ip networking nt2640. name: williams obinkyereh msc. it, post masters software engineering dsc...

28
IP NETWORKING NT2640

Upload: emory-owens

Post on 31-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

IP NETWORKING

NT2640

• Name: Williams Obinkyereh MSc. IT, Post Masters Software Engineering DSC (Doctor of Computer Science) Student.• Contacts: • Phone: 612-516-9712• Email: [email protected]

Introduction• Class introduction• Introduction of Course Syllabus.

– Course Summary– Lab Infrastructure (Mock)– Course Plan– Evaluation– Academic integrity

• Discussion and questions about syllabus.• Send me email: Name, phone number and a

reliable email address.

Cisco Device Icons

Hub Network cloud

BridgeEthernet

connection

SwitchSerial Line connection

RouterWireless

connection

Access pointVirtual Circuit

OSI Model Facts

Layer NameMnemonic

(Bottom to top)Mnemonic

(Top to bottom)

Layer 7 Application Away All

Layer 6 Presentation Pizza People

Layer 5 Session Sausage Seem

Layer 4 Transport Throw To

Layer 3 Network Not Need

Layer 2 Data Link Do Data

Layer 1 Physical Please Processing

Purpose of the OSI Model• Provides a common language or reference point

between network professionals • Divides networking tasks into logical layers for easier

comprehension • Allows specialization of features at different levels • Aids in troubleshooting • Promotes standards interoperability between

networks and devices • Provides modularity in networking features

(developers can change features without changing the entire approach)

Limitations of OSI Model

• OSI layers are theoretical and do not actually perform real functions.

• Industry implementations rarely have a layer-to-layer correspondence with the OSI layers.

• Different protocols within the stack perform different functions that help send or receive the overall message.

• A particular protocol implementation may not represent every OSI layer (or may spread across multiple layers).

OSI and TCP/IP Model Compared 1

OSI and TCP/IP Model Compared 2

• Application layer (also called the Process layer) corresponds to the Session, Presentation, and Application layers of the OSI model.

• Host-to-host layer is comparable to the Transport layer of the OSI model

• Responsible for error checking and reliable packet delivery.

• Internet layer is comparable to the Network layer of the OSI model.

• Involves addressing of hosts and making routing decisions.

OSI and TCP/IP Model Compared 3

• Network Access layer corresponds to the functions of the Physical and Data Link layers of the OSI model.

• Responsible for describing the physical layout of the network and how messages are formatted on the transmission medium.

• Sometimes this layer is divided into the Network Access and the Physical layer

OSI, TCP/IP and TCP/IP Protocols Suite

Encapsulation Process• Figure 1-14 OSI Encapsulation and Protocol Data Units

© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 12

Chapter 2: Modern Ethernet LANs• Ethernet refers to a family of standards that together

define the physical and data link layers. • Different standards vary in the speed supported, with

speeds from 10 (Mbps), 100 Mbps, and 1000 Mbps to (1 Gbps) being common today.

• The standards also differ as far as the types of cabling and the allowed length of the cabling.

• The IEEE separates the functions into two sublayers:– The 802.3 Media Access Control (MAC) sublayer– The 802.2 Logical Link Control (LLC) sublayer© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 13

Table 3-2 Today’s Most Common Types of Ethernet

Common Name Speed Alternative Name Name of IEEE Standard Cable Type Maximum Length Ethernet 10 Mbps 10BASE-T IEEE 802.3 Copper 100 m Fast Ethernet 100 Mbps 100BASE-TX IEEE 802.3u Copper 100 m Gigabit Ethernet 1000 Mbps 1000BASE-T IEEE 802.3ab Copper 100 m Gigabit Ethernet 1000 Mbps 1000BASE-LX IEEE 802.3z Fiber 5 km (LX) 1000BASE-SX 550 m (SX)

• To build and create a modern LAN using any of the UTP-based types of Ethernet LANs listed in Table 3-2, you need the following components:– Computers that have an Ethernet network interface card (NIC) installed– Either an Ethernet hub or Ethernet switch– UTP cables to connect each PC to the hub or switch

© 2008 ITT Educational Services Inc. IT-320 Wan Technologies: Unit 1: Slide 14

A Typical Simple LAN• Figure 3-1 Typical Small Modern LAN

– The NICs cannot be seen, because they reside in the PCs.– the lines represent the UTP cabling, and the icon in the

center of the figure represents a LAN switch.

© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 15

Small Ethernet 10BASE2 Network• The “rules” are based on CSMA/CD.• If two or more signals were sent at the same time,

they would overlap and collide.• This algorithm, known as the “Carrier Sensing

Multiple Access with Collision Detection” (CSMA/CD).

• CSMA/CD is similar to what happens in a meeting room with many attendees.

• When one person talks and the rest listen.© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 16

Ethernet UTP Cabling

• UTP Cables and RJ-45 Connectors

© 2011 ITT Educational Services Inc. NT-2640 Advanced Networking: Unit 1: Slide 17

IP Addressing

• IP addresses allow hosts to participate on IP based networks

• 32-bit binary number represented as four octets (four 8-bit values). Each octet is separated by a period.

IPv4 ADDRESSESIPv4 ADDRESSES

• An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.

IP Addressing 2

• IP addresses can be represented in one of two ways:

• Decimal (for example 131.107.2.200). In decimal notation, each octet must be between 0 and 255.

• Binary (for example 10000011.01101011.00000010.11001000). In binary notation, each octet is an 8-digit number.

IP Addressing 3• The IP address includes both the network and

the host address. • Each IP address has an implied address class

that can be used to infer the network portion of the address.

• The subnet mask is a 32-bit number that is associated with each IP address that identifies the network portion of the address

• A simple mask might be 255.255.255.0.

Classful IP Addressing

• In classful addressing, the address space is divided into five classes:

• A, B, C, D, and E.

Classful IP Addressin

Class Address Range First Octet RangeDefault Subnet

Mask

A 1.0.0.0 to 126.255.255.2551-126

(00000001--01111110 binary)

255.0.0.0

B 128.0.0.0 to 191.255.255.255128-191

(10000000--10111111 binary)

255.255.0.0

C 192.0.0.0 to 223.255.255.255192-223

(11000000--11011111 binary)

255.255.255.0

D 224.0.0.0 to 239.255.255.255224-239

(11100000--11101111 binary)

n/a

E 240.0.0.0 to 255.255.255.255240-255

(11110000--11111111 binary)

n/a

Hosts Per Network

• There are only 126 Class A network IDs (most of these addresses are already assigned). Each class A address gives you 16,777,214 hosts per network.

• There are 16,384 Class B network IDs. Each class B address gives you 65,534 hosts per network.

• There are 2,097,152 Class C network IDs. Each class C address gives you 254 hosts per network.

Loop Back Address

• Addresses in the 127.0.0.0 range are reserved for the local host (in other words "this" host or the host you're currently working at). The most commonly-used address is 127.0.0.1 which is the loopback address.

Private IP Address

• The following address ranges have been reserved for private use:

• 10.0.0.0 to 10.255.255.255 • 172.16.0.0 to 172.31.255.255 • 192.168.0.0 to 192.168.255.255 • Use addresses in these ranges for your private

networks

Classless IP Addressing

In IPv4 addressing, a block of addresses can be defined as

x.y.z.t /nin which x.y.z.t defines one of the

addresses and the /n defines the mask.Also known as

Classless Inter-Domain Routing