CCNA 2 Review of Cisco CCNA 1.

Slides:



Advertisements
Similar presentations
Internetwork An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network.
Advertisements

Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
Semester 3 Chapter 1 Review.
Institute of Technology Sligo - Dept of Computing Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Where We’ve Been.
OSI Reference Model An overview. Standards and the internet International Organization for Standardization ISO 70’s.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Chapter 2 Network Models.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 1: Internetworking.
Lecturer: Tamanna Haque Nipa
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Where We’ve Been Chapter 1—Review By: Allan Johnson.
OSI Model Honolulu Community College Cisco Academy Training Center
OSI Reference Model & Layered Communication Sritrusta Sukaridhoto.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
1 OSI Reference Model. 2 Agenda The Layered Model Layers 1 & 2: Physical & Data Link Layers Layer 3: Network Layer Layers 4–7: Transport, Session, Presentation,
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Data Communications and Networks
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
ENGS 112 Lecture 3 Packet Switching Chapter 3, Walrand WWW links, eg.
Application Presentation Session Transport Network Data-Link Physical THE OSI MODEL Where We’ve Been Chapter 1—Review By: Allan Johnson.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Jaringan Komputer_D3 TT
Network Models.
Instructor & Todd Lammle
OSI LAYERS.
Network Communication Overview
Jeopardy IST 201 Test 2 Review.
Computer Networks.
Local Area Networks Honolulu Community College
Connecting Network Components
Part I. Overview of Data Communications and Networking
The OSI Model and the TCP/IP Protocol Suite
What the OSI Protocol Layers Do
ISO/OSI Model and Collision Domain
Lecturer, Department of Computer Application
TCP/IP Transmission Control Protocol / Internet Protocol
Internetwork An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network.
DEPARTMENT OF COMPUTER SCIENCE
Instructor: Mr. Malik Zaib
The OSI Model and the TCP/IP Protocol Suite
Layered Task, OSI Model, TCP/IP Model
Chapter 3: Open Systems Interconnection (OSI) Model
Data Link Issues Relates to Lab 2.
Process-to-Process Delivery:
Semesters 1 & 2 Concept Review
Protocol layering and data
Network Model.
OSI Model OSI MODEL.
Data Link Layer 2019/2/19.
Network Architecture Models
Protocol layering and data
OSI Reference Model Kashif Ishaq.
The OSI Model and the TCP/IP Protocol Suite
OSI Reference Model Unit II
Process-to-Process Delivery: UDP, TCP
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Based on notes from D. Hollinger
Open System Interconnect (OSI).
LEARNING COMPUTER NETWORKS OSI Model (layers). Why a layered model?  Easier to teach communication process.  Speeds development, changes in one layer.
Presentation transcript:

CCNA 2 Review of Cisco CCNA 1

Review will cover… Review the OSI Model Encapsulation LAN Devices & Technologies Transport Layer IP Addressing

Open Systems Interconnected Reference Model Review The OSI Model Open Systems Interconnected Reference Model

Why A Layered Model? Reduces complexity- by dividing complex operations of internetworking into smaller subsets Accelerates evolution Simplifies teaching & learning

Application Layer Application Provides network services (processes) to applications. For example, a computer on a LAN can save files to a server using a ________________ supplied by NOSs like Novell. Network redirectors _________ __________________________________________________. Presentation Session Transport Network Data-Link Physical

Presentation Layer Application Provides __________________ ________________________. Code formatting includes __________________________ Basically, the presentation layer is responsible for representing data so that the source and destination can communicate at the application layer. Presentation Session Transport Network Data-Link Physical

Session Layer Application Provides inter-host communication by __________________________ ____________________________ Session uses dialog control and dialog separation to manage the session Some Session protocols: NFS (Network File System) SQL (Structured Query Language) RPC (Remote Procedure Call ) Presentation Session Transport Network Data-Link Physical

Transport Layer Application __________________________________________________ through the use of TCP. TCP ________________, adding a header with control information for sequencing and acknowledging packets received. The segment header also includes source and destination ports for upper-layer applications TCP is connection-oriented and uses __________________________. UDP is connectionless. UDP __________ __________________________________. Presentation Session Transport Network Data-Link Physical

Network Layer Application Responsible for ________________ _____________________________. Addressing is done through _______ protocols such as _________, IPX, AppleTalk, and DECnet. _______________ is done by using ______________ protocols such as ______________________, and BGP. __________ operate at the Network Layer Presentation Session Transport Network Data-Link Physical

Data-Link Layer Broken into two sublayers – ________ _________________ Application Broken into two sublayers – ________ _________________ Provides access to the media Handles error notification, network topology issues, and physically addressing the frame. Media Access Control through either... Deterministic— Non-deterministic— Presentation Session Transport Network Data-Link Physical

Physical Layer Provides electrical and functional means for activating and maintaining links between systems. Ex: ____________________ Includes the medium through which bits flow. Media can be... Application Presentation Session Transport Network Data-Link Physical

Encapsulation Example Application You type an email message. SMTP takes the data and passes it to the Presentation Layer. Presentation codes the data as ASCII and adds a header Session establishes a connection with the destination for the purpose of transporting the data and adds a header Presentation Session Transport Network Data-Link Physical

Encapsulation Example Transport segments the data using TCP and hands it to the Network Layer for addressing also adding a header Network addresses the packet using IP and adds a header of its own. Data-Link then encaps. the packet in a frame and addresses it for local delivery (MACs). This layer adds both header and a trailer The Physical layer sends the bits down the wire. Application Presentation Session Transport Network Data-Link Physical

LAN Devices and Technologies What does it do? Connects LAN segments; Filters traffic based on MAC addresses; and Separates collision domains based upon MAC addresses. What layer device?

