involved in everyday
work or play are:
Hypertext Transfer Protocol (HTTP)
• browse the web
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Everyday Application Layer Protocols
Hypertext Transfer Protocol / Markup Language
Example
URL: http://www.cisco.com/index.html
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Everyday Application Layer Protocols
HTTP and HTTPS
Developed to publish
and retrieve HTML
pages
Used for data transfer
Specifies a
request/response
protocol
Three common
message types are
GET, POST, and PUT
GET is a client
request for data
POST and PUT are
used to send
messages that upload
data to the web
Presentation_ID
server
© 2008 Cisco Systems, Inc. All rights reserved.60 Cisco Confidential
Everyday Application Layer Protocols
SMTP and POP Typically use an
application called a Mail
User Agent (email client)
Allows messages to be
sent
Places messages that
have been replaced into
the client's mailbox
SMTP - Send email from
either a client or a server
POP - Receive email
messages from an email
server
IMAP - Internet Message
Access Protocol
Email client provides the
functionality of both
protocols within one
application
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Common Application Layer Protocols
SMTP and POP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Everyday Application Layer Protocols
SMTP and POP (Continued)
Operates two
processes: MTA
and MDA
MTA is used to
forward email
Addressed to a
user whose
mailbox is on the
local server, mail is
passed to the MDA
Mail is for a user
not on the local
server, the MTA
routes the email to
the MTA on the
appropriate server
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Everyday Application Layer Protocols
SMTP and POP (Continued)
MDA accepts a
piece of email from
MTA and performs
the actual delivery
MDA receives all
the inbound mail
from the MTA and
places it into
mailboxes
MDA can also
resolve final
delivery issues,
such as virus
scanning,
spam filtering, and
return-receipt
handling
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
Everyday Application Layer Protocols
SMTP and POP (Continued)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
Providing IP Addressing Services
Domain Name Service
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
Providing IP Addressing Services
Domain Name Service
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
Providing IP Addressing Services
DNS Message Format
DNS server stores different types of resource records used
to resolve names
Contain the name, address, and type of record
Record types are:
A - an end device address
NS - an authoritative name server
CNAME - the canonical name for an alias; used when
multiple services have the single network address but
each service has its own entry in DNS
MX - mail exchange record; maps a domain name to a
list of mail exchange servers
Unable to resolve the name using its stored records,
contacts other servers
Server temporarily stores the numbered address that
matches the name in cache memory
Windows ipconfig /displaydns displays all cached DNS
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
Providing IP Addressing Services
DNS Hierarchy
Examples top-
level domains:
.au Australia
.co Colombia
.com business
or industry
.jp Japan
.org non-profit
organization
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
Providing IP Addressing Services
nslookup
Operating system utility called nslookup allows the user to manually
query the name servers to resolve a given host name
Utility can be used to troubleshoot name resolution issues and to
verify the current status of the name servers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
Providing IP Addressing Services
Dynamic Host Configuration Protocol
DHCP allows a host to
obtain an IP address
dynamically
DHCP server is
contacted and address
requested - chooses
address from a
configured range of
addresses called a pool
and “leases” it to the
host for a set period
DHCP used for general
purpose hosts such as
end user devices, and
static addressing is
used for network
devices such as
gateways, switches,
servers and printers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
Providing IP Addressing Services
DHCP Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
Providing File Sharing Services
File Transfer Protocol
FTP allow data
transfers between a
client and a server
FTP client is an
application that runs
on a computer that is
used to push and pull
data from a server
running an FTP
daemon
To successfully
transfer data, FTP
requires two
connections between
the client and the
server, one for
commands and
replies, the other for
the actual file transfer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73
Transport Layer
Network Fundamentals
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74
5.1 Transport Layer Protocols
5.2 TCP and UDP
5.3 Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75
Objectives
Explain the need for the transport layer.
Identify the role of the transport layer as it provides the
end-to-end transfer of data between applications.
Describe the role of two TCP/IP transport layer protocols:
TCP and UDP.
Explain the key functions of the transport layer, including
reliability, port addressing, and segmentation.
Explain how TCP and UDP each handle key functions.
