NET 101 CISCO Semester 1 Chapter 2 – Networking Fundamentals

Download Report

Transcript NET 101 CISCO Semester 1 Chapter 2 – Networking Fundamentals

NET 101
CISCO Semester 1
Chapter 2 – Networking Fundamentals
Karl Wick - SUNY Ulster
Network Terminology
Network Terminology
 Network: An interconnected system of
objects
 Bandwidth: The amount of data that can be
sent along a path in a given amount of time
 LAN: Local Area Network
 MAN: Municipal Area Network
 WAN: Wide Area network
Digital Bandwidth
 How much information can flow from one
place to another in a given time
 Bits per second
 kilo, mega or giga bits per second
 More Bandwidth = Better Performance
Bandwidth
 Is limited by hardware and physics
 Has a cost. (Sometimes Substantial)
 Is critical to good performance
 Demand is growing
 Pipe Analogy
Throughput
 Throughput <= Bandwidth
 Highway Analogy
Typical LAN Throughput
 Category 5 Twisted Pair Cable
– 10Mbps
– 100Mbps
– 1000Mbps
 Optical Fiber: 1000Mbps
 Coaxial Cable: 10Mbps
Typical WAN Throughput
 ISDN: 128kbps
 DSL: Variable – 128kbps to 6.1Mbps
 Frame Relay: Variable – 128k to 44.7Mbps
 T1: 1.544 Mbps
 T3: 44.7 Mbps
 OC3: 155.25 Mbps
 OC48: 2.488 Gbps
E1: 2.048 Mbps
E3: 34.4Mbps
Throughput
 Try to answer the following question, using the
formula Throughput = FileSize /Bandwidth.
 Be sure to convert units of measurement as
necessary.
 Would it take less time to send the contents of a
floppy disk full of data (1.44 MB) over an ISDN
line, or to send the contents of a ten GB hard drive
full of data over an OC-48 line?
Solution to Exercise
 1440 kbytes / 128k bytes per second =
11.25 seconds for the file.
 10,000,000 kbytes / 2,488,000 kbytes per
second = 4.02 seconds
Models
The Seven Layer OSI Model
 7 Application
 6 Presentation
 5 Session
 Reduces Complexity
 Standardizes Interfaces
 Facilitates Modularity
 4 Transport
 Ensures Interoperability
 3 Network
 Accelerates Evolution
 2 Data Link
 Simplifies Learning
 1 Physical
The Seven Layer OSI Model
 7 Application
 6 Presentation
 5 Session
 4 Transport
 3 Network
 2 Data Link
 1 Physical
Data Transport Rules
Logical Addresses
Fixed Addresses
Wires and Hardware
Network Devices
Host Devices
PC
MAC
The symbols are
NOT standard
throughout the
industry.
Printer
Server
Most are easy to
figure out.
Host Devices
 Devices that connect directly to a network
segment are referred to as hosts.
 These hosts include computers, both clients
and servers, printers, scanners, and many
other user devices.
 These devices provide the users with
connection to the network.
 The users share, create, and obtain
information across the network.
NICs
NICs adapt the host device
to the network medium.
NICs are considered Layer
2 devices
This address is used to
control data
Each individual NIC throughout communication for the
the world carries a unique code, host on the network.
called a Media Access Control
(MAC) address.
Media
 The basic functions of media
are to carry a flow of
information, in the form of bits
and bytes, through a LAN.
 Coaxial cable, optical fiber,
and even free space can carry
network signals, however, the
principal medium we will
study is called Category 5
unshielded twisted-pair cable
(CAT 5 UTP).
Media
 Patch cables, patch panels, and other
interconnection components are considered
passive Layer 1 components because they
simply provide some sort of conducting path.
 Passive components do not require a power
source.
Repeaters
The purpose of a
repeater is regenerate
and retime network
signals at the bit level
to allow them to travel
a longer distance on
the media.
Repeaters
 Repeaters are single-port "in" and single-
port "out" devices.
 Repeaters are classified as Layer 1 devices,
in the OSI model, because they act only on
the bit level and look at no other
information.
 They are active devices because they
require power to work.
The 5-4-3 Rule
 This rule states that you can connect five
network segments end-to-end using four
repeaters but only three segments can have
hosts (computers) on them.
Hubs
 A hub is a repeater with
multiple ports.
 Any input signal gets
sent to all output ports.
 Allow concentration of
signals at a central
point
Bridges
 A bridge is a layer 2 device
designed to connect two LAN
segments.
 The purpose of a bridge is to
filter traffic on a LAN, to keep
local traffic local, yet allow
connectivity to other parts
(segments) of the LAN for
traffic that has been directed
there.
Bridges
 The bridge keeps track of which MAC
addresses are on each side of the bridge and
makes its forwarding decisions based on
this MAC address list.
Switches
Switches
 A Switch is a device like a bridge with many
ports.
 In fact a switch is called a multi-port bridge, just
like a hub is called a multi-port repeater.
 They are used to segment networks into smaller
parts as well as to provide connectivity.
 The difference between the hub and switch is
that switches make decisions based on MAC
addresses and hubs don't make decisions at all.
Switches
