You are on page 1of 60

Lesson 1:

Internetworking

Network Fundamentals

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Objectives
 Internetworking Basics
 Layered Models
 The OSI Model
 Ethernet Networking
 Data Encapsulation
 Cisco’s Three-Layer Model
 Written Labs and Review Questions

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Internetworking Basic

 Communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Internetworking Basic
 Communication
 Communication being with a message or information that
must be sent from one individual or device to another.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Internetworking Basic
 What is Network?
 The network is a system where share the information or work
together.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Internetworking Basic
 Networks in Our Past and Daily Lives

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Internetworking Basic
 How Networks Impact Daily Life
 Describe ways communication over a network supports the
way we play

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Internetworking Basic
 How Networks Impact Daily Life
– Instant messaging
• Real time communication
between 2 or more
people based on typed text
– Weblogs (Blogs)
• Web pages created
by an individual
– Broadcasting
• Website that contains
audio files available
for downloading

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Internetworking Basic
 Types of Networks
The two most common types of network infrastructures
are:
 Local Area Network (LAN)
 Wide Area Network (WAN).
Other types of networks include:
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Internetworking Basic
 Types of Networks
 Local Area Network (LAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Internetworking Basic
 Types of Networks
 Wide Area Network (WAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Internetworking Basic
 The Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Internetworking Basic
 Components of a Network
There are three categories of network components:
 Devices
 Media
 Services

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Internetworking Basic
 End Devices
Some examples of end devices are:
 Computers (work stations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 Tele Presence end point.
 Security cameras
 Mobile handheld devices (such as smartphones, tablets,
PDAs(Personal Digital Assistant), and wireless debit / credit card
readers and barcode scanners)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Internetworking Basic
 Network Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Internetworking Basic
 Network Representations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Internetworking Basic
 Data Networking Role, Components, and
Challenges

–Devices
•These are used to
communicate with one
another
–Medium
•This is how the devices
are connected together
–Messages
•Information that
travels over the medium
–Rules
•Governs how messages
flow across network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Layer Model

 Layer Model refers how to build up a communication between


computer and other devices.
 It addresses all the processes required for effective
communication and divides these processes into logical groupings
called layers.
 When a communication system is designed in this manner, it’s
known as layered architecture.

 Layer Models
-OSI Model
-TCP/IP Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Layer Model

 The OSI & TCP/IP Reference Model


 OSI means Open System Interconnected Model.
 TCP/IP means Transmission Control Protocol
-Depend on DoD Model (Department of Defense).
 The reference isn’t a physical model. Rather, it’s a
set of guidelines that application developers can use
to create and implement applications that run on a
network.
 It also provides a framework for creating and
implementing networking standards, devices, and
internetworking schemes.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
 The Internet protocol suite is the conceptual model and set of
communications protocols used on the Internet and similar
computer networks. It is commonly known as TCP/IP because the
foundational protocols in the suite are the Transmission Control
Protocol (TCP) and the Internet Protocol (IP). It is occasionally
known as the Department of Defense (DoD) model, because the
development of the networking method was funded by the United
States Department of Defense through DARPA.
 From 1973 to 1974, Cerf's networking research group at Stanford
worked out details of the idea, resulting in the first TCP
specification
 From 1973 to 1974, Cerf's networking research group at Stanford
worked out details of the idea, resulting in the first TCP
specification

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Layer Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Layer Model
 The OSI Model
The upper layers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Layer Model
 The OSI Model
The lower layers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Layer Model
 The OSI Model
The Layer Functions

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Layer Model
 The TCP/IP Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Layer Model
 Connection-Oriented Communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Layer Model
 Windowing

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Layer Model
 Data Link Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Layer Model

 Data Link Sub layers

 Media Access Control (MAC) 802.3 Defines how packets


are placed on the media.

 Logical Link Control (LLC) 802.2 Responsible for


identifying Network layer protocols and then encapsulating
them.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Layer Model

 A hub in an network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Layer Model
 A Switch in an network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Ethernet Networking

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Ethernet Networking

 Ethernet is a contention-based media access


method that allows all hosts on a network to
share the same bandwidth of a link.

 Ethernet networking uses Carrier Sense


Multiple Access with Collision Detection
(CSMA/CD), a protocol that helps devices
share the bandwidth evenly without having
two devices transmit at the same time on the
network medium.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Ethernet Networking

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Ethernet Networking
 Ethernet – Communication through the LAN

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Ethernet Networking

The success of Ethernet is due to the following


factors:
 Simplicity and ease of maintenance
 Ability to incorporate new technologies
 Reliability
 Low cost of installation and upgrade
 Fast Ethernet and Gigabit Ethernet, into an existing
network infrastructure.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Ethernet Networking
 Duplex Communication
-Half Duplex
-Full Duplex
 Half-duplex Ethernet is defined in the original 802.3
Ethernet; Cisco says it uses only one wire pair with a
digital signal running in both directions on the wire.

 Full-duplex Ethernet uses two pairs of wires instead of


one wire pair like half duplex. And full duplex uses a
point-to-point connection between the transmitter of
the transmitting device and the receiver of the receiving
device.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Ethernet Networking
 Full-duplex Ethernet can be used in three situations:
 With a connection from a switch to a host
 With a connection from a switch to a switch
 With a connection from a host to a host, Switch to Router,
Router to Router, etc. using a crossover cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Ethernet Networking
 Ethernet Standard
 The IEEE 802.3 and original Ethernet Physical layer specifications.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Ethernet Networking

 Ethernet Collision Management

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Ethernet Networking

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Ethernet Networking

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Ethernet Networking
 Ethernet Addressing
 The MAC, or hardware, address is a 48-bit (6-byte)
address written in a hexadecimal format.

− The Organizationally Unique Identifier (OUI)


− Individual/Group (I/G)
− global/local (G/L)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Ethernet Cabling

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Ethernet Cabling

 Three types of Ethernet cables are available:

 Straight-through cable
 Crossover cable
 Rolled cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Ethernet Cabling
 Straight-through cable

 The straight-through cable is used to connect


− Host to switch or hub
− Router to switch or hub

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Ethernet Cabling
 Crossover Cable
 The crossover cable can be used to connect
− Switch to switch
− Hub to hub
− Host to host
− Hub to switch
− Router direct to host

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Ethernet Cabling
 Rolled Cable
 Although rolled cable isn’t used to connect any
Ethernet connections together, you can use a rolled
Ethernet cable to connect a host to a router console
serial communication (com) port.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Ethernet Cabling
 UTP cabling connections are specified by the Electronics
Industry Alliance/Telecommunications Industry
Association (EIA/TIA).

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Ethernet Cabling

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Data Encapsulation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Data Encapsulation

FCS- Frame Check Sequence

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Data Encapsulation

 When a host transmits data across a network to


another device, the data goes through encapsulation
 It is wrapped with protocol information at each layer
of the OSI model.
 Each layer communicates only with its peer layer on
the receiving device.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Data Encapsulation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Data Encapsulation
 Port Numbers
 The Transport layer uses port numbers to define both
the virtual circuit and the upper-layer process.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Cisco’s Three-Layer Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Cisco’s Three-Layer Model
 The following are the three layers and their typical
functions:
 The core layer: backbone
 The distribution layer: routing
 The access layer: switching

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Cisco’s Three-Layer Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Thank You

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60

You might also like