Documente Academic
Documente Profesional
Documente Cultură
Network Administrator
CCNA (Cisco Certified Network Associate ) CCNP (Cisco Certified Network Professional) CCIE (Cisco Certified Internetwork Expert)
IT Administrator
CCNA (Cisco Certified Network Associate ) MCITP ( Enterprise Administrator) Microsoft Exchange Microsoft ISA UNIX
Technical Support
A+
Voice Administrator
CCNA Voice (Cisco Certified Network Associate Voice )
CCNP Voice(Cisco Certified Network Professional Voice)
Security Administrator
CCNA Security (Cisco Certified Network Associate Security ) CCNP Security (Cisco Certified Network Professional Security) CCIE Security (Cisco Certified Internetwork Expert Security)
IT Essentials
Computer cases
Different connectors are used to connect specific components and various locations on the motherboard:
Different connectors are used to connect specific components and various locations on the motherboard:
motherboards
CPU
CPU
cooling systems
Adapter cards
NIC Wireless NIC :
Sound adapter :
Video adapter : Modem adapter
Storage drives
internal cables
Floppy disk drive (FDD) data cable PATA (IDE) data cable PATA (EIDE) data cable SATA data cable SCSI data cable
input devices
Mouse and keyboard Digital camera and digital video camera Touch screen Scanner
Output devices
Monitors and projectors Printers, scanners, and fax machines Speakers and headphones
Network Fundamentals
Cisco Public
26
Introduction
Cisco Public
27
What is Communication ?
Communication in our daily lives takes many forms and occurs in many environments. We have different expectations depending on whether we are chatting via the Internet or participating in a job interview. Each situation has its corresponding expected behaviors and styles.
28
Message
units of information that travel from one device to another
our instant message gets converted into a format that can be transmitted on the network All types of messages must be converted to bits, binary coded digital signals, before being sent to their destinations. no matter what the original message format was: text, video, voice, or computer data Once our instant message is converted to bits, it is ready to be sent onto the network for delivery
Cisco Public
29
Devices
Devices on the network that exchange messages with each other
a computer is only one type of device that can send and receive messages over a network Many other types of devices can also be connected to the network to participate in network services Among these devices are telephones, cameras, music systems, printers and game consoles.
Cisco Public
30
Devices
Switch : the most common device for interconnecting local area networks Firewall : provides security to networks Router : helps direct messages as they travel across a network Wireless Router : a specific type of router often found in home networks
Cisco Public
31
Medium
A means of interconnecting these devices that can transport the messages from one device to another To send our message to its destination, the computer must be connected to a wired or wireless local network.
Wireless networks allow the use of networked devices anywhere in an office or home, even outdoors
Ethernet is the most common wired networking technology
The wires, called cables, connect the computers and other devices that make up the networks.
Wired networks are best for moving large amounts of data at high speeds, such as are required to support professional-quality multimedia.
Cisco Public
32
Medium
1- wired
Copper : which carries electrical signals - twisted pair telephone wire - coaxial cable - Category 5 Unshielded Twisted Pair (UTP) cable optical fiber : which carries light signals - glass - plastic
2- Wireless :
the medium is the Earth's atmosphere, or space, and the signals are microwaves
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
33
Rules or Protocols
We have different expectations depending on whether we are chatting via the Internet or participating in a job interview. Each situation has its corresponding expected behaviors and styles. Among the protocols that govern successful human communication are: An identified sender and receiver Agreed upon method of communicating (face-to-face, telephone, letter) Common language and grammar Speed and timing of delivery Confirmation or acknowledgement requirements (important , Less important )
Communication between individuals is determined to be successful when the meaning of the message understood by the recipient matches the meaning intended by the sender.
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
34
Rules or Protocols
rules are the standards and protocols that Govern how the messages are sent standards and protocols Govern how messages are directed through the network standards and protocols Govern how messages are interpreted at the destination devices
Protocols are the rules that the networked devices use to communicate with each other. Ex. : HTTP SMTP XMPP - SIP
Cisco Public
35
Converged networks :
Technology advances are enabling us to consolidate these disparate networks onto one platform - a platform defined as a converged network. The flow of voice, video, and data traveling over the same network eliminates the need to create and maintain separate networks. personal computers, phones, TVs, personal assistants, and retail point-ofsale registers - but only one common network infrastructure.
