You are on page 1of 82

Please purchase a personal license.

CCNA Exploration 4.0

Objectives

Describe the structure of a network, including the devices and media that are necessary for successful communications. Explain the function of protocols in network communications. Explain the advantages of using a layered model to describe network functionality. Describe the role of each layer in two recognized network models: The TCP/IP model and the OSI model. Describe the importance of addressing and naming schemes in network communications.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Platform for Communication

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Elements of Communication

People exchange ideas using many different communication methods. All of these methods have 3 elements in common: 1. message source (sender) 2. the channel 3. message destination (receiver)

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Communicating the Messages



A better approach is to divide the data into smaller, more manageable pieces to send over the network. This division of the data stream into smaller pieces is called segmentation. Segmenting messages has 2 primary benefits: First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. (multiplexing) Second, segmentation can increase the reliability of network communications.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Communicating the Messages



The downside to using segmentation and multiplexing to transmit messages across a network is the level of complexity that is added to the process. In network communications, each segment of the message must go through a similar process to ensure that it gets to the correct destination and can be reassembled into the content of the original message.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Components of the Network



Network Component:
Hardware: Devices and media Software: Services and processes

Devices: physical elements

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Components of the Network

Media: Physical elements, often visible but occasionally not be visible.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Components of the Network

Services and processes: are the communication programs, called software, that run on the networked devices.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Components of the Network

A network service provides information in response to a request. Services include many of the common network applications people use every day, like e-mail hosting services and web hosting services. Processes provide the functionality that directs and moves the messages through the network. Processes are less obvious to us but are critical to the operation of networks.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: Windows service

A Windows service is an application that starts when the Microsoft Windows operating system is booted and runs in the background as long as Windows is running. Typically, it does not have a user interface and is a long-running executable application that can run in its own session. It is very similar in concept to a Unix daemon.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: Windows service

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: ProcessExplorer tool

H c vi n m ng Bach Khoa - Website: www.bkacad.com

End Devices and their Role on the Network



The network devices that people are most familiar with are called end devices. These devices form the interface between the human network and the underlying communication network. Some examples of end devices are: Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones Security cameras Mobile handheld devices (such as wireless barcode scanners, PDAs)

H c vi n m ng Bach Khoa - Website: www.bkacad.com

End Devices and their Role on the Network

Host: In the context of a network, end devices are referred to as hosts. A host device is either the source or destination of a message transmitted over the network. Servers are hosts that have software installed that enables them to provide information and services, like e-mail or web pages, to other hosts on the network. Clients are hosts that have software installed that enables them to request and display the information obtained from the server.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Intermediary Devices and their Role on the Network


Intermediary devices to provide connectivity and to work behind the
scenes to ensure that data flows across the network. These devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork. Examples of intermediary network devices are: Network Access Devices (Hubs, switches, and wireless access points) Internetworking Devices (routers) Communication Servers and Modems Security Devices (firewalls)

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Intermediary Devices and their Role on the Network

Processes running on the intermediary network devices perform these functions: Regenerate and retransmit data signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to QoS priorities Permit or deny the flow of data, based on security settings
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Networking Media

Communication across a network is carried on a medium. The medium provides the channel over which the message travels from source to destination. These media are: Metallic wires within cables Glass or plastic fibers (fiber optic cable) Wireless transmission

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Networking Media

Different types of network media have different features and benefits. Criteria for choosing a network media are:
The distance the media can successfully carry a signal. The environment in which the media is to be installed. The amount of data and the speed at which it must be transmitted. The cost of the media and installation.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Networking Media

The signal encoding that must occur for the message to be transmitted is different for each media type. On metallic wires, the data is encoded into electrical impulses that match specific patterns. Fiber optic transmissions rely on pulses of light, within either infrared or visible light ranges. In wireless transmission, patterns of electromagnetic waves depict the various bit values.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

LAN, WAN and Internetworks

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Local Area Networks


Networks infrastructures can vary greatly in terms of:
The size of the area covered The number of users connected The number and types of services available Local Area Network (LAN): An individual network usually spans a single geographical area, providing services and applications to people within a common organizational structure, such as a single business, campus or region

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Wide Area Networks


LANs separated by geographic distance are connected by a network
known as a Wide Area Network (WAN). WANs use specifically designed network devices to make the interconnections between LANs.

