Itacademy Course

download Itacademy Course

of 96

Transcript of Itacademy Course

  • 7/31/2019 Itacademy Course

    1/96

  • 7/31/2019 Itacademy Course

    2/96

    IT Career Path

    Network Administrator IT Administrator

    Technical Support

    Voice Administrator

    Security Administrator

  • 7/31/2019 Itacademy Course

    3/96

    CCNA (Cisco Certified Network Associate )

    CCNP (Cisco Certified Network Professional)

    CCIE (Cisco Certified Internetwork Expert)

    Network Administrator

  • 7/31/2019 Itacademy Course

    4/96

    IT Administrator

    CCNA (Cisco Certified Network Associate )

    MCITP ( Enterprise Administrator)

    Microsoft Exchange

    Microsoft ISA

    UNIX

  • 7/31/2019 Itacademy Course

    5/96

    Technical Support

    A+

    CCNA (Cisco Certified Network Associate )

    MCITP ( Enterprise Administrator)

  • 7/31/2019 Itacademy Course

    6/96

    Voice Administrator

    CCNA Voice (Cisco Certified Network Associate Voice )

    CCNP Voice(Cisco Certified Network Professional Voice)

    CCIE Voice (Cisco Certified Internetwork Expert Voice)

  • 7/31/2019 Itacademy Course

    7/96

    Security Administrator

    CCNA Security (Cisco Certified Network Associate Security)

    CCNP Security (Cisco Certified Network Professional Security)

    CCIE Security (Cisco Certified Internetwork Expert Security)

  • 7/31/2019 Itacademy Course

    8/96

    IT Essentials

  • 7/31/2019 Itacademy Course

    9/96

  • 7/31/2019 Itacademy Course

    10/96

    Computercases

  • 7/31/2019 Itacademy Course

    11/96

    ComputerPower Supply

  • 7/31/2019 Itacademy Course

    12/96

    Different connectors are used to connect specific

    components and various locations on the motherboard:

  • 7/31/2019 Itacademy Course

    13/96

    Different connectors are used to connect specificcomponents and various locations on the motherboard:

  • 7/31/2019 Itacademy Course

    14/96

    motherboards

  • 7/31/2019 Itacademy Course

    15/96

    CPU

  • 7/31/2019 Itacademy Course

    16/96

    CPU

  • 7/31/2019 Itacademy Course

    17/96

    cooling systems

  • 7/31/2019 Itacademy Course

    18/96

    ROM and RAM

  • 7/31/2019 Itacademy Course

    19/96

  • 7/31/2019 Itacademy Course

    20/96

    AdaptercardsNIC

    Wireless NIC:

    Sound adapter :

    Video adapter:

    Modem adapter

  • 7/31/2019 Itacademy Course

    21/96

    Network Interface Card (NIC)

    PCI

    USB Wireless

  • 7/31/2019 Itacademy Course

    22/96

    Storagedrives

    Floppy drive

    Hard drive Optical drive Flash drive

  • 7/31/2019 Itacademy Course

    23/96

    internalcables

    Floppy disk drive (FDD) data cable PATA (IDE) data cable PATA (EIDE) data cable SATA data cable

    SCSI data cable

  • 7/31/2019 Itacademy Course

    24/96

    inputdevices

    Mouse and keyboard Digital camera and digital video camera Touch screen Scanner

  • 7/31/2019 Itacademy Course

    25/96

    Output devices

    Monitors and projectors Printers, scanners, and fax machines Speakers and headphones

  • 7/31/2019 Itacademy Course

    26/96

    2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    ITE PC v4.0

    Chapter 1 26

    Network

    Fundamentals

  • 7/31/2019 Itacademy Course

    27/96

    ITE PC v4.0

    Chapter 1 27 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Introduction

    resources available through the Internet can help you :

  • 7/31/2019 Itacademy Course

    28/96

    ITE PC v4.0

    Chapter 1 28 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    What is Communication ?

    Communication in our daily lives takes many forms and occurs in

    many environments. We have different expectations depending on

    whether we are chatting via the Internet or participating in a job

    interview. Each situation has its corresponding expected behaviorsand styles.

    allnetworks have four basic elements in common

    1- Message2-Devices

    3-Medium

    4-Rules or Protocols

  • 7/31/2019 Itacademy Course

    29/96

    ITE PC v4.0

    Chapter 1 29 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Message

    units of information that travel from one device to another

    our instant message gets converted into a format that can be

    transmitted on the network

    All types of messages must be converted to bits, binary coded digital

    signals, before being sent to their destinations.

    no matter what the original message format was: text, video, voice, or

    computer data

    Once our instant message is converted to bits, it is ready to be sent

    onto the network for delivery

  • 7/31/2019 Itacademy Course

    30/96

  • 7/31/2019 Itacademy Course

    31/96

    ITE PC v4.0

    Chapter 1 31 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Devices

    Switch : the most common device for interconnecting local area

    networks

    Firewall : provides security to networks

    Router : helps direct messages as they travel across a network

    Wireless Router : a specific type of router often found in home

    networks

  • 7/31/2019 Itacademy Course

    32/96

    ITE PC v4.0

    Chapter 1 32 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Medium

    A means of interconnecting these devices that can transport themessages from one device to another

    To send our message to its destination, the computer must be connected

    to a wired or wireless local network.

