Professional Documents
Culture Documents
Objectives
Describe the structure of a network, including the devices and media that are necessary for successful communications. Explain the function of protocols in network communications. Explain the advantages of using a layered model to describe network functionality. Describe the role of each layer in two recognized network models: The TCP/IP model and the OSI model. Describe the importance of addressing and naming schemes in network communications.
People exchange ideas using many different communication methods. All of these methods have 3 elements in common: 1. message source (sender) 2. the channel 3. message destination (receiver)
Services and processes: are the communication programs, called software, that run on the networked devices.
A network service provides information in response to a request. Services include many of the common network applications people use every day, like e-mail hosting services and web hosting services. Processes provide the functionality that directs and moves the messages through the network. Processes are less obvious to us but are critical to the operation of networks.
H c vi n m ng Bach Khoa - Website: www.bkacad.com
A Windows service is an application that starts when the Microsoft Windows operating system is booted and runs in the background as long as Windows is running. Typically, it does not have a user interface and is a long-running executable application that can run in its own session. It is very similar in concept to a Unix daemon.
H c vi n m ng Bach Khoa - Website: www.bkacad.com
Host: In the context of a network, end devices are referred to as hosts. A host device is either the source or destination of a message transmitted over the network. Servers are hosts that have software installed that enables them to provide information and services, like e-mail or web pages, to other hosts on the network. Clients are hosts that have software installed that enables them to request and display the information obtained from the server.
H c vi n m ng Bach Khoa - Website: www.bkacad.com
Processes running on the intermediary network devices perform these functions: Regenerate and retransmit data signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to QoS priorities Permit or deny the flow of data, based on security settings
H c vi n m ng Bach Khoa - Website: www.bkacad.com
Networking Media
Communication across a network is carried on a medium. The medium provides the channel over which the message travels from source to destination. These media are: Metallic wires within cables Glass or plastic fibers (fiber optic cable) Wireless transmission
Networking Media
Different types of network media have different features and benefits. Criteria for choosing a network media are:
The distance the media can successfully carry a signal. The environment in which the media is to be installed. The amount of data and the speed at which it must be transmitted. The cost of the media and installation.
H c vi n m ng Bach Khoa - Website: www.bkacad.com
Networking Media
The signal encoding that must occur for the message to be transmitted is different for each media type. On metallic wires, the data is encoded into electrical impulses that match specific patterns. Fiber optic transmissions rely on pulses of light, within either infrared or visible light ranges. In wireless transmission, patterns of electromagnetic waves depict the various bit values.
Network Representations
Important terms to remember are: Network Interface Card Physical Port Interface
Lab 2.2.4.2
In this activity, you will gain experience with data network symbols by creating a simple logical topology.
Extra: ping
Verifies IP-level connectivity to another TCP/IP computer by sending
Internet Control Message Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are displayed, along with round-trip times.
ping 127.0.0.1 This ping is unique and is called an internal loopback test. It verifies the operation of the TCP/IP stack and NIC transmit/receive function. ping IP-address-of-host-computer A ping to a host PC verifies the TCP/IP address configuration for the local host and connectivity to the host. ping default-gateway-IP-address A ping to the default gateway verifies whether the router that connects the local network to other networks can be reached. ping remote-destination-IP-address A ping to a remote destination verifies connectivity to a remote host.
Determines the path taken to a destination by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination with incrementally increasing Time to Live (TTL) field values.
Lab 2.2.5
Extra: nslookup
Extra: ARP
(ARP) cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet or Token Ring physical addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your computer.
Extra: Netstat
Extra: netsh
You can use commands in the Netsh Interface IP context to configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and WINS servers) and to display configuration and statistical information.
H c vi n m ng Bach Khoa - Website: www.bkacad.com
Protocols
Network Protocols
At the human level, some communication rules are formal and others are simply understood, or implicit, based on custom and practice. For devices to successfully communicate, a network protocol suite must describe precise requirements and interactions. Networking protocols suites describe processes such as: 1. The format or structure of the message 2. The process by which networking devices share information about pathways with other networks 3. How and when error and system messages are passed between devices 4. The setup and termination of data transfer sessions
Network Protocols
The format or structure of the message
Network Protocols
The process by which networking devices share information about pathways with other networks
Network Protocols
How and when error and system messages are passed between devices
Network Protocols
There are 2 basic types of networking models: protocol models and reference models. A protocol model provides a model that closely matches the structure of a particular protocol suite. Example: TCP/IP A reference model provides a common reference for maintaining consistency within all types of network protocols and services. The Open Systems Interconnection (OSI) model is the most widely known internetwork reference model. It is used for data network design, operation specifications, and troubleshooting.
H c vi n m ng Bach Khoa - Website: www.bkacad.com
The first layered protocol model for internetwork communications was created in the early 1970s and is referred to as the Internet model.
Animation 2.4.4
In order for data to travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination. This form of communication is referred to as peer-to-peer. During this process, the protocols of each layer exchange information, called protocol data units (PDUs).
H c vi n m ng Bach Khoa - Website: www.bkacad.com
5 conversion steps in order to encapsulate data: 1. Build the data. 2. Package the data for end-to-end transport. 3. Add the network IP address to the header. 4. Add the data link layer header and trailer. 5. Convert to bits for transmission.
H c vi n m ng Bach Khoa - Website: www.bkacad.com
Application Layer
010010100100100100111010010001101000
Step 1:
Refer to 2.4.6
Step 2
Step 3
Step 4
Step 5:
Step 6:
Step 7:
Step 8:
Step 9:
Step 10:
Lab 2.4.8.2
In this activity, you will see how Packet Tracer uses the OSI Model as a reference to display the encapsulation details of a variety of the TCP/IP protocols.
Network Addressing
See also:
Proxy Server URL
H c vi n m ng Bach Khoa - Website: www.bkacad.com
Lab 2.6.1
Lab 2.7.1
Summary