Identify when it is appropriate to use TCP or UDP and
provide examples of applications that use each protocol
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76
Role of the Transport Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 77
Transportation of Data
Role of the Transport Layer
The Transport Layer is responsible for establishing a temporary
communication session between two applications and delivering data
between them. TCP/IP uses two protocols to achieve this:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Primary Responsibilities of Transport layer Protocols
Tracking the individual communication between applications on the
source and destination hosts
Segmenting data for manageability and reassembling segmented
data into streams of application data at the destination
Identifying the proper application for each communication stream
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 78
Transportation of Data
Conversation Multiplexing
Segmenting the data
Enables many different
communications, from many
different users, to be
interleaved (multiplexed) on
the same network, at the
same time.
Provides the means to both
send and receive data when
running multiple applications.
Header added to each
segment to identify it.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 79
Transportation of Data
Transport Layer Reliability
TCP/IP provides two transport layer protocols, TCP and UDP
Transmission Control Protocol (TCP)
Provides reliable delivery ensuring that all of the data arrives at the
destination.
Uses acknowledged delivery and other processes to ensure
delivery.
Makes larger demands on the network – more overhead.
User Datagram Protocol (UDP)
Provides just the basic functions for delivery – no reliability.
Less overhead.
TCP or UDP
There is a trade-off between the value of reliability and the burden it
places on the network.
Application developers choose the transport protocol based on the
requirements of their applications.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 80
Introducing TCP and UDP
Introducing TCP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 81
Introducing TCP and UDP
Introducing TCP
Transmission Control Protocol (TCP)
RFC 793
Connection-oriented – creating a session between
source and destination
Reliable delivery – retransmitting lost or corrupt data
Ordered data reconstruction – numbering and
sequencing of segments
Flow control - regulating the amount of data transmitted
Stateful protocol – keeping track of the session
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 82
Introducing TCP and UDP
Introducing UDP
User Datagram Protocol (UDP)
RFC 768
Connectionless
Unreliable delivery
No ordered data reconstruction
No flow control
Stateless protocol
Applications that use UDP:
Domain Name System (DNS)
Video Streaming
Voice over IP (VoIP)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 83
UDP Communication
UDP Low Overhead vs. Reliability
UDP
Simple protocol that provides the basic transport layer function
Used by applications that can tolerate small loss of data
Used by applications that cannot tolerate delay
Used by
Domain Name System (DNS)
Simple Network Management Protocol (SNMP)
Dynamic Host Configuration Protocol (DHCP)
Trivial File Transfer Protocol (TFTP)
IP telephony or Voice over IP (VoIP)
Online games
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 84
Introducing TCP and UDP
Separating Multiple Communications
Port Numbers are used by TCP and UDP to differentiate between
applications.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 85
Introducing TCP and UDP
TCP and UDP Port Addressing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 86
Introducing TCP and UDP
TCP and UDP Port Addressing
Netstat
Used to examine TCP connections that are open and
running on a networked host
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 87
TCP communication
TCP Reliability – Ordered Delivery
Sequence numbers used to reassemble segments into
original order
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 88
Protocol Data Units
TCP Flow Control – Congestion Avoidance
Using Dynamic Window Sizes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89
UDP Communication
Datagram Reassembly
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 90
TCP or UDP
Applications that use TCP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 91
TCP or UDP
Applications that use UDP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 92
Network Layer
Network Basics
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 93
Chapter 6: Objectives
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 94
Chapter 6
6.1 Network Layer Protocols
6.2 Routing
6.3 Routers
6.4 Configuring a Cisco Router
6.5 Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 95
Network Layer
Network Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 96
Network Layer Protocols
Network Layer in Communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 97
Network Layer in Communication
The Network Layer
End to End Transport processes
Addressing end devices
Encapsulation
Routing
De-encapsulating
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 98
Network Layer in Communication
Network Layer Protocols
Common Network Layer Protocols
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 99
Characteristics of the IP protocol