    Wireless networks allow the use of networked devices anywhere in an

    office or home, even outdoors

    Ethernet is the most common wired networking technology

    The wires, called cables, connect the computers and other devices thatmake up the networks.

    Wired networks are best for moving large amounts of data at high

    speeds, such as are required to support professional-quality multimedia.

  • 7/31/2019 Itacademy Course

    33/96

    ITE PC v4.0

    Chapter 1 33 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Medium

    1- wired

    Copper :

    which carries electrical signals

    - twisted pair telephone wire

    - coaxial cable- Category 5 Unshielded Twisted Pair (UTP) cable

    optical fiber :

    which carries light signals

    - glass- plastic

    2- Wireless :

    the medium is the Earth's atmosphere, or space, and the signals are

    microwaves

  • 7/31/2019 Itacademy Course

    34/96

    ITE PC v4.0

    Chapter 1 34 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Rules or Protocols

    We have different expectations depending on whether we are chatting via

    the Internet or participating in a job interview. Each situation has its

    corresponding expected behaviors and styles.

    Among the protocols that govern successful human communication are:

    An identified sender and receiver

    Agreed upon method of communicating (face-to-face, telephone, letter)

    Common language and grammar

    Speed and timing of delivery

    Confirmation or acknowledgement requirements (important , Less

    important )

    Communication between individuals is determined to be successful when

    the meaning of the message understood by the recipient matches the

    meaning intended by the sender.

  • 7/31/2019 Itacademy Course

    35/96

    ITE PC v4.0

    Chapter 1 35 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Rules or Protocols

    rules are the standards and protocols that Govern how the messages are

    sent

    standards and protocols Govern how messages are directed through the

    network

    standards and protocols Govern how messages are interpreted at the

    destination devices

    Protocols are the rules that the networked devices use to communicate

    with each other.

    Ex.: HTTP SMTP XMPP - SIP

  • 7/31/2019 Itacademy Course

    36/96

    ITE PC v4.0

    Chapter 1 36 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Multiple services-multiple networks :

    Traditional telephone, radio, television, and computer data networkseach have their own individual versions of the four basic network

    elements.

    every one of these services required a different technology to carry its

    particular communication signal. Additionally, each service had its own

    set of rules and standards to ensure successful communication of itssignal across a specific medium.

    Converged networks :

    Technology advances are enabling us to consolidate these disparate

    networks onto one platform - a platform defined as a converged

    network.

    The flow of voice, video, and data traveling over the same network

    eliminates the need to create and maintain separate networks.

    personal computers, phones, TVs, personal assistants, and retail point-of-

    sale registers - but only one common network infrastructure.

  • 7/31/2019 Itacademy Course

    37/96

    ITE PC v4.0

    Chapter 1 37 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    there are four basic characteristics that the underlying

    architectures need to address in order to meet user

    expectations:

    Fault Tolerance

    Scalability

    Quality of Service (QoS)

    Security

  • 7/31/2019 Itacademy Course

    38/96

    ITE PC v4.0

    Chapter 1 38 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Fault Tolerance

    always available to the millions of users

    limits the impact of a hardware or software failure and can recover quickly

    when such a failure occurs.

    depend on redundant links, or paths, between the source and destinationof a message.

    Both the physical infrastructures and the

    logical processes that direct the messages

    through the network are designed toaccommodate this redundancy

  • 7/31/2019 Itacademy Course

    39/96

    ITE PC v4.0

    Chapter 1 39 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Scalability

    A scalable network can expand quicklyto support new users and

    applications without impacting the performance of the service being

    delivered to existing users.

    (QoS ) Quality of Service

    The Internet is currently providing an acceptable level of fault tolerance andscalability for its users.

    But new applications available to users over internetworks create higher

    expectations for the qualityof the delivered services.

    Voice and live video transmissions require a level of consistent quality anduninterrupted delivery that was not necessary for traditional computer

    applications.

    Quality of these services is measured against the quality of experiencing the

    same audio or video presentation

  • 7/31/2019 Itacademy Course

    40/96

    ITE PC v4.0

    Chapter 1 40 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Security

    Prevent unauthorized disclosure or theft of information

    Prevent unauthorized modification of information

    Prevent Denial of Service

  • 7/31/2019 Itacademy Course

    41/96

    ITE PC v4.0

    Chapter 1 41 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    a single communication :

    such as a music video or an e-mail message, could be sent across a

    network from a source to a destination as one massive continuous stream

    of bits.

