d wa2el

71

description

asdanjdbajdbbahbshabshabhsab

Transcript of d wa2el

Page 1: d wa2el
Page 2: d wa2el

Data NetworksSharing data through the use of floppy disks is not an efficient or cost-effective manner in which to operate businesses.

Sneakernet created multiple copies of the data.

Businesses needed a solution that would successfully address the following three problems: • How to avoid duplication of equipment and resources • How to communicate efficiently • How to set up and manage a network

Businesses realized that networking technology could increase productivity while saving money.

Page 3: d wa2el

LANs, MANs, & WANsOne early solution was the creation of local-area network (LAN) standards which provided an open set of guidelines for creating network hardware and software, making equipment from different companies compatible.

What was needed was a way for information to move efficiently and quickly, not only within a company, but also from one business to another.

The solution was the creation of metropolitan-area networks (MANs) and wide-area networks (WANs).

Page 4: d wa2el

WAN Network StructureWAN is a network of LANs

It consists of:• network edge:

applications and hosts connected by LANs

• network core: Switching nodes (e.g. routers, ATM

switches)network of networks

• access networks, physical media: Communication links to connect SN

Page 5: d wa2el

LANs and WANs

Connection of LANs over a large geographical distance

Page 6: d wa2el

The Internet is the biggest commercial WAN

Sprint US backbone network

Seattle

Atlanta

Chicago

Roachdale

Stockton

San Jose

Anaheim

Fort Worth

Orlando

Kansas City

CheyenneNew York

PennsaukenRelay

Wash. DC

Tacoma

DS3 (45 Mbps)OC3 (155 Mbps)OC12 (622 Mbps)OC48 (2.4 Gbps)

to/from customers

peering

to/from backbone

….

………POP: point-of-presence

Page 7: d wa2el

Examples of Data Networks

Page 8: d wa2el

Network History1940s large, unreliable electromechanical computers 1947 the invention of a semiconductor transistor

smaller, more reliable computers. 1950s mainframe computers; run by punched card programslate 1960-70s smaller minicomputers1977 Apple Computer Company introduced the microcomputer1981 IBM introduced its first personal computer. 1984 The user-friendly Macmid-1980s Users with started to share files using modems

This was “dial-up” or a “point-to-point” connection.mid-1980s Users would connect to the bulletin boards, leave and

pick up messages, as well as upload and download files.1960s-1990. Department of Defense (DoD) developed large, reliable,

WANs for military and scientific reasons. Instead of onlybeing able to communicate with one other computer manycomputers could be reached using the same connection. The DoDs WAN eventually became the Internet.

Page 9: d wa2el

Networking Components

•Devices•Topology•Messages•Protocol•Media

Page 10: d wa2el

1- Networking DevicesEquipment that connects directly to a network segment is referred to as a device.

These devices are broken up into two classifications. • end-user devices• network devices

End-user devices include computers, printers, scanners, and other devices that provide services directly to the user.

Network devices include all the devices that connect the end-user devices together to allow them to communicate.

Each individual NIC carries a unique code, called a Media Access Control (MAC) address.

Page 11: d wa2el

Networking AddressesThe addresses are divided into:Physical addresses: is the machine address called Media Access Control (MAC) address. It is a 6 octet hexadecimal number. (ex: 2A:3E:14:23:1C:87)

Network addresses: is the LAN address called internet protocol (IP) address. It is a 4 dotted decimal number. (ex: 121.13.0.0). Application addresses: is the application address called port address. It is a decimal number.

Well Known Ports (0 to 1023): (ex: HTTP server port 80) Registered Ports (1024 to 49151): these are usually assigned to applications that a user has chosen to install Dynamic or Private Ports (49152 to 65535): these are

assigned dynamically to client applications

Page 12: d wa2el

Networking Device Icons

Page 13: d wa2el

LANs

Page 14: d wa2el

WANs

Page 15: d wa2el

RepeaterA repeater is a network device used to regenerate a signal. Repeaters regenerate analog or digital signals distorted by transmission loss due to attenuation. A repeater does not perform intelligent routing like a bridge or router.

Page 16: d wa2el

HubHubs concentrate connections. In other words, they take a group of hosts and allow the network to see them as a single unit.

This is done passively, without any other effect on the data transmission.

Active hubs not only concentrate hosts, but they also regenerate signals.

Page 17: d wa2el

BridgeBridges convert network transmission data formats as well as perform basic data transmission management. Bridges, as the name implies, provide connections between LANs. Not only do bridges connect LANs, but they also perform a check on the data to determine whether it should cross the bridge or not. This makes each part of the network more efficient. 

Page 18: d wa2el

Workgroup SwitchWorkgroup switches add more intelligence to data transfer management.

Not only can they determine whether data should remain on a LAN or not, but they can transfer the data only to the connection that needs that data.

Another difference between a bridge and switch is that a switch does not convert data transmission formats.

