1 / 70

Week One Agenda

Week One Agenda. Announcements Course objective Review current week information Review terms. Week One. Announcements ITEC275 Instructor for Network Design: Professor Bob D’Andrea Home phone number: 614.898.0457 Cell phone number: 614.519.5853 dandrea@franklin.edu

peers
Download Presentation

Week One Agenda

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Week One Agenda Announcements Course objective Review current week information Review terms

  2. Week One Announcements ITEC275 Instructor for Network Design: Professor Bob D’Andrea Home phone number: 614.898.0457 Cell phone number: 614.519.5853 dandrea@franklin.edu Program Chair of Information and Technology: Mr. Todd Whittaker Phone # 614.947.6110 whittakt@franklin.edu

  3. Week One Announcements • Submit all assignments in drop box. In addition, send an email notification to me that your assignment is ready to be graded. • The mid-term will be administered by the Student Learning Center, June 13 through 18. The exam is electronic. • April 16, 2011 vacation • Memorial Day April 30 (No School) Lab Assignment • Individually • Class

  4. Week One Announcements Email a notification when an assignment is completed and ready to be graded. The “Subject” line of your email notification should be one of the following formats: 1. Email format for completed lab assignments: <User name> <Section Number/ND> <Assign 1-3> Example: dandrear V1FF/ND Assign. 1-3 2. Email format for questions: <User name> <Section Number/ND> <Question> Example: dandrear V1FF/ND Question

  5. Week One Announcements Instructor commitment • Respond daily to student emails. • Post exam grades and lab assignments as quickly as possible in the official electronic grade book. • Post student mid-term and final exam status on the Announcement page as soon after each exam has been received from the Student Learning Center (SLC).

  6. Week One Announcements Weekly Recorded Power Point Presentations http://cs.franklin.edu/~dandrear/itec275/Summer_2011_Network_Design_Presentations Power Point file naming convention and format: Example: Week_One_Net_Design.pptx Week_One_Net_Design_ppt.ppt Weekly Power Point files will be available on Monday mornings the day of class for printing.

  7. Week One Course Objective • This course was developed to parallel the Certified Design Professional (CCDP) certification. • Build upon the base level of the CCNA knowledge and experience. • Design simple routed LAN, routed WAN, and switched LAN and ATM networks. • Use Network-layer lists. • Filter with access lists. • Use and propagate VLAN. • Evaluate existing network components.

  8. Week One History of Cisco Len and Sandy Bosack, 1980s Worked in different departments at Stanford University. They were having trouble getting their individual systems to communicate. They built a gateway server that made it easier for their disparate computers to communicate using the IP protocol.

  9. Week One Internetworking Basics Networks and networking have grown exponentially over the last 30 years. This technology has evolved at light speed just to keep up with the huge increases in basic mission-critical user needs. Currently, there is a basic need to use VoIP, increase transmission speeds, and combine voice, data, and video for medium and enterprise sized networks. This will involve the design of new and/or the re-design of existing networks.

  10. Week One Internetworking Basics What is a network? It is where data is sent and received via cables (e.g., telephone lines or fiber optics ) or wireless relay systems. Networks contain a variety of hardware devices and software implementations to accomplish transmitting data. A network makes it possible for people or devices to communicate with each other near and far from each other.

  11. Week One Internetworking Basics Internetwork is a collection of individual networks connected by networking devices that function as a single large network Protocol is a set of rules computers follow in order to communicate with each other. Frame is a set of data that includes addressing and control information and is transmitted and received between network devices.

  12. Week One Internetworking Basics Best-effort delivery means that the protocol will not check to see whether the data was delivered intact. Multiplexing allows many applications to use the same physical connection. Encapsulation is the technique used by layered protocols in which a layer adds header information to the Protocol Data Unit (PDU) from the layer above.

  13. Week One Internetworking Basics Network segmentation is the breaking up of a large network into smaller networks. Routers, switches, and bridges are used to create network segmentation. Routers are used to connect networks together and route packets of data from one network to another. By default, routers break up broadcast domains.

  14. Week One Internetworking Basics Switch is a device responsible for multiple functions such as filtering, flooding, and sending frames. It works using the destination address of individual frames. By default, switches break up collision domains. Bridge is a device for connecting two segments of a network and transmitting packets between them. Both segments must use identical protocols to communicate. Their purpose is to filter, send, or flood any incoming frame, based on the MAC address of that particular frame.

  15. Week One Internetworking Basics Broadcast domain is a group of devices receiving broadcast frames initiating from any device within the group. Because they do not forward broadcast frames, broadcast domains are generally surrounded by routers. Collision domain is the network area in Ethernet over which frames that have collided will spread. Collisions are propagated by hubs and repeaters, but not by LAN switches, routers, or bridges.