    If messages were actually transmitted in this manner , it would mean

    that no other device would be able to send or receive messages on the

    same network while this data transfer was in progress.

    These large streams of data would result in significant delays. Further, if alink in the interconnected network infrastructure failed during the

    transmission, the complete message would be lost and have to be

    retransmitted in full.

  • 7/31/2019 Itacademy Course

    42/96

    ITE PC v4.0

    Chapter 1 42 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Packet Switched Connectionless Networks :

    a single message can be broken into multiple message blocks .

    Individual blocks containing addressing information indicate both their

    origination point and their final destination .

    Using this embedded information, these message blocks, called packets,

    can be sent through the network along various paths .

    and can be reassembled into the original message upon reaching their

    destination .

  • 7/31/2019 Itacademy Course

    43/96

    ITE PC v4.0

    Chapter 1 43 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Utilizing Packets :

    Each packet is sent independentlyfrom one switching location to

    another.

    a routing decision is made as towhich path to use to forward the

    packet towards its final destination.

    If a previously used path is no longer available, the routing function

    can dynamically choose the next best available path. Because the

    messages are sent in pieces.

    rather than as a single complete message, the few packets that may

    be lost in the advent of a failure can be retransmitted to the

    destination along a different path. In many cases, the destination

    device is unaware that any failure or rerouting has occurred.

  • 7/31/2019 Itacademy Course

    44/96

    ITE PC v4.0

    Chapter 1 44 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    A better approach is to divide the data into smaller .

    more manageable pieces to send over the network.

    This division of the data stream into smaller pieces is called segmentation.Segmenting messages has two primary benefits.

    Multiplexing

    Segmentation

  • 7/31/2019 Itacademy Course

    45/96

    ITE PC v4.0

    Chapter 1 45 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Quality of Service : ensuring (QoS) requires a set of techniques to manage the utilization of

    network resources.

    In order to maintain a high quality of service for applications that require it.

    it is necessary to prioritize which types of data packets must be delivered at

    the expense of other types of packets that can be delayed or dropped.

    Classification:

    we classify applications in categories based on specific quality of service

    requirements.

    For example :communication that is time-sensitive or important would be

    classified differently from communication that can wait or is of lesser

    importance.

  • 7/31/2019 Itacademy Course

    46/96

    ITE PC v4.0

    Chapter 1 46 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Assigning Priorities :

    Ex : the delivery of a movie uses a relatively large amount of network resources

    when it is delivered continuously without interruption.

    Voice Over IP

    Financial Transaction

    Web Page Browsing

  • 7/31/2019 Itacademy Course

    47/96

    ITE PC v4.0

    Chapter 1 47 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    In network communications, each segment of the message must go

    through a similar process to ensure that it gets to the correct destination

    and can be reassembled into the content of the original message.

    enddevices are referred to as hosts

    A host device is either the source or destination of a message transmitted

    over the network. In order to distinguish one host from another, each

    host on a network is identified by an address

    Examples of intermediary network devices are:

    - Network Access Devices (Hubs, switches, and wireless access points)

    - Internetworking Devices (routers)

    - Communication Servers and Modems

    - Security Devices (firewalls)

  • 7/31/2019 Itacademy Course

    48/96

    ITE PC v4.0

    Chapter 1 48 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Local Area Network (LAN)

    A LAN is usually administered by a single organization. The administrative

    control that governs the security and access control policies are enforced on

    the network level.

    Wide Area Network (WAN)

    When a company or organization has locations that are separated by large

    geographical distances, it may be necessary to use a telecommunicationsservice provider ( ) to interconnect the LANs at the different locations

  • 7/31/2019 Itacademy Course

    49/96

    ITE PC v4.0

    Chapter 1 49 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Internet

    is created by the interconnection of networks belonging to Internet Service

    Providers (ISPs).

    Intranet

    a private connection of LANs and WANs that belongs to an organization,and is designed to be accessible only by the organization's members,

    employees, or others with authorization.

    Network Interface Card - A NIC, or LAN adapterprovides the physical connection to the network at the PC or other host

    device. The media connecting the PC to the networking device plugs directly

    into the NIC.

  • 7/31/2019 Itacademy Course

    50/96

    ITE PC v4.0

    Chapter 1 50 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Physical Port

    A connector or outlet on a networking device where the media is connected

    to a host or other networking device.

    Types of Data Communication

    Simplex Communication System :

    Half Duplex Communication System

    Full Duplex Communication System

    Communication is possible only in one direction ( TV. And Radio )

    At any given time user can only transmit or receive (Police Radio)

    Simulation two way communication is allowed

  • 7/31/2019 Itacademy Course

    51/96

    ITE PC v4.0

    Chapter 1 51 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Rules That Govern Communication

    Successful communication between hosts on a network requires theinteraction of many different protocols.