 Because of the decisions that switches make, they
make a LAN much more efficient.
 They do this by "switching" data only out the port
to which the proper host is connected. In contrast,
a hub will send the data out all of its ports so that
all of the hosts have to see and process (accept or
reject) all of the data on the LAN.
Routers
 Inter-network data
flow.
 Best path
determination
 Switching to
proper port
 Translation
 Regeneration
 Security
Routers
 Routers make decisions based on groups of network
addresses (Classes) as opposed to the individual MAC
addresses like bridges and switches do.
 Routers can also connect different media technologies, such
as Ethernet, Token-ring, and FDDI.
 Routers have become the backbone of the Internet, running
the IP protocol.
 The purpose of a router is to examine incoming packets
(layer 3 data), choose the best path for them through the
network, and then switch them to the best outgoing port.
Clouds
The purpose of the cloud is
to represent a large group of
details that are not pertinent
to a situation, or
description, at a given time.
Network Topology
The structure of the Network
Physical and Logical
Topology
 There are two parts to the topology
definition:
– The physical topology, which is the actual
layout of the wire (media), and
– The logical topology, which defines how the
media is accessed by the hosts.
Physical Topologies
Logical Topology
 The logical topology of a network is how
the hosts communicate across the medium.
 The two most common types of logical
topologies are Broadcast and Tokenpassing.
Broadcast Topology
 Broadcast topology simply means that each host
sends its data to all other hosts on the network
medium.
 There is no order the stations follow to use the
network, it is first come, first serve.
 Controlled Chaos!
 This is the way that Ethernet works and you will
learn much more about this later in the semester.
Token Passing Topology
 Token-passing controls network access by
passing an electronic token sequentially to
each host.
 When a host receives the token, only that
host can send data on the network.
 If the host has no data to send, it passes the
token to the next host and the process
repeats itself.
Network Protocols
Rules of the Road
Protocols
 How the physical network is built
 How computers connect to the network
 How the data is formatted for transmission
 How that data is sent
 How to deal with errors
The LAN
The LAN
The WAN
WAN Technologies
 Dial-up Modems
 Integrated Services Digital Network (ISDN)
 Digital Subscriber Line (DSL)
 Frame Relay
 US (T) and Europe (E) Carrier Series – T1, E1,
T3, E3
 Synchronous Optical Network (SONET)
 Cable Modem
The MAN
The SAN
 A SAN is a dedicated, high-performance
network used to move data between servers
and storage resources.
 Because it is a separate, dedicated network,
it avoids any traffic conflict between clients
and servers.
The SAN
 Storage Area Network
 Performance – SANs enable
concurrent access of disk or
tape arrays by two or more
servers at high speeds,
enhanced system performance.
 Availability –data can be
mirrored using a SAN up to 10
kilometers (km) or 6.2 miles
away.
 Scalability
VPN
The VPN
 A VPN is a private network that is
constructed within a public network
infrastructure such as the global Internet.
 Using VPN, a telecommuter can access the
network of the company headquarters
through the Internet by building a secure
tunnel between the telecommuter’s PC and
a VPN router in the headquarters.
The VPN
 A VPN is a service that offers secure,
reliable connectivity over a shared public
network infrastructure such as the Internet.
 VPNs maintain the same security and
management policies as a private network.
 They are the most cost-effective method of
establishing a point-to-point connection
between remote users and an enterprise
customer's network.
Intranet / Extranet
Layered Models
OSI Model released in 1981 by the ISO
(Not to be confused with the IOS)
The Seven Layer OSI Model
 7 Application
 6 Presentation
 5 Session
 Reduces Complexity
 Standardizes Interfaces
 Facilitates Modularity
 4 Transport
 Ensures Interoperability
 3 Network
 Accelerates Evolution
 2 Data Link
 Simplifies Learning
 1 Physical
Layers in an Abstract Model
 What is flowing?
 In What forms does it exist?
 What rules govern the flow?
 Where does the flow occur?
Peer to Peer Networking and PDUs
The OSI Model
See 2.3.4 Drag and Drop Exercise
OSI model vs TCP/IP Model
 Application
 Application
 Presentation
 Session
 Transport
 Transport
 Network
 Internet
 Data Link
 Network Access
 Physical
Some TCP/IP Protocols
Application
Transport
Internet
Network
Access
Data Encapsulation
Layers and Hardware
 Layer 1-7 :
Workstations
 Layer 3: Router
– IP (Logical Addresses)
 Layer 2: Bridge, Switch
– Hardware (MAC) Addresses
 Layer 1: Media, Repeater, Hub, Transceiver
Summary
 Bandwidth
 LAN, MAN, WAN, SAN “can you eat
Green Eggs and Ham?”
 Models
 Protocol Data Units / Encapsulation
 VPN
 Terminology and Symbology