  16. Week One Internetworking Basics What is a collision? The effect of two nodes sending transmissions simultaneously in Ethernet. When they meet on the physical media, the frames from each node colide and are damaged.

  17. Week One Internetworking Models Open Systems Interconnection (OSI) reference model was introduced in the late 1970s. Created by the International Organization for Standardization (IOS). Why was standardization needed? This standard was created to allow computing installations to incorporate multiple vendor hardware and software products within their operation. Prior to this standardization, computers could only communicate with computers from the same manufacturer.

  18. Week One Layered Approach A reference model is a conceptual blueprint of how communications should take place. It addresses all the processes required for effective communication and divides these processes into logical groupings called layers. Designs such as the OSI Model, are known as layered architecture. Example: Start up company. Identify the tasks involved. Group similar tasks into departments. These departments are a metaphor for the layers in this scenario.

  19. Week One Layered Approach Similarly, software developers can use a reference model to understand computer communication processes and see what types of functions need to be accomplished on any one layer. If they are developing a protocol for a certain layer, they only want to focus themselves with this specific layers functions, not those of any other layer. Another layer and protocol will handle the other functions.

  20. Week One Layered Approach Advantages of using the OSI layered model are: Allows multiple-vendor development through standardization of network components. Allows various types of network hardware and software to communicate. Allows changes in one layer from affecting other layers, so it doesn’t hamper development.

  21. Week One OSI Model The top three layers define how the applications within the end stations will communicate with each other and with users. The bottom four layers define how data is transmitted end-to-end. Application provides a user interface Presentation presents data and handles encryption Session keeps different applications data separate. Transport provides reliable or unreliable delivery. Network provides logical addressing Data Link provides access to media using MAC address Physical moves bits between devices, specifies voltage, wire speed, and pin-out of cables.

  22. Week One OSI Model Application – File transfer, print, database, and application Presentation – Data encryption, compression, and translation services Session – Dialog control Transport – End-to-end connection Network – Routing of packets Data Link - Movement of frames Physical – Physical topology

  23. Week One OSI Model Network devices that operate at all seven layers of the OSI model include: Network management stations Web servers Gateways Network hosts

  24. Week One OSI Model Flow control is implemented at the transport layer to prevent the receiving host buffers from being overflowed by the sending host. This is an event that can result in data loss. Reliable data transport employs a connection-oriented communications session between systems, and the protocols involved ensure that the following is achieved: The segment delivered are acknowledged back to the sender upon their reception. Any segments not acknowledged are retransmitted. Segments are sequenced back into proper order upon arrival at their destination. A manageable data flow is maintained in order to avoid congestion overloading, and data loss.

  25. Week One OSI Model Connection-Oriented communications is a transport operation. One device first establishes a connection-oriented session with its peer system. This is called three-way handshake. Data is then transferred, and when finished, a call termination takes place to tear down the virtual circuit.

  26. Week One OSI Model Connection-oriented communications three-way hand shake. Synchronize -> Negotiate connection <-> Synchronize <- Acknowledge -> Connection established Data transfer (send segments) <->

  27. Week One OSI Model Buffer is used when a machine receives a flood of datagram's to quickly for a process to handle. Buffering can only solve the problem temporarily if the burst is small. If the flood of datagram's is too intense and the capacity is exhausted, it will discard any additional datagram's that arrive.

  28. Week One OSI Model Windowing is a flow control (Transport layer) method used with TCP at the Transport layer. Windows are used to control the amount in outstanding, unacknowledged data segments. The data and route update packets are used at the Network layer. The data packet to transport user data through the internetwork. Route update packets are used to update neighboring routers about the networks connected to all routers within the internetwork.

  29. Week One OSI Model Protocols that send route update packets are called routing protocols; examples of some common ones are RIP, EIGRP, and OSPF. Network addresses are protocol specific network addresses. A router must maintain a routing table for individual routing protocols because each routing protocol keeps track of a network with a different addressing scheme.

  30. Week One OSI Model Interface is the exit interface a packet will take when designated for a specific network.

  31. Week One OSI Model Metric is the distance to the remote network. Different routing protocols use different ways of computing this distance. Hop count is the number of routers a packet passes through en-route to a remote network.

  32. Week One OSI Model The Media Access Control (MAC) defines how packets are placed on the media. Contention media access is “first come/first served” access where everyone shares the same bandwidth. MAC is a Data Link layer function. Logical Link Control (LLC) is a sub-layer responsible for identifying Network layer protocols and then encapsulating them. An LLC header tells the Data Link layer what to do with a packet once the frame is received.