    A group of inter-related protocols that are necessary to perform a

    communication function is called a protocol suite

    The protocols are viewed as a layered hierarchy,

    with each higher level service depending on the functionality defined by

    the protocols shown in the lower levels.

    The lower layers of the stack are concerned with moving data over the

    network and providing services to the upper layers, which are focused on

    the content of the message being sent and the user interface.

    The use of standards in developing and implementing protocols ensures

    that products from different manufacturers can work together for efficient

    communications.

  • 7/31/2019 Itacademy Course

    52/96

    ITE PC v4.0

    Chapter 1 52 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Physical Components of a network

    Devices that extend the range of a network by receiving data on one

    port, and then regenerating the data and sending it out to all other

    ports.

    This process means that all traffic from a device connected to the hub

    is sent to all the other devices connected to the hub every time the hub

    transmits data.

    This causes a great amount of network traffic.

    Internal Bus Topology

    UPLINK Port

  • 7/31/2019 Itacademy Course

    53/96

    ITE PC v4.0

    Chapter 1 53 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    A typical bridge have just two ports, linking two segments of the same

    network.

    A bridge is a device used to filter network traffic between LAN

    segments.

    Bridges keep a record of all the devices on each segment to which the

    bridge is connected.

    When the bridge receives a frame, the destination address is examined

    by the bridge to determine if the frame is to be sent to a differentsegment, or dropped.

    The bridge also helps to improve the flow of data by keeping frames

    confined to only the segment to which the frame belongs

  • 7/31/2019 Itacademy Course

    54/96

    ITE PC v4.0

    Chapter 1 54 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Switches :

    multiport bridges.

    A switch has several ports, depending on how many network segments

    are to be linked.

    A switch is a more sophisticated device than a bridge.

    A switch maintains a table of the MAC addresses for computers that are

    connected to each port.

    Switches use MAC addresses to forward a frame within a single network.

    When a frame arrives at a port, the switch compares the address

    information in the frame to its MAC address table. The switch then

    determines which port to use to forward the frame.

  • 7/31/2019 Itacademy Course

    55/96

    ITE PC v4.0

    Chapter 1 55 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Routers :

    Devices that connect entire networks to each other.

    Routers use IP addresses to forward frames to other networks.

    Routers contain tables of IP addresses along with optimal destination

    routes to other networks.

  • 7/31/2019 Itacademy Course

    56/96

    ITE PC v4.0

    Chapter 1 56 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Types of LAN topologies

    PhysicalPhysical layout of the components on

    the network

    Logical

    Determines how the hosts

    communicate across a medium

    Physical Topologies :

    Bus Topology

    Ring Topology

    Star Topology

    Hierarchical or Extended Star

    Mesh Topology

  • 7/31/2019 Itacademy Course

    57/96

    ITE PC v4.0

    Chapter 1 57 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Bus Topology :

    each computer connects to a common cable. The cable connects one computer to the next

    The cable has a small cap installed at the end, called a terminator.

    Cheap

    Collision (CSMA/CD) Carrier sense multiple access with collision detection

    Jamming Signal

    BW=10Mb/S

    Cable Fault

    Host Fault

    Cable Length

  • 7/31/2019 Itacademy Course

    58/96

    ITE PC v4.0

    Chapter 1 58 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Ring Topology :

    hosts are connected in a physical ring or circle.

    ring topology has no beginning or end, the cable does not need to

    be terminated.

    A specially-formatted frame, called a token, travels around the ring,

    stopping at each host. If a host wants to transmit data, the host adds the data and the

    destination address to the frame.

    The frame then continues around the ring until

    the frame stops at the host with the

    destination address. The destination host takes

    the data out of the frame.

    BW=45Mb/s

    Expensive (NIC)

    Cable Fault

    Host Fault/OFF

  • 7/31/2019 Itacademy Course

    59/96

    ITE PC v4.0

    Chapter 1 59 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Star Topology :

    The star topology has a central connection point

    which is normally a device such as a hub, switch, or router.

    Each host on a network has a cable segment that attaches the host

    directly to the central connection point.

    The advantage of a star topology is that it is easy to troubleshoot. Each

    host is connected to the central device with its own wire. If there is a

    problem with that cable, only that host is affected. The rest of the

    network remains operational.

    BW=100 Mb/s Central Point

    Less Cost

  • 7/31/2019 Itacademy Course

    60/96

    ITE PC v4.0

    Chapter 1 60 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Hierarchical or Extended Star Topology : a star network with an additional networking device connected to the main

    networking device

    a network cable connects to one hub, and then several other hubs connect to

    the first hub. Larger networks

  • 7/31/2019 Itacademy Course

    61/96

    ITE PC v4.0

    Chapter 1 61 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Mesh Topology :

    topology connects all devices to each other

    When every device is connected to every other device, a failure of

    any cable will not affect the network

    The mesh topology is used in WANs that interconnect LANs.