Characteristics of IP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 100
Characteristics of the IP protocol
IP - Connectionless
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 101
Characteristics of the IP protocol
IP – Best Effort Delivery
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 102
Characteristics of the IP protocol
IP – Media Independent
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 103
IPv4 Packet
Encapsulating IP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 104
IPv4 Packet
IPv4 Packet Header
Version, Differentiated Services (DS), Time-to-Live
(TTL),Protocol, Source IP Address, Destination IP Address
Byte 1 Byte 2 Byte 3 Byte 4
Source IP Address
Destination IP Address
Options (optional)
Padding
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 105
IPv4 Packet
IPv4 Header Fields
Internet Header Length (IHL), Total Length, Header Checksum,
Identification, Flags, Fragment Offset
Byte 1 Byte 2 Byte 3 Byte 4
Source IP Address
Destination IP Address
Options (optional)
Padding
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 106
IPv4 Packet
Sample IPv4 Headers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 107
Network Layer in Communication
Introducing IPv6
Increased address space
Improved packet handling
Eliminates the need for NAT
Integrated security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 108
IPv6 Packet
Encapsulating IPv6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 109
IPv6 Packet
IPv6 Packet Header
Byte 1 Byte 2 Byte 3 Byte 4
Next
Payload Length Hop Limit
Header
Source IP Address
Destination IP Address
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 110
Routers
Anatomy of a Router
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 111
Anatomy of a Router
A Router is a Computer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 112
Anatomy of a Router
Router CPU and OS
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 113
Anatomy of a Router
Router Memory
Volatile /
Memory Stores
Non-Volatile
• Running IOS
• Running configuration file
RAM Volatile
• IP routing and ARP tables
• Packet buffer
• Bootup instructions
ROM Non-Volatile • Basic diagnostic software
• Limited IOS
NVRAM Non-Volatile • Startup configuration file
• IOS
Flash Non-Volatile
• Other system files
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 114
Anatomy of a Router
Inside a Router
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 115
Anatomy of a Router
Router Backplane
Console
RJ45 USB
Ports
Two 4 GB flash card slots Console
USB Type B
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 116
Anatomy of a Router
Connecting to a Router
Console
RJ45
Console
USB Type B
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 117
Anatomy of a Router
LAN and WAN Interfaces
Serial interfaces
LAN interfaces
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 118
Router Boot-up
Cisco IOS
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 119
Router Boot-up
Bootset Files
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 120
Router Boot-up
Router Bootup Process
<output omitted>
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 121
Router Boot-up
Show Versions Output
Router# show version
Cisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M), Version 15.2(4)M1, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Thu 26-Jul-12 19:34 by prod_rel_team
<Output omitted>
<Output omitted>
-----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
ipbase ipbasek9 Permanent ipbasek9
security None None None
data None None None
Router#
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 122
Network Layer
Configuring a Cisco Router
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 123
Configure Initial Settings
Router Configuration Steps
192.168.10.0/24 10.1.1.0/24
.10 G0/0 .10
PC1 .1
209.165.200.224 /30
.1
.225 .226
R1 S0/0/0 R2
.10 .1 .1 .10
PC2 G0/1
192.168.11.0/24 10.1.2.0/24
192.168.11.0/24 10.1.2.0/24
R1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#
R1(config)# interface gigabitethernet 0/0
R1(config-if)# ip address 192.168.10.1 255.255.255.0
R1(config-if)# description Link to LAN-10
R1(config-if)# no shutdown
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0,
changed state to up
R1(config-if)# exit
R1(config)#
R1(config)# int g0/1
R1(config-if)# ip add 192.168.11.1 255.255.255.0
R1(config-if)# des Link to LAN-11
R1(config-if)# no shut
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1,
changed state to up
R1(config-if)# exit
R1(config)#
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 125
Configure Interfaces
Verify Interface Configuration
192.168.10.0/24 10.1.1.0/24
.10 G0/0 .10
PC1 .1
209.165.200.224 /30
.1
.225 .226
R1 S0/0/0 R2
.10 .1 .1 .10
PC2 G0/1
192.168.11.0/24 10.1.2.0/24
R1#
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 126
Configuring a Cisco Router
Configuring the Default Gateway
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 127
Configuring the Default Gateway
Default Gateway on a Host
.10
PC1 192.168.10.0/24
.1
.10 G0/0
PC2
R1
G0/1
.1
.10
.10 PC1 192.168.10.0/24
PC3
.1
.11 G0/0
.10 192.168.11.0/24 PC2
PC4
R1
G0/1
.1
.10
PC3
.11 192.168.11.0/24
PC4
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 128
Configuring the Default Gateway
Default Gateway on a Switch
S1#show running-config
Building configuration...