Devices What does it do? What layer device? Since it is a multi-port bridge, it However, switches also offer

Devices What does it do? What layer device? Concentrates LAN connections from multiple devices into one location ________________ (a hub is a multi-port repeater)

Devices What layer device? What does it do? Re-encapsulates the packet in the appropriate frame format and _____________ ____________________ Uses ___________ addressing (i.e. IP addresses) to determine the path

Media Types

Three Most Commonly Used Today in Networking LAN Technologies Three Most Commonly Used Today in Networking

Ethernet/802.3 100 Mbps Ethernet is also known as ______ Ethernet. 10BASE-5, 10BASE-2, and 10BASE-T Ethernet are considered _______________ Ethernet. 100 Mbps Ethernet is also known as ______ Ethernet. 100BASE-TX, which is __________________, and 100BASE-FX, which is ______________________ based Gigabit Ethernet standards represent transmission using both fiber and copper media. ______________________________ (IEEE 802.3z) specifies a 1-Gbps full duplex over optical fiber The 1000BASE-T standard (IEEE 802.3ab) uses a media of Category 5 or higher UTP.

Ethernet/802.3 Ethernet is broadcast topology. What does that mean? Every devices on the Ethernet segment sees every frame. __________________________________________________________________________________________________: FFFF.FFFF.FFFF What is the main network traffic problem caused by Ethernet broadcast topologies? Ethernet topologies are also shared media What does this mean? Collisions are resolved or minimized using what device?

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) How CSMA/CD works: A node needing to transmit listens for activity on the media. If there is none, it transmits. The node continues to listen. A collision is detected by a constant elevation in voltage (a bit can only be a 0 or a 1--it cannot be a 2) The node generates a jam signal to tell all devices to stop transmitting for a random amount of time (back-off algorithm). When media is clear of any transmissions, the node can attempt to retransmit.

Address Resolution Protocol In broadcast topologies, we need a way to resolve ____________________________ ________________________ ARP is protocol where the sending device sends out a broadcast ARP request which says, “What’s your MAC address?” If the destination exists on the same LAN segment as the source, then ______________ ____________________________________

ARP cont… If the destination and source are separated by a router, the router will not forward the broadcast (an important function of routers). Router replies ________________________.

Transport Layer A Quick Review

Transport’s Two Protocols TCP- Transmission Control Protocol Synchronization of the connection ____________________________ Connection-oriented _____________________________ “Slow down, you’re overloading my memory buffer!!” _______________________________________________ Reliability & Error Recovery _________________: “How much data can I send before getting an acknowledgement?” Retransmission of lost or unacknowledged segments Applications: Email File Transfer

Transport’s Two Protocols cont… UDP User Datagram Protocol _____________________ ______________________ Applications: Routing Protocols Streaming Audio Video Conferencing

IP Addressing Subnetting Review

Logical Addressing At the network layer, we use logical, hierarchical addressing. With Internet Protocol (IP), this address is a ______ addressing scheme divided into ________ octets. Do you remember the classes 1st octet’s value? Class A: Class B: Class C: Class D: 224 - 239 (multicasting) Class E: 240 - 255 (experimental)

Network vs. Host Class A: 27 = 126 networks; 224 > 16 million hosts N H Class B : 214 = 16,384 networks; 216 = 65,536 hosts N H Class C : 221 > 2 million networks; 28 = 256 hosts N H

Why Subnet? Remember: we are usually dealing with a broadcast topology. Can you imagine what the network traffic overhead would be like on a network with 254 hosts trying to discover each others MAC addresses? Subnetting allows us to _________________ ___________________________, thereby improving network performance.

Borrowing Bits In order to subnet, we must borrow bits from the ______________ portion on the IP address. First, we must determine how many subnets we need and how many hosts per subnet. We do this through the power of 2 For example, I need 8 usable subnets from a Class C: How many host do we have?

Subnet Mask We determine the subnet mask by adding up the decimal value of the bits we borrowed. In the previous Class C example, we borrowed 4 bits. Below is the host octet showing the bits we borrowed and their decimal values. 128 64 32 16 8 4 2 1 1 We add up the decimal value of these bits and get ___. That’s the last non-zero octet of our subnet mask. So our subnet mask is ______________________

You should be able to: Calculate the last non-zero octet when given the number of bits borrowed. Determine the number of bits borrowed given the last non-zero octet. Determine the amount of bits left over for hosts and the number of host addresses available.

CIDR Notation Classless Interdomain Routing is a method of representing an IP address and its subnet mask with slash followed by a number. For example: 192.168.50.0/27 What do you think the 27 tells you? Also, you know 192 is a _________________________

Here’s a shortcut… Magic Number Given the IP address and the subnet mask, you can determine the first usable subnet quickly. By knowing the…. Magic Number

Magic Number Quick way to determine the first usable subnet. Generated by subtracting the last non-zero octet of the subnet mask from the number 256 In the previous example: 192.168.50.0/27 We figured out the subnet mask was: 255.255.255.224 224 is the ___________________________ The magic number is 256 - 224 = 32, so the

202.151.37.0/26 Subnet mask? Bits borrowed? Magic Number? First useable subnet address? Second (and last) useable subnet address?

194.53.45.0/29 What kind of address is 194.53.45.26? Magic number is Subnets are So 194.53.45.26 belongs to the What broadcast address would this host use to communicate with other devices on the same subnet?