    Redundant

    Cables Cost

    Number of NIC ( Cost )

  • 7/31/2019 Itacademy Course

    62/96

    ITE PC v4.0

    Chapter 1 62 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Logical Topologies

    Broadcast TokenBroadcast :

    In a broadcast Topology, each host addresses either data to a particular

    host or to all hosts connected on a network.

    There is no order that the hosts must follow to use the network it is

    first come, first served for transmitting data on the network.

    Token :

    Token passing controls network access by passing an electronic token

    sequentially to each host.

    When a host receives the token, it can send data on the network. If thehost has no data to send, it passes the token to the next host and the

    process repeats itself.

    BandwidthThroughput Example : 100 mb/s

  • 7/31/2019 Itacademy Course

    63/96

    ITE PC v4.0

    Chapter 1 63 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Interaction of Protocols

    An example : of the use of a protocol suite in network communications is the

    interaction between a web server and a web browser.

    This interaction uses a number of protocols and standards in the process of

    exchanging information between them.

    The different protocols work together to ensure that the messages are

    received and understood by both parties.

  • 7/31/2019 Itacademy Course

    64/96

    ITE PC v4.0

    Chapter 1 64 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Examples of these protocols are Application Protocol : Hypertext Transfer Protocol

    Transport Protocol: Transmission Control Protocol

    TCP :Transmission Control Protocol

    UDP :User Datagram Protocol

    Internetwork Protocol: Internet Protocol (IP , ARP , ICMP )

    Network Access Protocols: Data-link management protocols

    HTTP : hyper text transfer protocol

    FTP : file transfer protocol

    TFTP : Trivial file transfer protocol

    SMTP : simple mail transfer protocolSNMP : simple network management protocol

    (cisco works is a network management product)

    TELNET : used to access remote host or router

    LPD : line printer daemon

  • 7/31/2019 Itacademy Course

    65/96

    ITE PC v4.0

    Chapter 1 65 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    layered model

    There are benefits to using a layered model to describe network protocols

    and operations. Using a layered model :

    Assists in protocol design, because protocols that operate at a specific

    layer have defined information that they act upon and a defined

    interface to the layers above and below.

    Fosters competition because products from different vendors can work

    together.

    Prevents technology or capabilitychanges in one layer from affecting

    other layers above and below.

    Provides a common language to describe networking functions and

    capabilities.

  • 7/31/2019 Itacademy Course

    66/96

    ITE PC v4.0

    Chapter 1 66 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    There are two basic types of networking models

    Protocol Models Reference Models

    Protocol Models :

    A protocol model provides a model that closelymatches the structure

    of a particular protocol suite

    The TCP/IP model is a protocol model because it describes the

    functions that occur at each layer of protocols within the TCP/IP suite.

    The TCP/IP model describes the functionality of the protocols thatmake up the TCP/IP protocol suite.

    These protocols, which are implemented on both the sending and

    receiving hosts, interact to provide end-to-end delivery of applications

    over a network

  • 7/31/2019 Itacademy Course

    67/96

    ITE PC v4.0

    Chapter 1 67 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    TCP/IP Layers

    Application Layer

    Transport Layer

    Internet Layer

    Network Access Layer

  • 7/31/2019 Itacademy Course

    68/96

    ITE PC v4.0

    Chapter 1 68 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    A complete communication process includes these steps :

    1- Creation of data at the Application layer of the originating source end

    device

    2- Segmentation and encapsulation of data as it passes down the protocol

    stack in the source end device

    3- Generation of the data onto the media at the Network Access layer of

    the stack

    4- Transportation of the data through the internetwork, which consists of

    media and any intermediary devices

    5- Reception of the data at the Network Access layer of the destination

    end device

    6- Decapsulation and reassembly of the data as it passes up the stack in

    the destination device

    7- Passing this data to the destination application at the Application layer

    of the destination end device

  • 7/31/2019 Itacademy Course

    69/96

    ITE PC v4.0

    Chapter 1 69 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Protocol Data Unit (PDU) and Encapsulation

    As application data is passed down the protocol stack on its way to be

    transmitted across the network media, various protocols add

    information to it at each level. This is commonly known as the

    encapsulation process.

    The form that a piece of data takes at any layer is called a Protocol Data

    Unit (PDU). During encapsulation

    each succeeding layer encapsulates the PDU that it receives from the

    layer above in accordance with the protocol being used

    At each stage of the process, a PDU has a different name to reflect its

    new appearance , the PDUs are named according to the protocols of

    the TCP/IP suite.