Page 19: d wa2el

RouterRouters have all the capabilities of the previous devices. Routers can regenerate signals, concentrate multiple connections, convert data transmission formats, and manage data transfers. They can also connect to a WAN, which allows them to connect LANs that are separated by great distances. None of the other devices can provide this type of connection.

Page 20: d wa2el

“The Cloud”The cloud is used in diagrams to represent where the connection to the internet is.

It also represents all of the devices on the internet.

Page 21: d wa2el

2-Network TopologiesNetwork topology defines the structure of the network.

One part of the topology definition is the physical topology, which is the actual layout of the wire or media.

The other part is the logical topology, which defines how the media is accessed by the hosts for sending data.

Page 22: d wa2el

Physical Topologies

Page 23: d wa2el

Bus TopologyA bus topology uses a single backbone cable that is terminated at both ends.

All the hosts connect directly to this backbone.

Page 24: d wa2el

Ring TopologyA ring topology connects one host to the next and the last host to the first.

This creates a physical ring of cable.

Page 25: d wa2el

Star TopologyA star topology connects all cables to a central point of concentration.  

Page 26: d wa2el

Extended Star TopologyAn extended star topology links individual stars together by connecting the hubs and/or switches.

This topology can extend the scope and coverage of the network.

Page 27: d wa2el

Hierarchical TopologyA hierarchical topology is similar to an extended star.

However, instead of linking the hubs and/or switches together, the system is linked to a computer that controls the traffic on the topology.

Page 28: d wa2el

Mesh TopologyA mesh topology is implemented to provide as much protection as possible from interruption of service. Each host has its own connections to all other hosts. Although the Internet has multiple paths to any one location, it does not adopt the full mesh topology.

Page 29: d wa2el

Logical TopologiesThe logical topology of a network is how the hosts communicate across the medium.

The most common types of logical topologies are:Broadcast UnicastMulticast Token passing.

Page 30: d wa2el

Unicast

Multicast

Broadcast

Page 31: d wa2el

Token Passing TopologyToken passing controls network access by passing an electronic token sequentially to each host.

When a host receives the token, that host can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself.

Two examples of networks that use token passing are Token Ring and Fiber Distributed Data Interface (FDDI).

Page 32: d wa2el

3-Network ProtocolsProtocol suites are collections of protocols that enable network communication from one host through the network to another host.

A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate.

Page 33: d wa2el

4-MessagesData on the internet is transferred in ASCII code

Page 34: d wa2el

4-MessagesA messsage “How are you” is transferred as?

Page 35: d wa2el

4-Message Format

Data.....

AdAss

...

..L

Payload

Page 36: d wa2el

5-MediaLAN media:

•Wired: copper cables (twisted pair, coaxial,…), optical cables.

•Wireless: wireless LAN (WLAN)

WAN media:•Wired: MPLS, Frame relay,….•Wireless: 3G, WiMax

Page 37: d wa2el

Bandwidth

Page 38: d wa2el

Measuring Bandwidth

Page 39: d wa2el

LAN Media

Page 40: d wa2el

WAN Media

Page 41: d wa2el

ThroughputThroughput refers to actual measured bandwidth, at a specific time of day, using specific Internet routes, and while a specific set of data is transmitted on the network. Unfortunately throughput is often far less than the maximum possible digital bandwidth of the medium that is being used. The following are some of the factors that determine throughput:

• Internetworking devices • Type of data being transferred • Network topology • Number of users on the network • User computer • Server computer • Power conditions

Page 42: d wa2el

Transfer Time Calculation

Page 43: d wa2el
Page 44: d wa2el

Why do we need the OSI Model?

To address the problem of networks increasing in size and in number, the International Organization for Standardization (ISO) researched many network schemes and recognized that there was a need to create a network model that would help network builders implement networks that could communicate and work together and therefore, released the OSI reference model in 1984.

Page 45: d wa2el

Don’t Get Confused.

ISO - International Organization for Standardization

OSI - Open System Interconnection

IOS - Internetwork Operating System

The ISO created the OSI to make the IOS more efficient. The “ISO” acronym is correct as shown.

To avoid confusion, some people say “International Standard Organization.”

Page 46: d wa2el

The OSI Reference Model

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

The OSI Model will be used throughout your entire networking career!

Memorize it!

Page 47: d wa2el

Layer 7 - The Application Layer

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

This layer deal with networking applications.

Examples: Email Web browsers

PDU – Protocol Data Unit (Application Data)

Page 48: d wa2el

Layer 6 - The Presentation Layer

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

This layer is responsible for presenting the data in the required format which may include: Encryption Compression

PDU - Formatted Data

Page 49: d wa2el

• Text• Data

ASCIIEBCDICEncrypted

• Sound• Video

MIDIMPEGQuickTime

• Graphics• Visual Images

TIFFJPEGGIF

Presentation Layer

Page 50: d wa2el

Layer 5 - The Session Layer

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

This layer establishes, manages, and terminates sessions between two communicating hosts.