Telecommunications Service Provider (TSP)


H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Internet A Network of Networks



Although there are benefits to using a LAN or WAN, most of us need to communicate with a resource on another network, outside of our local organization. Examples of this type of communication include: Sending an e-mail to a friend in another country Accessing news or products on a website Getting a file from a neighbor's computer Instant messaging with a relative in another city Following a favorite sporting team's performance on a cell phone

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Internet A Network of Networks



A global mesh of interconnected networks (internetworks) meets these human communication needs. The Internet is created by the interconnection of networks belonging to Internet Service Providers (ISPs). Intranet is often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Network Representations
Important terms to remember are: Network Interface Card Physical Port Interface

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Lab 2.2.4.2

In this activity, you will gain experience with data network symbols by creating a simple logical topology.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: ping
Verifies IP-level connectivity to another TCP/IP computer by sending
Internet Control Message Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are displayed, along with round-trip times.

ping 127.0.0.1 This ping is unique and is called an internal loopback test. It verifies the operation of the TCP/IP stack and NIC transmit/receive function. ping IP-address-of-host-computer A ping to a host PC verifies the TCP/IP address configuration for the local host and connectivity to the host. ping default-gateway-IP-address A ping to the default gateway verifies whether the router that connects the local network to other networks can be reached. ping remote-destination-IP-address A ping to a remote destination verifies connectivity to a remote host.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Lab 2.2.5: tracert

Determines the path taken to a destination by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination with incrementally increasing Time to Live (TTL) field values.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Lab 2.2.5

This lab also assumes the installation of NeoTrace.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: nslookup

Displays information that you can use to diagnose Domain Name


System (DNS) infrastructure. Before using this tool, you should be familiar with how DNS works. The Nslookup command-line tool is available only if you have installed the TCP/IP protocol.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: ARP

Displays and modifies entries in the Address Resolution Protocol

(ARP) cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet or Token Ring physical addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your computer.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: Netstat

Displays active TCP connections, ports on which the computer is


listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: netsh

You can use commands in the Netsh Interface IP context to configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and WINS servers) and to display configuration and statistical information.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Protocols

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Rules that Govern Communications


All communication, whether face-to-face or over a network, is governed by
predetermined rules called protocols. These protocols are specific to the characteristics of the conversation. Protocol suite: a group of inter-related protocols that are necessary to perform a communication function. how the individual protocols within the suite are implemented on the host. The protocols are viewed as a layered hierarchy, with each higher level services depending on the functionality defined by the protocols shown in the lower levels.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

A protocol stack shows

Network Protocols

At the human level, some communication rules are formal and others are simply understood, or implicit, based on custom and practice. For devices to successfully communicate, a network protocol suite must describe precise requirements and interactions. Networking protocols suites describe processes such as: 1. The format or structure of the message 2. The process by which networking devices share information about pathways with other networks 3. How and when error and system messages are passed between devices 4. The setup and termination of data transfer sessions

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Network Protocols
The format or structure of the message

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Network Protocols

The process by which networking devices share information about pathways with other networks

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Network Protocols

How and when error and system messages are passed between devices

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Network Protocols

The setup and termination of data transfer sessions

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Protocol Suites and Industry Standards


Many of the protocols that comprise a protocol suite reference other
widely utilized protocols or industry standards. A standard is a process or protocol that has been endorsed by the networking industry and ratified by a standards organization, such as IEEE or IETF. The use of standards in developing and implementing protocols ensures that products from different manufacturers can work together for efficient communications.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Interaction of Protocols



An example of the use of a protocol suite in network communications is the interaction between a web server and a web browser. This interaction uses a number of protocols and standards in the process of exchanging information between them.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Technology Independent Protocols