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
36
there are four basic characteristics that the underlying architectures need to address in order to meet user expectations: Fault Tolerance
Scalability
Quality of Service (QoS)
Security
ITE PC v4.0 Chapter 1
Cisco Public
37
Fault Tolerance
always available to the millions of users limits the impact of a hardware or software failure and can recover quickly when such a failure occurs. depend on redundant links, or paths, between the source and destination of a message. Both the physical infrastructures and the logical processes that direct the messages through the network are designed to accommodate this redundancy
Cisco Public
38
Scalability
A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.
39
Security
Prevent unauthorized disclosure or theft of information Prevent unauthorized modification of information Prevent Denial of Service
Cisco Public
40
a single communication :
such as a music video or an e-mail message, could be sent across a network from a source to a destination as one massive continuous stream of bits. If messages were actually transmitted in this manner , it would mean that no other device would be able to send or receive messages on the same network while this data transfer was in progress.
These large streams of data would result in significant delays. Further, if a link in the interconnected network infrastructure failed during the transmission, the complete message would be lost and have to be retransmitted in full.
Cisco Public
41
Cisco Public
42
Utilizing Packets :
Each packet is sent independently from one switching location to another. a routing decision is made as to which path to use to forward the packet towards its final destination.
If a previously used path is no longer available, the routing function can dynamically choose the next best available path. Because the messages are sent in pieces. rather than as a single complete message, the few packets that may be lost in the advent of a failure can be retransmitted to the destination along a different path. In many cases, the destination device is unaware that any failure or rerouting has occurred.
Cisco Public
43
A better approach is to divide the data into smaller . more manageable pieces to send over the network.
This division of the data stream into smaller pieces is called segmentation. Segmenting messages has two primary benefits.
Multiplexing
Segmentation
Cisco Public
44
Quality of Service :
ensuring (QoS) requires a set of techniques to manage the utilization of network resources. In order to maintain a high quality of service for applications that require it. it is necessary to prioritize which types of data packets must be delivered at the expense of other types of packets that can be delayed or dropped.
Classification:
we classify applications in categories based on specific quality of service requirements. For example : communication that is time-sensitive or important would be classified differently from communication that can wait or is of lesser importance.
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
45
Assigning Priorities :
Ex : the delivery of a movie uses a relatively large amount of network resources when it is delivered continuously without interruption.
Cisco Public
46
In network communications, each segment of the message must go through a similar process to ensure that it gets to the correct destination and can be reassembled into the content of the original message. end devices are referred to as hosts
A host device is either the source or destination of a message transmitted over the network. In order to distinguish one host from another, each host on a network is identified by an address Examples of intermediary network devices are:
- Network Access Devices (Hubs, switches, and wireless access points) - Internetworking Devices (routers) - Communication Servers and Modems - Security Devices (firewalls)
Cisco Public
47
Cisco Public
48
The Internet
is created by the interconnection of networks belonging to Internet Service Providers (ISPs).
Intranet
a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.
Cisco Public
49
Physical Port
A connector or outlet on a networking device where the media is connected to a host or other networking device.
Cisco Public
50
with each higher level service depending on the functionality defined by the protocols shown in the lower levels. The lower layers of the stack are concerned with moving data over the network and providing services to the upper layers, which are focused on the content of the message being sent and the user interface. The use of standards in developing and implementing protocols ensures that products from different manufacturers can work together for efficient communications.
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
51
Devices that extend the range of a network by receiving data on one port, and then regenerating the data and sending it out to all other ports. This process means that all traffic from a device connected to the hub is sent to all the other devices connected to the hub every time the hub transmits data.
Cisco Public
52
A typical bridge have just two ports, linking two segments of the same network.
A bridge is a device used to filter network traffic between LAN segments. Bridges keep a record of all the devices on each segment to which the bridge is connected. When the bridge receives a frame, the destination address is examined by the bridge to determine if the frame is to be sent to a different segment, or dropped. The bridge also helps to improve the flow of data by keeping frames confined to only the segment to which the frame belongs
ITE PC v4.0 Chapter 1
Cisco Public
53
Switches :
multiport bridges.
A switch has several ports, depending on how many network segments are to be linked.
A switch is a more sophisticated device than a bridge.
A switch maintains a table of the MAC addresses for computers that are connected to each port.
Switches use MAC addresses to forward a frame within a single network.
When a frame arrives at a port, the switch compares the address information in the frame to its MAC address table. The switch then determines which port to use to forward the frame.
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
54
Routers :
Devices that connect entire networks to each other. Routers use IP addresses to forward frames to other networks. Routers contain tables of IP addresses along with optimal destination routes to other networks.