Example: Client Software

( Used for logging in)

PDU - Formatted Data

Page 51: d wa2el

Vocabulary of two processes

Service Request

Service Reply

Session Layer

Page 52: d wa2el

Layer 4 - The Transport Layer

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

This layer breaks up the data from the sending host and then reassembles it in the receiver.

It also is used to insure reliable data transport across the network.

PDU - Segments

Page 53: d wa2el

Layer 3 - The Network Layer

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

Sometimes referred to as the “Cisco Layer”.

Makes “Best Path Determination” decisions based on logical addresses (usually IP addresses).

PDU - Packets

Page 54: d wa2el

Network Layer

Path selection based on network addresses (e.g. IP addresses)

Multiplexing of network connectionsSegmentation and reassembly (block formation)

Error detection and possibly correction

Possibly flow control at network level

3

Page 55: d wa2el

Provision of the “best“ route

Network Layer

Page 56: d wa2el

Layer 2 - The Data Link Layer

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

This layer provides reliable transit of data across a physical link.

Makes decisions based on physical addresses (usually MAC addresses).

PDU - Frames

Page 57: d wa2el

Layer 1 - The Physical Layer

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

This is the physical media through which the data, represented as electronic signals, is sent from the source host to the destination host.

Examples: CAT5 (what we have) Coaxial (like cable TV) Fiber optic

PDU - Bits

Page 58: d wa2el

Host Layers

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

These layers only exist in the source and destination host computers.

Page 59: d wa2el

Media Layers

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

These layers manage the information out in the LAN or WAN between the source and destination hosts.

Page 60: d wa2el
Page 61: d wa2el

Why Another Model?Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).

The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.

The U.S. Department of Defense (DoD) created the TCP/IP reference model because it wanted a network that could survive any conditions, even a nuclear war.

Page 62: d wa2el

2 ModelsSide-By-Side

Application

TransportInternet

Network Access

7 Application6 Presentation5 Session4 Transport3 Network2 Data Link1 Physical

Page 63: d wa2el

TCP UDP

ARP IP ICMP

IEEE802.2

IEEE802.5

IEEE802.4

IEEE802.3 FDDI ATM Frame

Relay X.25 PPP

FTP

Teln

et

SMTP

DN

S

BO

OTP

/D

HC

P

TFTP

WW

W

SNM

P

POP3

IMA

P

RLO

GIN

LDA

P

RTP

Page 64: d wa2el

Application

Presentation

Session

Transport

Network

Data LinkPhysical

77

66

55

44

33

22

11

Computer 1Computer 1Application

Presentation

Session

Transport

Network

Data Link

Physical

77

66

55

44

33

22

11

Computer 2Computer 2

Horizontal Communication

Ver

tical

C

omm

unic

atio

n

Page 65: d wa2el

Concept of Encapsulation

Send Receive

Layer n+1

Layer n

nHeader n Data

n + 1Header n + 1 Data

nHeader n Data

n + 1Header n + 1 Data

Page 66: d wa2el

Encapsulation through TCP/IP layers

Page 67: d wa2el

Sending and Receiving Data in the Layer Model

Send Receive

1 2 3 4 5-7 Data 2

2 3 4 5-7 Data 2

3 4 5-7 Data

4 5-7 Data

5-7 Data

Data

1 2 3 4 5-7 Data 2

2 3 4 5-7 Data 2

3 4 5-7 Data

4 5-7 Data

5-7 Data

Data

Page 68: d wa2el

Horizontal / Virtual Communication in the Layer Model

Send Receive

1 2 3 4 5-7 Data 2

2 3 4 5-7 Data 2

3 4 5-7 Data

1 2 3 4 5-7 Data 2

2 3 4 5-7 Daten 2

3 4 5-7 Data

Virtual Communication:

Layer 3 can communicate with Layer 3. The exchange of

information takes place in the respective header.

Page 69: d wa2el

SANsA SAN is a dedicated, high-performance network used to move data between servers and storage resources.

Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers.

This method uses a separate network infrastructure that relieves any problems associated with existing network connectivity.

Page 70: d wa2el

Virtual Private NetworkA VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel between the telecommuter’s PC and a VPN router in the headquarters.

Page 71: d wa2el

3 Types of VPNsAccess VPNs – Access VPNs provide remote access to a

mobile worker and small office/home office (SOHO) to the headquarters of the Intranet or Extranet over a shared infrastructure.

Intranet VPNs – Intranet VPNs link regional and remote offices to the headquarters of the internal network over a shared infrastructure. Intranet VPNs differ from Extranet VPNs in that they allow access only to the employees of the enterprise.

Extranet VPNs – Extranet VPNs link business partners to the headquarters of the network over a shared infrastructure using dedicated connections.