  33. Week One TCP/IP Model The TCP/IP model is basically a condensed version of the OSI model. It is composed of four layers. Process/Application is the integration of the first three layers of the OSI Model. The Presentation/Application layer defines protocols for node-to-node application communication and also controls user-interface specifications.

  34. Week One TCP/IP Model Host-to-Host parallels the Transport layer , defining protocols for setting up the level of transmission service for applications. Issues are addressed like reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity. In summary, this layer shields the upper three layers from the Internet layer.

  35. Week One TCP/IP Model Internet layer exists for routing, and providing a single network interface to the upper layers. Network Access bottom layer that handles similar functions as the Data Link and Physical layers. It provides media access.

  36. Week One Internetwork Devices Hubs are really multiple port repeater found at the Physical layer. A repeater receives a digital signal and preamplifiers or regenerates that signal, and then forwards the digital signal out all active ports without looking at any data. Physical layer function The switches and bridges work at the Data Link layer and filter the network using hardware (MAC) addresses.

  37. Week One Ethernet Networking Ethernet is a contention media access method that allows all hosts on a network to share the same bandwidth of a link. Ethernet is popular because it’s readily scalable, meaning it’s comparatively easy to integrate new technologies, like FastEthernet and Gigabit Ethernet, into an existing network infrastructure. Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD).

  38. Week One Ethernet Networking CSMA/CD is a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. This protocol was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes.

  39. Week One Ethernet Networking A good collision management protocol is needed like CSMA/CD because when a node transmits in a network, all other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network.

  40. Week One Review Half- and Full-Duplex Ethernet Half duplex uses only one wire pair with a signal running in both directions on the wire. Half duplex Ethernet typically 10BaseT. Full-duplex uses two pairs of wires. It uses a point-to-point connection between the transmitter of the transmitting device and the receive of the receiving device. There are no collisions to worry about because now it’s like a freeway with multiple lanes instead of the single-lane road provided by half-duplex.

  41. Week One Half- and Full-Duplex Ethernet Typical speeds are 10Mbps, 100Mbps, and 200Mbps for FastEthernet. Full-duplex Ethernet can be used in three situations: With a connection from a switch to a host. With a connection from a switch to a switch. With a connection from a host to a host using a crossover cable.

  42. Week One Ethernet at the Data Link Layer Ethernet at the Data Link layer is responsible for Ethernet addressing, framing packets received from the Network layer and preparing them for transmission on the local network through the Ethernet contention media access method.

  43. Week One Ethernet at the Data Link Layer There are four different types of Ethernet frames available: Ethernet_II IEEE 802.3 IEEE 802.2 SNAP

  44. Week One Ethernet at the Data Link Layer Ethernet addressing uses the Media Access Control (MAC) burned into each and every Ethernet Network Interface Card (NIC). The MAC, or hardware address, is a 48 bit address written in a hexadecimal format.

  45. Week One Ethernet at the Physical Layer Ethernet was first implemented by a group called DIX (Digital, Intel, and Xerox). They created and implemented the first Ethernet LAN specification, which the IEEE used to create the IEEE 802.3 Committee. This was a 10Mbps network that ran on coax, twisted-pair, and fiber physical media. The IEEE extended the 802.3 to two new committees known as 802-3U (FastEthernet) and 802.3Z (Gigabit Ethernet).

  46. Week One Ethernet Cabling Straight-Through Cable This type of Ethernet cable is used to connect: Host to switch or hub (h/s <--> host) Router to switch or hub (h/s <--> router) Crossover Cable This type of Ethernet cable is used to connect: Switch to switch (h/s <--> h/s) Hub to hub Host to host

  47. Week One Ethernet Cabling Rolled Cable A rolled Ethernet cable can be used to connect a host to a router console serial communication (com) port. (host <--> Router/Switch)

  48. Week One Data Encapsulation Encapsulation is a technique used by layered protocols in which a layer adds header information to the Protocol Data Unit (PDU) from the layer above.

  49. Week One Data Encapsulation Application Presentation Session Transport – PDU (Segment) TCP header/Data Network – PDU (Packet) IP header/Data Data Link – PDU (Frame) LLC header/Data/FCS MAC header/Data/FCS Physical – PDU (Bits) 0101110101010101

  50. Week One Serial Transmission Wide area network (WAN) services are typically dedicated leased lines using High-Level Data Link Control , Point-to-Point (PPP), Integrated Services Digital Network (ISDN), and Frame Relay. Typical speeds run at 2400bps to 1.544 Mbps (T-1). WAN serial connectors use serial transmission, which is one bit at a time, over a single channel. Parallel transmission sends at least 8 bits at a time.

More Related