  • 7/31/2019 Itacademy Course

    70/96

    ITE PC v4.0

    Chapter 1 70 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Data : The general term for the PDU used at the Application layer

    Segment : Transport Layer PDU

    Packet : Internetwork Layer PDU

    Frame : Network Access Layer PDU

    Bits : A PDU used when physically transmitting data over the medium

  • 7/31/2019 Itacademy Course

    71/96

    ITE PC v4.0

    Chapter 1 71 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Sending and Receiving Processing

    When sending messages on a network, the protocol stack on a hostoperates from top to bottom

    In the web server example, we can use the TCP/IP model to illustrate the

    process of sending an HTML web page to a client.

    The Application layer protocol, HTTP, begins the process by delivering theHTML formatted web page data to the Transport layer.

    There the application data is broken into TCP segments. Each TCP segment

    is given a label, called a header, containing information about which

    process running on the destination to enable the destination process to

    reassemble the data back to its original format.

  • 7/31/2019 Itacademy Course

    72/96

    ITE PC v4.0

    Chapter 1 72 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Transport layer encapsulates the web page HTML data within

    the segment and sends it to the Internet layer, where the IP protocol

    is implemented. Here the entire TCP segment is encapsulated withinan IP packet, which adds another label, called the IP header. The IP

    header contains source and destination host IP addresses, as well as

    information necessary to deliver the packet to its corresponding

    destination process.

    The IP packet is sent to the Network Access layer Ethernet protocolwhere it is encapsulated within a frame header and trailer. Each

    frame header contains a source and destination physical address.

    The physical address uniquelyidentifies the devices on the local

    network. The trailer contains error checking information. Finally the

    bits are encoded onto the Ethernet media by the server NIC.

    This process is reversed at the receiving host. The data is

    decapsulated as it moves up the stack toward the end user

    application.

  • 7/31/2019 Itacademy Course

    73/96

    ITE PC v4.0

    Chapter 1 73 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Reference Models :

    A reference model provides a common reference for maintaining

    consistency within all types of network protocols and services.

    The primary purpose of a reference model is to aid in clearer

    understanding of the functions and process involved.

    The Open Systems Interconnection (OSI) model is the most widely known

    internetwork reference model.

    It is used for data network design, operation specifications, and

    troubleshooting.

  • 7/31/2019 Itacademy Course

    74/96

    ITE PC v4.0

    Chapter 1 74 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Application Layer

    PresentationLayer

    SessionLayer

    TransportLayer

    NetworkLayer

    DatalinkLayer

    PhysicalLayer

    THE Open Systems Interconnection (OSI) Model

  • 7/31/2019 Itacademy Course

    75/96

    ITE PC v4.0

    Chapter 1 75 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Getting the data to the end device

    During the process of encapsulation, address identifiers are added to

    the data as it travels down the protocol stack on the source host.

    there are multiple layers of protocols that prepare the data for

    transmission to its destination.

    there are multiple layers of addressing to ensure its delivery.

  • 7/31/2019 Itacademy Course

    76/96

    ITE PC v4.0

    Chapter 1 76 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    The Layer 2 address is unique on the local network and represents the address of

    the end device on the physical media. In a LAN using Ethernet

    this address is called the Media Access Control (MAC) address.

    When two end devices communicate on the local Ethernet network the frames that

    are exchanged between them contain the destination and source MAC addresses.

    Once a frame is successfully received by the destination host, the Layer 2 addressinformation is removed as the data is decapsulated and moved up the protocol

    stack to Layer 3.

    Layer 2 addresses are only used to communicate between devices on a single local

    network

    DatalinkLayer : (Layer 2)

    Layer 2 PDU called a frame

    Layer 2 is concerned with the delivery of messages on a single local network.

    the host physical address, is contained in the header of the Layer 2 PDU,

  • 7/31/2019 Itacademy Course

    77/96

    ITE PC v4.0

    Chapter 1 77 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Network Layer : (Layer 3)

    designed to move data from one local network to another local networkwithin an internetwork.

    Layer 3 addresses must include identifiers that enable intermediary

    network devices to locate hosts on different networks.

    IP host address contains information about the network where the host islocated.

    At the boundary of each local network, an intermediary network device,

    usually a router.

    Router decapsulates the frame to read the destination host address

    contained in the header of the packet

  • 7/31/2019 Itacademy Course

    78/96

    ITE PC v4.0

    Chapter 1 78 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Routers use the network identifier portion of this address to determine

    which path to use to reach the destination host.

    Once the path is determined, the router encapsulates the packet in a new

    frame and sends it on its way toward the destination end device.

    When the frame reaches its final destination, the frame and packet headers

    are removed and the data moved up to Layer 4.

    every IP host address contains information about the network where the

    host is located.

  • 7/31/2019 Itacademy Course

    79/96

    ITE PC v4.0

    Chapter 1 79 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Transport Layer : (Layer 4)

    information contained in the PDU header does not identify a destinationhost or a destination network.