Many diverse types of devices can communicate using the same sets
of protocols. This is because protocols specify network functionality, not the underlying technology to support this functionality.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Using Layered Models

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Benefits of Using a Layered Model



Assists in protocol design. Fosters competition because products from different vendors can work together. Prevents technology or capability changes in one layer from affecting other layers above and below. Provides a common language to describe networking functions and capabilities.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Protocol and Reference Models

There are 2 basic types of networking models: protocol models and reference models. A protocol model provides a model that closely matches the structure of a particular protocol suite. Example: TCP/IP A reference model provides a common reference for maintaining consistency within all types of network protocols and services. The Open Systems Interconnection (OSI) model is the most widely known internetwork reference model. It is used for data network design, operation specifications, and troubleshooting.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Protocol and Reference Models

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The TCP/IP Model

The first layered protocol model for internetwork communications was created in the early 1970s and is referred to as the Internet model.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Communication Process


1. Creation of data 2. Segmentation and 3. 4. 5. 6. 7.
encapsulation Generation of the data onto the media Transportation Reception of the data Decapsulation and reassembe Passing this data to the destination application

Animation 2.4.4

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Protocol Data Units and Encapsulation



Encapsulation process: application data is passed down the protocol stack on its way to be transmitted across the network media, various protocols add information to it at each level The form that a piece of data takes at any layer is called a Protocol Data Unit (PDU). The PDUs are named according to the protocols of the TCP/IP suite: Data, Segement, Packet, Frame, bit

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: Peer-to-peer communications

In order for data to travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination. This form of communication is referred to as peer-to-peer. During this process, the protocols of each layer exchange information, called protocol data units (PDUs).
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: Detailed encapsulation process

5 conversion steps in order to encapsulate data: 1. Build the data. 2. Package the data for end-to-end transport. 3. Add the network IP address to the header. 4. Add the data link layer header and trailer. 5. Convert to bits for transmission.
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: Data Encapsulation Example

Application Header + data

Application Layer

Layer 4: Transport Layer

Layer 3: Network Layer Layer 2: Network Layer

010010100100100100111010010001101000

Layer 1: Physical Layer

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: HTTP Methods

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 1:

Refer to 2.4.6

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 2

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 3

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 4

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 5:

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 6:

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 7:

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 8:

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 9:

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Sending and Receiving Process

Step 10:

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The OSI Model


Initially the OSI model was
designed by the International Organization for Standardization (ISO) to provide a framework on which to build a suite of open systems protocols.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The OSI Model

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: OSI layers

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Extra: OSI layers

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Comparing the OSI Model with TCP/IP Model

TCP/IP is protocols model vs IOS is Reference Models

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Lab 2.4.8.2

In this activity, you will see how Packet Tracer uses the OSI Model as a reference to display the encapsulation details of a variety of the TCP/IP protocols.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Network Addressing

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Addressing in the Network


There are various types of addresses that must be included to
successfully deliver the data from a source application running on one host to the correct destination application running on another. Using the OSI model as a guide, we can see the different addresses and identifiers that are necessary at each layer.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Getting the Data to the End Device

During the process of encapsulation, address identifiers are added to


the data as it travels down the protocol stack on the source host. Multiple layers of addressing to ensure its delivery: Ethernet MAC Addresses, IP Addresses TCP/UDP Port numbers
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Getting the Data through the Internetwork

Encapsulation headers are used to manage communication in data networks

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Getting the Data to the Right Application

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Warriors of the Net


warriors-700-VBR_1.mpg

See also:
Proxy Server URL
H c vi n m ng Bach Khoa - Website: www.bkacad.com

Lab 2.6.1

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Lab 2.6.2: Introduction to Ethereal tool

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Lab 2.7.1

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Summary

H c vi n m ng Bach Khoa - Website: www.bkacad.com

H c vi n m ng Bach Khoa - Website: www.bkacad.com

You might also like