Cisco Public
55
Physical Topologies :
Bus Topology Ring Topology Star Topology Hierarchical or Extended Star Mesh Topology
Cisco Public
56
Bus Topology :
each computer connects to a common cable. The cable connects one computer to the next The cable has a small cap installed at the end, called a terminator. Cheap Collision (CSMA/CD) Carrier sense multiple access with collision detection Jamming Signal BW=10Mb/S Cable Fault Host Fault Cable Length
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
57
Ring Topology :
hosts are connected in a physical ring or circle.
ring topology has no beginning or end, the cable does not need to be terminated.
A specially-formatted frame, called a token, travels around the ring, stopping at each host. If a host wants to transmit data, the host adds the data and the destination address to the frame. The frame then continues around the ring until the frame stops at the host with the destination address. The destination host takes the data out of the frame. BW=45Mb/s Expensive (NIC) Cable Fault Host Fault/OFF
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
58
Star Topology :
The star topology has a central connection point
which is normally a device such as a hub, switch, or router. Each host on a network has a cable segment that attaches the host directly to the central connection point. The advantage of a star topology is that it is easy to troubleshoot. Each host is connected to the central device with its own wire. If there is a problem with that cable, only that host is affected. The rest of the network remains operational. BW=100 Mb/s Central Point Less Cost
Cisco Public
59
Cisco Public
60
Mesh Topology :
topology connects all devices to each other When every device is connected to every other device, a failure of any cable will not affect the network The mesh topology is used in WANs that interconnect LANs. Redundant
Cables Cost
Number of NIC ( Cost )
Cisco Public
61
Logical Topologies
Broadcast Token Broadcast : In a broadcast Topology, each host addresses either data to a particular host or to all hosts connected on a network. There is no order that the hosts must follow to use the network it is first come, first served for transmitting data on the network.
Token : Token passing controls network access by passing an electronic token sequentially to each host.
When a host receives the token, it can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself. Throughput Example : 100 mb/s
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Bandwidth
62
Cisco Public
63
Internetwork Protocol: Internet Protocol (IP , ARP , ICMP ) Network Access Protocols: Data-link management protocols
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
64
layered model
There are benefits to using a layered model to describe network protocols and operations. Using a layered model : Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below. Fosters competition because products from different vendors can work together.
Prevents technology or capability changes in one layer from affecting other layers above and below.
Provides a common language to describe networking functions and capabilities.
Cisco Public
65
Protocol Models
Protocol Models :
Reference Models
A protocol model provides a model that closely matches the structure of a particular protocol suite The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols within the TCP/IP suite. The TCP/IP model describes the functionality of the protocols that make up the TCP/IP protocol suite. These protocols, which are implemented on both the sending and receiving hosts, interact to provide end-to-end delivery of applications over a network
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
66
TCP/IP Layers Application Layer Transport Layer Internet Layer Network Access Layer
Cisco Public
67
68
At each stage of the process, a PDU has a different name to reflect its new appearance , the PDUs are named according to the protocols of the TCP/IP suite.
Cisco Public
69
Data : The general term for the PDU used at the Application layer Segment : Transport Layer PDU Packet : Internetwork Layer PDU Frame : Network Access Layer PDU Bits : A PDU used when physically transmitting data over the medium
Cisco Public
70
In the web server example, we can use the TCP/IP model to illustrate the process of sending an HTML web page to a client.
The Application layer protocol, HTTP, begins the process by delivering the HTML formatted web page data to the Transport layer. There the application data is broken into TCP segments. Each TCP segment is given a label, called a header, containing information about which process running on the destination to enable the destination process to reassemble the data back to its original format.
Cisco Public
71
The Transport layer encapsulates the web page HTML data within the segment and sends it to the Internet layer, where the IP protocol is implemented. Here the entire TCP segment is encapsulated within an IP packet, which adds another label, called the IP header. The IP header contains source and destination host IP addresses, as well as information necessary to deliver the packet to its corresponding destination process.
The IP packet is sent to the Network Access layer Ethernet protocol where it is encapsulated within a frame header and trailer. Each frame header contains a source and destination physical address.
The physical address uniquely identifies the devices on the local network. The trailer contains error checking information. Finally the bits are encoded onto the Ethernet media by the server NIC. This process is reversed at the receiving host. The data is decapsulated as it moves up the stack toward the end user application.
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
72
Reference Models :
A reference model provides a common reference for maintaining consistency within all types of network protocols and services.
The primary purpose of a reference model is to aid in clearer understanding of the functions and process involved.
The Open Systems Interconnection (OSI) model is the most widely known internetwork reference model. It is used for data network design, operation specifications, and troubleshooting.