    What it does identify is the specific process or service running on the

    destination host device that will act on the data being delivered.

    Hosts, whether they are clients or servers on the Internet, can runmultiple network applications simultaneously. People using PCs often

    have an e-mail client running at the same time as a web browser, an

    instant messaging program, some streaming media, and perhaps even a

    game. All these separately running programs are examples of individual

    processes.

    Think about a computer that has only one network interface on it. All the

    data streams created by the applications that are running on the PC

    enter and leave through that one interface.

    Each application or service is represented at Layer 4 by a port number.

  • 7/31/2019 Itacademy Course

    80/96

    ITE PC v4.0

    Chapter 1 80 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Application Layer Functionality and Protocols

    The Application layer, Layer seven

    The top layer of both the OSI and TCP/IP models

    the interface between the applications we use to communicate and the

    underlying network over which our messages are transmitted.

    Application layer protocols are used to exchange data between programs

    running on the source and destination hosts.

    Provide the human interface to the underlying network

  • 7/31/2019 Itacademy Course

    81/96

    ITE PC v4.0

    Chapter 1 81 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Presentation Layer

    The Presentation layer has three primary Functions:

    1- Coding and conversion of Application layer data to ensure that data from the

    source device can be interpreted by the appropriate application on the

    destination device.

    2- Compression of the data in a manner that can be decompressed by the

    destination device.

    3- Encryption of the data for transmission and the decryption of data upon

    receipt by the destination.

  • 7/31/2019 Itacademy Course

    82/96

    ITE PC v4.0

    Chapter 1 82 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Session Layer

    create and maintain dialogs between source and destination applications.

    The Session layer handles the exchange of information to initiate dialogs,

    keep them active, and to restart sessions that are disrupted or idle for a

    long period of time.

  • 7/31/2019 Itacademy Course

    83/96

    ITE PC v4.0

    Chapter 1 83 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Network-Aware Applications :

    Applications are the software programs used by people to

    communicate over the network.

    Some end-user applications are network-aware, meaning that theyimplement the Application layer protocols and are able to

    communicate directly with the lower layers of the protocol stack.

    Web browsers are examples of these types of applications.

  • 7/31/2019 Itacademy Course

    84/96

    ITE PC v4.0

    Chapter 1 84 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Application layer Services :

    Other programs may need the assistance of Application layer services to

    use network resources

    While applications provide people with a way to create messagesand Application layer services establish an interface to the

    network, protocols provide the rules and formats that govern

    how data is treated.

    Transport layer uses an addressing scheme called a port number.Port numbers identify applications and Application layer services

    that are the source and destination of data

  • 7/31/2019 Itacademy Course

    85/96

    ITE PC v4.0

    Chapter 1 85 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Application layer protocols are

    Application layer protocols are used by both the source and

    destination devices during a communication session.

    the Application layer protocols implemented on the source and

    destination host must match.

    Protocols specify :

    how data inside the messages is structured

    the types of messages that are sent between source and

    destination.

    These messages can be requests for services, acknowledgments,

    data messages, status messages, or error messages.

    Protocols also define message dialogues, ensuring that a

    message being sent is met by the expected response and the

    correct services are invoked when data transfer occurs.

  • 7/31/2019 Itacademy Course

    86/96

    ITE PC v4.0

    Chapter 1 86 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    the client/server model

    In the client/server model, the device requesting the information is

    called a client and the device responding to the request is called a

    server.

    Client and server processes are considered to be in the Application

    layer.

    Application layer protocols describe the format of the requests and

    responses between clients and servers.

    Data transfer from a client to a server is referred to as an upload and

    data from a server to a client as a download.

  • 7/31/2019 Itacademy Course

    87/96

    ITE PC v4.0

    Chapter 1 87 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Server :

    any device that responds to requests from client applications isfunctioning as a server.

    A server is usually a computer that contains information to be shared

    with many client systems

    a Server Daemon :

    the server runs a service, or process, sometimes called a serverdaemon

    daemons typically run in the background and are not under an end

    user's direct control.

    because they are programmed to respond whenever the serverreceives a request for the service provided by the daemon.

    When a daemon "hears" a request from a client, it exchanges

    appropriate messages with the client, as required by its protocol, and

    proceeds to send the requested data to the client in the proper

    format.

  • 7/31/2019 Itacademy Course

    88/96

    ITE PC v4.0

    Chapter 1 88 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Peer to peer networking and applications (p2p) model Two or more computers are connected via a network and can share

    resources (such as printers and files) without having a dedicated server.

    Each person can set his or her computer to share files, enable

    networked games, or share an Internet connection

    Information can be located anywhere on any connected device.

    Most of the current operating systems support file and print sharing

    without requiring additional server software.

    User accounts and access rights must be set individually on each peer

    device.