!
<output omitted>
service password-encryption
!
hostname S1
!
Interface Vlan1
ip address 192.168.10.50
!
ip default-gateway 192.168.10.1
<output omitted>
.10
PC1 192.168.10.0/24 192.168.11.0/24
.1 .1
S1 G0/0 G0/1 S2
.11 R1
PC2 .50
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 129
Ethernet
Network Basics
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 130
Objectives
Upon completion of this chapter you will be able to:
Describe the operation of the Ethernet sublayers.
Identify the major fields of the Ethernet frame.
Describe the purpose and characteristics of the Ethernet MAC address.
Compare the roles of the MAC address and the IP address.
Describe the purpose of ARP.
Explain how ARP requests impact network and host performance.
Explain basic switching concepts.
Compare fixed configuration and modular switches.
Configure a Layer 3 switch.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 131
Chapter 10
10.0 Introduction
10.1 Ethernet Protocol
10.2 Address Resolution Protocol
10.3 LAN Switches
10.4 Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 132
10.1
Ethernet Protocol
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 133
Ethernet Operation
LLC and MAC Sublayers
Ethernet –
One of the most widely used LAN technologies
Operates in the data link layer and the physical layer
Family of networking technologies that are defined in the IEEE 802.2
and 802.3 standards
Supports data bandwidths of 10, 100, 1000, 10,000, 40,000, and
100,000 Mbps (100 Gbps)
Ethernet standards –
Define Layer 2 protocols and Layer 1 technologies
Two separate sub layers of the data link layer to operate - Logical
link control (LLC) and the MAC sublayers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 134
Ethernet Operation
LLC and MAC Sublayers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 135
Ethernet Operation
LLC and MAC Sublayers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 136
Ethernet Operation
LLC and MAC Sublayers
LLC
Handles communication between upper and lower layers
Takes the network protocol data and adds control
information to help deliver the packet to the destination
MAC
Constitutes the lower sublayer of the data link layer
Implemented by hardware, typically in the computer NIC
Two primary responsibilities:
• Data encapsulation
• Media access control
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 137
Ethernet Operation
MAC Sublayer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 138
Ethernet Operation
MAC Sublayer
Data encapsulation
Frame assembly before transmission and frame disassembly upon
reception of a frame
MAC layer adds a header and trailer to the network layer PDU
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 139
Ethernet Operation
MAC Sublayer
Media Access Control
Responsible for the placement of frames on the media and the
removal of frames from the media
Communicates directly with the physical layer
If multiple devices on a single medium attempt to forward data
simultaneously, the data will collide resulting in corrupted, unusable
data
Ethernet provides a method for controlling how the nodes share
access through the use a Carrier Sense Multiple Access (CSMA)
technology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 140
Ethernet Operation
Media Access Control
Carrier Sense Multiple Access (CSMA) process
Used to first detect if the media is carrying a signal
If no carrier signal is detected, the device transmits its data
If two devices transmit at the same time - data collision
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 141
Ethernet Operation
Media Access Control
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 142
Ethernet Operation
Media Access Control
The two commonly used methods are:
CSMA/Collision Detection
The device monitors the media for the presence of a data signal
If a data signal is absent, indicating that the media is free, the device
transmits the data
If signals are then detected that show another device was transmitting
at the same time, all devices stop sending and try again later
While Ethernet networks are designed with CSMA/CD technology, with
today’s intermediate devices, collisions do not occur and the processes
utilized by CSMA/CD are really unnecessary
Wireless connections in a LAN environment still have to take collisions
into account
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 143
Ethernet Operation
Media Access Control
The two commonly used methods are:
CSMA/Collision Avoidance (CSMA/CA) media access
method
Device examines the media for the presence of data signal-
if the media is free, the device sends a notification across
the media of its intent to use it
The device then sends the data.
