IP NETWORKING NT2640
Name: Williams Obinkyereh MSc. IT, Post Masters Software Engineering DSC (Doctor of Computer Science) Student. Contacts: Phone: 612-516-9712 Email: obinkytt@yahoo.co.uk
Introduction Class introduction Introduction of Course Syllabus. Course Summary Lab Infrastructure (Mock) Course Plan Evaluation Academic integrity Discussion and questions about syllabus. Send me email: Name, phone number and a reliable email address.
Serial Line connection Cisco Device Icons Hub Network cloud Bridge Ethernet connection Switch Serial Line connection Router Wireless connection Access point Virtual Circuit
Mnemonic (Bottom to top) Mnemonic (Top to bottom) OSI Model Facts Layer Name Mnemonic (Bottom to top) Mnemonic (Top to bottom) Layer 7 Application Away All Layer 6 Presentation Pizza People Layer 5 Session Sausage Seem Layer 4 Transport Throw To Layer 3 Network Not Need Layer 2 Data Link Do Data Layer 1 Physical Please Processing
Purpose of the OSI Model Provides a common language or reference point between network professionals Divides networking tasks into logical layers for easier comprehension Allows specialization of features at different levels Aids in troubleshooting Promotes standards interoperability between networks and devices Provides modularity in networking features (developers can change features without changing the entire approach)
Limitations of OSI Model OSI layers are theoretical and do not actually perform real functions. Industry implementations rarely have a layer-to-layer correspondence with the OSI layers. Different protocols within the stack perform different functions that help send or receive the overall message. A particular protocol implementation may not represent every OSI layer (or may spread across multiple layers).
OSI and TCP/IP Model Compared 1
OSI and TCP/IP Model Compared 2 Application layer (also called the Process layer) corresponds to the Session, Presentation, and Application layers of the OSI model. Host-to-host layer is comparable to the Transport layer of the OSI model Responsible for error checking and reliable packet delivery. Internet layer is comparable to the Network layer of the OSI model. Involves addressing of hosts and making routing decisions.
OSI and TCP/IP Model Compared 3 Network Access layer corresponds to the functions of the Physical and Data Link layers of the OSI model. Responsible for describing the physical layout of the network and how messages are formatted on the transmission medium. Sometimes this layer is divided into the Network Access and the Physical layer
OSI, TCP/IP and TCP/IP Protocols Suite
Encapsulation Process Figure 1-14 OSI Encapsulation and Protocol Data Units © 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 12
Chapter 2: Modern Ethernet LANs Ethernet refers to a family of standards that together define the physical and data link layers. Different standards vary in the speed supported, with speeds from 10 (Mbps), 100 Mbps, and 1000 Mbps to (1 Gbps) being common today. The standards also differ as far as the types of cabling and the allowed length of the cabling. The IEEE separates the functions into two sublayers: The 802.3 Media Access Control (MAC) sublayer The 802.2 Logical Link Control (LLC) sublayer © 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 13
Table 3-2 Today’s Most Common Types of Ethernet Common Name Speed Alternative Name Name of IEEE Standard Cable Type Maximum Length Ethernet 10 Mbps 10BASE-T IEEE 802.3 Copper 100 m Fast Ethernet 100 Mbps 100BASE-TX IEEE 802.3u Copper 100 m Gigabit Ethernet 1000 Mbps 1000BASE-T IEEE 802.3ab Copper 100 m Gigabit Ethernet 1000 Mbps 1000BASE-LX IEEE 802.3z Fiber 5 km (LX) 1000BASE-SX 550 m (SX) To build and create a modern LAN using any of the UTP-based types of Ethernet LANs listed in Table 3-2, you need the following components: Computers that have an Ethernet network interface card (NIC) installed Either an Ethernet hub or Ethernet switch UTP cables to connect each PC to the hub or switch © 2008 ITT Educational Services Inc. IT-320 Wan Technologies: Unit 1: Slide 14
A Typical Simple LAN Figure 3-1 Typical Small Modern LAN The NICs cannot be seen, because they reside in the PCs. the lines represent the UTP cabling, and the icon in the center of the figure represents a LAN switch. © 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 15
Small Ethernet 10BASE2 Network The “rules” are based on CSMA/CD. If two or more signals were sent at the same time, they would overlap and collide. This algorithm, known as the “Carrier Sensing Multiple Access with Collision Detection” (CSMA/CD). CSMA/CD is similar to what happens in a meeting room with many attendees. When one person talks and the rest listen. © 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 16
Ethernet UTP Cabling UTP Cables and RJ-45 Connectors © 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 17
IP Addressing IP addresses allow hosts to participate on IP based networks 32-bit binary number represented as four octets (four 8-bit values). Each octet is separated by a period.
IPv4 ADDRESSES An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.
IP Addressing 2 IP addresses can be represented in one of two ways: Decimal (for example 131.107.2.200). In decimal notation, each octet must be between 0 and 255. Binary (for example 10000011.01101011.00000010.11001000). In binary notation, each octet is an 8-digit number.
IP Addressing 3 The IP address includes both the network and the host address. Each IP address has an implied address class that can be used to infer the network portion of the address. The subnet mask is a 32-bit number that is associated with each IP address that identifies the network portion of the address A simple mask might be 255.255.255.0.
Classful IP Addressing In classful addressing, the address space is divided into five classes: A, B, C, D, and E.
Classful IP Addressin Class Address Range First Octet Range Default Subnet Mask A 1.0.0.0 to 126.255.255.255 1-126 (00000001--01111110 binary) 255.0.0.0 B 128.0.0.0 to 191.255.255.255 128-191 (10000000--10111111 binary) 255.255.0.0 C 192.0.0.0 to 223.255.255.255 192-223 (11000000--11011111 binary) 255.255.255.0 D 224.0.0.0 to 239.255.255.255 224-239 (11100000--11101111 binary) n/a E 240.0.0.0 to 255.255.255.255 240-255 (11110000--11111111 binary)
Hosts Per Network There are only 126 Class A network IDs (most of these addresses are already assigned). Each class A address gives you 16,777,214 hosts per network. There are 16,384 Class B network IDs. Each class B address gives you 65,534 hosts per network. There are 2,097,152 Class C network IDs. Each class C address gives you 254 hosts per network.
Loop Back Address Addresses in the 127.0.0.0 range are reserved for the local host (in other words "this" host or the host you're currently working at). The most commonly-used address is 127.0.0.1 which is the loopback address.
Private IP Address The following address ranges have been reserved for private use: 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 Use addresses in these ranges for your private networks
Classless IP Addressing In IPv4 addressing, a block of addresses can be defined as x.y.z.t /n in which x.y.z.t defines one of the addresses and the /n defines the mask. Also known as Classless Inter-Domain Routing