    Gnutella Protocol

  • 7/31/2019 Itacademy Course

    89/96

    ITE PC v4.0

    Chapter 1 89 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Domain Name System (DNS)

    In data networks, devices are labeled with numeric IP addressesDomain names were created to convert the numeric address into a simple,

    recognizable name.

    www.cisco.com, are much easier for people to remember than

    198.133.219.25, which is the actual numeric address for this server.

    The Domain Name System (DNS) was created for domain name to

    address resolution for these networks.

    DNS is a client/server service

    The DNS protocol defines an automated service that matches resourcenames with the required numeric network address.

    Computer operating systems also have a utility called nslookup that

    allows the user to manually query the name servers to resolve a given

    host name.

  • 7/31/2019 Itacademy Course

    90/96

    ITE PC v4.0

    Chapter 1 90 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Hypertext Transfer Protocol (HTTP)

    When a web address (or URL) is typed into a web browser, the web

    browser establishes a connection to the web service running on the

    server using the HTTP protocol.

    For this example, we will use the URL: http://www.cisco.com/web-

    server.htm.

    1. http (the protocol )

    2. www.cisco.com (the server name)

    3. web-server.htm (the specific file name requested).

    The Hypertext Transfer Protocol (HTTP), one of the protocols in theTCP/IP suite, was originally developed to publish and retrieve HTML

    pages

  • 7/31/2019 Itacademy Course

    91/96

    ITE PC v4.0

    Chapter 1 91 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    E-mail Services and SMTP/POP Protocols

    When people compose e-mail messages, they typically use an application

    called a Mail User Agent(MUA)

    The MUA allows messages to be sent and places received messages into

    the client's mailbox

    In order to receive e-mail messages from an e-mail server, the e-mail client

    can use POP

    Sending e-mail from either a client or a server uses message formats and

    command strings defined by the SMTP protocol.

  • 7/31/2019 Itacademy Course

    92/96

    ITE PC v4.0

    Chapter 1 92 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    E-mail Server Processes - MTA and MDA

    The e-mail server operates two separate processes:

    - Mail Transfer Agent (MTA)

    - Mail Delivery Agent (MDA)

    The Mail Transfer Agent (MTA) process is used to forward e-mail.

    the MTA receives messages from the MUA or from another MTA on

    another e-mail server. Based on the message header

    1 - If the mail is addressed to a user whose mailbox is on the local server, the

    mail is passed to the MDA.

    2- If the mail is for a user not on the local server, the MTA routes the e-mail

    to the MTA on the appropriate server.

  • 7/31/2019 Itacademy Course

    93/96

    ITE PC v4.0

    Chapter 1 93 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    File Transfer Protocol (FTP)

    Application layer protocol.

    FTP allow file transfers between a client and a server.

    An FTP client is an application that runs on a computer that is used to

    push and pull files from a server running

    FTP requires two connections between the client and the server: one for

    commands and replies, the other for the actual file transfer.

  • 7/31/2019 Itacademy Course

    94/96

    ITE PC v4.0

    Chapter 1 94 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    Dynamic Host Configuration Protocol (DHCP)This is the IP address information that a DHCP server can assign to hosts:

    1- IP address

    2- Subnet mask

    3- Default gateway

    DHCP allows a host to obtain an IP address dynamically when it connects

    to the network.

    The DHCP server is contacted and an address requested. The DHCP server

    chooses an address from a configured range of addresses called a pooland assigns ("leases") it to the host for a set period.

    DHCP distributed addresses are not permanently assigned to hosts but

    are only leased for a period of time. If the host is powered down or taken

    off the network, the address is returned to the pool for reuse. This is

    especially helpful with mobile users that come and go on a network.

  • 7/31/2019 Itacademy Course

    95/96

    ITE PC v4.0

    Chapter 1 95 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

    When a DHCP-configured device boots up or connects to the network, the client

    broadcasts a DHCP DISCOVER packet to identify any available DHCP servers on

    the network.

    A DHCP server replies with a DHCP OFFER, which is a lease offer message with

    an assigned IP address, subnet mask, DNS server, and default gateway

    information as well as the duration of the lease.

    The client may receive multiple DHCP OFFER packets if there is more than one

    DHCP server on the local network,

    so it must choose between them, and broadcast a DHCP REQUEST packet that

    identifies the explicit server and lease offer that the client is accepting.

    Assuming that the IP address requested by the client, or offered by the server, is

    still valid, the server would return a DHCP ACK message that acknowledges to

    the client the lease is finalized.

  • 7/31/2019 Itacademy Course

    96/96

    If the offer is no longer valid - perhaps due to a time-out or another

    client allocating the lease - then the selected server will respond with a

    DHCP NAK message (Negative Acknowledgement).

    If a DHCP NAK message is returned, then the selection process must

    begin again with a new DHCP DISCOVER message being transmitted.