Used by 802.11 wireless networking technologies
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 144
Ethernet Operation
Media Access Control
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 145
Ethernet Operation
MAC Address: Ethernet Identity
Layer 2 Ethernet MAC address is a 48-bit binary value
expressed as 12 hexadecimal digits
IEEE requires a vendor to follow two simple rules:
• Must use that vendor's assigned OUI as the first 3 bytes
• All MAC addresses with the same OUI must be
assigned a unique value in the last 3 bytes
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 146
Ethernet Operation
Frame Processing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 147
Ethernet Frame Attributes
Ethernet Encapsulation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 148
Ethernet Frame Attributes
Ethernet Frame Size
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 149
Ethernet Frame Attributes
Ethernet Frame Size
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 152
Ethernet MAC
MAC Addresses and Hexadecimal
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 153
Ethernet MAC
MAC Address Representations
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 154
Ethernet MAC
Unicast MAC Address
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 155
Ethernet MAC
Broadcast MAC Address
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 156
Ethernet MAC
Multicast MAC Address
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 157
MAC and IP
MAC and IP
MAC address
This address does not change
Similar to the name of a person
Known as physical address because physically assigned to the host NIC
IP address
Similar to the address of a person
Based on where the host is actually located
Known as a logical address because assigned logically
Assigned to each host by a network administrator
Both the physical MAC and logical IP addresses are required for a
computer to communicate just like both the name and address of a person
are required to send a letter
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 158
Ethernet MAC
End-to-End Connectivity, MAC, and IP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 159
10.2
Address Resolution Protocol
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 160
ARP
Introduction to ARP
ARP Purpose –
Sending node needs a way to find the MAC address of the
destination for a given Ethernet link
ARP protocol provides two basic functions:
Resolving IPv4 addresses to MAC addresses
Maintaining a table of mappings
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 161
ARP
ARP Functions/Operation
ARP Table –
Used to find the data link layer address that is mapped to the
destination IPv4 address
As a node receives frames from the media, it records the source IP
and MAC address as a mapping in the ARP table
ARP request –
Layer 2 broadcast to all devices on the Ethernet LAN
The node that matches the IP address in the broadcast will reply
If no device responds to the ARP request, the packet is dropped
because a frame cannot be created
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 163
ARP
ARP Functions/Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 164
ARP
ARP Functions/Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 165
ARP
ARP Functions/Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 166
ARP
ARP Functions/Operation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 167
ARP
ARP Role in Remote Communication
If the destination IPv4 host is on the local network, the
frame will use the MAC address of this device as the
destination MAC address
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 168
ARP
Removing Entries from an ARP Table
ARP cache timer removes ARP entries that have not been
used for a specified period of time
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 169
ARP
ARP Tables on Networking Devices
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 170
Network Access
Physical Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 171
Purpose of the Physical Layer
The Physical Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 172
Purpose of the Physical Layer
Physical Layer Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 173
Purpose of the Physical Layer
Physical Layer Standards
Standard
Networking Standards
organization
• ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45)
ISO • ISO 11801: Network cabling standard similar to EIA/TIA 568.