Cisco Public
73
THE Open Systems Interconnection (OSI) Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Datalink Layer Physical Layer
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
74
Cisco Public
75
Once a frame is successfully received by the destination host, the Layer 2 address information is removed as the data is decapsulated and moved up the protocol stack to Layer 3.
Layer 2 addresses are only used to communicate between devices on a single local network
2007 Cisco Systems, Inc. All rights reserved. Cisco Public
76
Router decapsulates the frame to read the destination host address contained in the header of the packet
Cisco Public
77
Routers use the network identifier portion of this address to determine which path to use to reach the destination host.
Once the path is determined, the router encapsulates the packet in a new frame and sends it on its way toward the destination end device.
When the frame reaches its final destination, the frame and packet headers are removed and the data moved up to Layer 4.
every IP host address contains information about the network where the host is located.
Cisco Public
78
What it does identify is the specific process or service running on the destination host device that will act on the data being delivered. Hosts, whether they are clients or servers on the Internet, can run multiple network applications simultaneously. People using PCs often have an e-mail client running at the same time as a web browser, an instant messaging program, some streaming media, and perhaps even a game. All these separately running programs are examples of individual processes. Think about a computer that has only one network interface on it. All the data streams created by the applications that are running on the PC enter and leave through that one interface.
ITE PC v4.0 Chapter 1
79
Cisco Public
80
Presentation Layer
The Presentation layer has three primary Functions:
1- Coding and conversion of Application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device. 2- Compression of the data in a manner that can be decompressed by the destination device. 3- Encryption of the data for transmission and the decryption of data upon receipt by the destination.
Cisco Public
81
Session Layer
create and maintain dialogs between source and destination applications. The Session layer handles the exchange of information to initiate dialogs, keep them active, and to restart sessions that are disrupted or idle for a long period of time.
Cisco Public
82
Network-Aware Applications :
Applications are the software programs used by people to communicate over the network. Some end-user applications are network-aware, meaning that they implement the Application layer protocols and are able to communicate directly with the lower layers of the protocol stack. Web browsers are examples of these types of applications.
Cisco Public
83
While applications provide people with a way to create messages and Application layer services establish an interface to the network, protocols provide the rules and formats that govern how data is treated. Transport layer uses an addressing scheme called a port number. Port numbers identify applications and Application layer services that are the source and destination of data
Cisco Public
84
Cisco Public
85
Cisco Public
86
Server :
any device that responds to requests from client applications is functioning as a server. A server is usually a computer that contains information to be shared with many client systems
a Server Daemon :
the server runs a service, or process, sometimes called a server daemon daemons typically run in the background and are not under an end user's direct control. because they are programmed to respond whenever the server receives a request for the service provided by the daemon.
When a daemon "hears" a request from a client, it exchanges appropriate messages with the client, as required by its protocol, and proceeds to send the requested data to the client in the proper format. 87
2007 Cisco Systems, Inc. All rights reserved. Cisco Public
88
The Domain Name System (DNS) was created for domain name to address resolution for these networks.
DNS is a client/server service
The DNS protocol defines an automated service that matches resource names with the required numeric network address.
Computer operating systems also have a utility called nslookup that allows the user to manually query the name servers to resolve a given host name.
ITE PC v4.0 Chapter 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
89
The Hypertext Transfer Protocol (HTTP), one of the protocols in the TCP/IP suite, was originally developed to publish and retrieve HTML pages
Cisco Public
90
Cisco Public
91
Cisco Public
92
Application layer protocol. FTP allow file transfers between a client and a server.
An FTP client is an application that runs on a computer that is used to push and pull files from a server running
FTP requires two connections between the client and the server: one for commands and replies, the other for the actual file transfer.
Cisco Public
93
94
When a DHCP-configured device boots up or connects to the network, the client broadcasts a DHCP DISCOVER packet to identify any available DHCP servers on the network. A DHCP server replies with a DHCP OFFER, which is a lease offer message with an assigned IP address, subnet mask, DNS server, and default gateway information as well as the duration of the lease. The client may receive multiple DHCP OFFER packets if there is more than one DHCP server on the local network, so it must choose between them, and broadcast a DHCP REQUEST packet that identifies the explicit server and lease offer that the client is accepting. Assuming that the IP address requested by the client, or offered by the server, is still valid, the server would return a DHCP ACK message that acknowledges to the client the lease is finalized.
Cisco Public
95
If the offer is no longer valid - perhaps due to a time-out or another client allocating the lease - then the selected server will respond with a DHCP NAK message (Negative Acknowledgement). If a DHCP NAK message is returned, then the selection process must begin again with a new DHCP DISCOVER message being transmitted.
Cisco Public
96