• 802.3: Ethernet
IEEE • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification)
• 802.15: Bluetooth
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 174
Characteristics of the Physical Layer
Physical Layer Functions
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 175
Characteristics of the Physical Layer
Physical Components
USB Type A
Connector
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 176
Characteristics of the Physical Layer
Frame Encoding Techniques
Manchester encoding
Non-Return to Zero (NRZ)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 177
Characteristics of the Physical Layer
Signaling Method
Asynchronous
Bursty data Signal
Synchronous
Signal
Data transitions align with bit time slots
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 178
Characteristics of the Physical Layer
Signaling Method
Amplitude modulation
Frequency modulation
Phase modulation
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 179
Characteristics of the Physical Layer
Signaling Method
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 180
Characteristics of the Physical Layer
Bandwidth
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 181
Characteristics of the Physical Layer
Throughput
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 182
Network Media
Copper Cabling
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 183
Copper Cabling
Characteristics of Copper Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 184
Copper Cabling
Copper Media
Unshielded Twisted Pair (UTP) cable Shielded Twisted Pair (STP) cable
Coaxial cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 185
Copper Cabling
Unshielded Twisted-Pair (UTP) Cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 186
Copper Cabling
Shielded Twisted-Pair (STP) Cable
Foil Shields
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 187
Copper Cabling
Coaxial Cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 188
Copper Cabling
Cooper Media Safety
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 189
UTP Cabling
Properties of UTP Cabling
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 190
UTP Cabling
UTP Cabling Standards
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 191
UTP Cabling
UTP Connectors
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 192
UTP Cabling
Types of UTP Cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 193
UTP Cabling
LAN Cabling Areas
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 194
UTP Cabling
Testing UTP Cables
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 195
Fiber Optic Cabling
Properties of Fiber Optic Cabling
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 196
Fiber Optic Cabling
Fiber Media Cable Design
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 197
Fiber Optic Cabling
Types of Fiber Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 198
Fiber Optic Cabling
Network Fiber Connectors
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 199
Fiber Optic Cabling
Testing Fiber Cables
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 200
Fiber Optic Cabling
Fiber versus Copper
Implementation issues Copper media Fibre-optic
High
Immunity to EMI and RFI Low
(Completely immune)
High
Immunity to electrical hazards Low
(Completely immune)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 201
Network Media
Wireless Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 202
Wireless Media
Properties of Wireless Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 203
Wireless Media
Types of Wireless Media
• IEEE 802.11 standards
• Commonly referred to as Wi-Fi.
• Uses CSMA/CA
• Variations include:
• 802.11a: 54 Mbps, 5 GHz
• 802.11b: 11 Mbps, 2.4 GHz
• 802.11g: 54 Mbps, 2.4 GHz
• 802.11n: 600 Mbps, 2.4 and 5 GHz
• 802.11ac: 1 Gbps, 5 GHz
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 204
Wireless Media
Wireless LAN
Maximum Backwards
Standard Frequency
Speed compatible
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 206
Network Access
Summary
In this chapter, you learned:
The TCP/IP network access layer is the equivalent of the OSI
data link layer (Layer 2) and the physical layer (Layer 1).
The data link layer is responsible for the exchange of frames
between nodes over a physical network media.
Among the different implementations of the data link layer
protocols, there are different methods of controlling access to
the media.
The actual media access control method used depends on
the topology and media sharing.
LAN and WAN topologies can be physical or logical.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 207
Network Access
Summary
In this chapter, you learned:
It is the logical topology that influences the type of network
framing and media access control used.
WANs are commonly interconnected using the point-to-point,
hub and spoke, or mesh physical topologies.
In shared media LANs, end devices can be interconnected
using the star, bus, ring, or extended star (hybrid) physical
topologies.
All data link layer protocols encapsulate the Layer 3 PDU
within the data field of the frame.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 208
Network Access
Summary
In this chapter, you learned:
The OSI physical layer provides the means to transport the
bits that make up a data link layer frame across the network
media.
Hardware components such as network adapters (NICs),
interfaces and connectors, cable materials, and cable
designs are all specified in standards associated with the
physical layer.
The physical layer standards address three functional areas:
physical components, frame encoding technique, and
signaling method.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 209
Network Access
Summary
In this chapter, you learned:
Using the proper media is an important part of network
communications.
Wired communication consists of copper media and fiber
cable.
There are three main types of copper media used in
networking: unshielded-twisted pair (UTP), shielded-twisted
pair (STP), and coaxial cable. UTP cabling is the most
common copper networking media.
Optical fiber cable has become very popular for
interconnecting infrastructure network devices.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 210
Network Access
Summary
In this chapter, you learned:
Wireless media carry electromagnetic signals that represent
the binary digits of data communications using radio or
microwave frequencies.
The number of wireless enabled devices continues to
increase.
Wireless has become the medium of choice for home
networks and is quickly gaining in popularity in enterprise
networks.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 211
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 212