26
IACC Professional Course Series Network Certification Preparation

IACC Professional Course Series

  • Upload
    fadey

  • View
    28

  • Download
    1

Embed Size (px)

DESCRIPTION

IACC Professional Course Series. Network Certification Preparation. Module - 1. Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing and subnetting MAC addressing. Todays’s networks. Service Provider - PowerPoint PPT Presentation

Citation preview

Page 1: IACC  Professional Course Series

IACC Professional Course Series

Network Certification Preparation

Page 2: IACC  Professional Course Series

Module - 1Communication methods OSI reference model and layered communicationTCP/IP modelTCP and UDPIP addressing and subnettingMAC addressing

Page 3: IACC  Professional Course Series

Todays’s networksService Provider

Job to connect all these different networks togetherDesign and other rules are different and more intenseMission critical more than any other networksMore complex and more issues

Enterprise There are hundreds and thousands of usersPolicies in placeSpeed and efficiency is importantNeed connectivity to remote sites or home users

ResidentialSmall Local area networksEvolving networks i.e. wireless, fiber, fax machines etc

Page 4: IACC  Professional Course Series

OSI Model and Layered approachWhy we need layered approachOSI Model

Seven layers of OSI modelTCP/IP Model

Four layers in TCP/IP model

Page 5: IACC  Professional Course Series

TCP/IP Model

Page 6: IACC  Professional Course Series

TCP/IP Model - continued

Page 7: IACC  Professional Course Series

TCP/IP Model - continued

Page 8: IACC  Professional Course Series

OSI Model

Page 9: IACC  Professional Course Series

OSI Model - Layered communication

Page 10: IACC  Professional Course Series

OSI Model – layer communication

Page 11: IACC  Professional Course Series

TCPTCP - Transmission Control Protocol Most commonly used protocol on the Internet. Reliable - It is connection oriented hence guaranteed deliveryTCP uses flow control which determines when data needs to be re-sent, and

stops the flow of data until previous packets are successfully transferred. This works because if a packet of data is sent, a collision may occur. When

this happens, the client re-requests the packet from the server until the whole packet is complete and is identical to its original, hence it is slow protocol.

Ordered DeliveryOffers error correctionExamples: World Wide Web (Apache TCP port 80), e-mail (SMTP TCP port

25), File Transfer Protocol (FTP port 21) and Secure Shell (OpenSSH port 22) etc.

Page 12: IACC  Professional Course Series

TCP – 3 way handshakeHost A sends a TCP SYNchronize packet to Host BHost B receives A's SYNHost B sends a SYNchronize-ACKnowledgementHost A receives B's SYN-ACKHost A sends ACKnowledgeHost B receives ACK.

TCP socket connection is ESTABLISHED.

TCP Three Way Handshake(SYN,SYN-ACK,ACK) SYNchronize and ACKnowledge messages are indicated by a bit inside the header of the TCP segment.

Page 13: IACC  Professional Course Series

TCP – 3 way handshake

Page 14: IACC  Professional Course Series

UDPUDP - User Datagram Protocol – connectionless protocolUDP is never used to send important data such as webpages, database

information, etc; UDP is commonly used for streaming audio and video, because it offers

speed! The reason UDP is faster than TCP is because there is no form of flow control

or error correction. The data sent over the Internet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality.

Not reliable Not ordered deliveryExample :Domain Name System (DNS UDP port 53), streaming media

applications such as IPTV or movies, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP) and online multiplayer games etc

Page 15: IACC  Professional Course Series

TCP Frame

Page 16: IACC  Professional Course Series

UDP Frame

Page 17: IACC  Professional Course Series

MAC AddressA Media Access Control address (MAC address) is a unique

identifier assigned to network interfaces for communications on the physical network segment.

MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.

MAC addresses assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware.

MAC address also referred to as the burned-in address, Ethernet hardware address (EHA), hardware address or physical address.

6 bytes of address. 3 bytes are for Manufacturer identifier and 3 bytes are NIC specific.

Page 18: IACC  Professional Course Series

IP addressingIP address is a unique identifier which distinguishes

a node from other in a network.An IPv4 address is 4 bytes/32 bites longIP address has a format of a.b.c.d, where a,b,c,d are

octets in binary.Each ip address has two portions, network and hostDifferent classes of IP address schemes.Class A, Class B, Class C, Class D, and Class E

Page 19: IACC  Professional Course Series

IP addressingClass ABinary address start with 0 i.e. most significant bit of first

byte is always 0.Hence the decimal number can be anywhere from 1 to

126. The first 8 bits (the first octet) identify the network and the

remaining 24 bits indicate the host within the network. An example of a Class A IP address is 102.168.212.226,

where "102" identifies the network and "168.212.226" identifies the host on that network.

Page 20: IACC  Professional Course Series

IP addressingClass BBinary addresses start with 10 i.e. two most significant bits of

first bytes are always 10.Hence the decimal number can be anywhere from 128 to

191. (The number 127 is reserved for local machine and loopback interfaces).

The first 16 bits (the first two octets) identify the network and the remaining 16 bits indicate the host within the network.

An example of a Class B IP address is 168.212.226.204 where "168.212" identifies the network and "226.204" identifies the host on that network.

Page 21: IACC  Professional Course Series

IP addressingClass CBinary addresses start with 110 i.e. three most significant

bits of first octet is always 110.Hence the decimal number can be anywhere from 192 to

223. The first 24 bits (the first three octets) identify the network

and the remaining 8 bits indicate the host within the network.

An example of a Class C IP address is 200.168.212.226 where "200.168.212" identifies the network and "226" identifies the host on that network.

Page 22: IACC  Professional Course Series

IP addressingClass DBinary addresses start with 1110 i.e. four most significant bits are always

1110.Hence the decimal number can be anywhere from 224 to 239.Class D networks are used to support multicasting.

Local Subnet:Addresses in the range 224.0.0.0 to 224.0.0.255 are individually assigned

by IANA and designated for multicasting on the local subnetwork only. Routing Information Protocol (RIPv2) uses 224.0.0.9, Open Shortest Path

First (OSPF) uses 224.0.0.5 & 224.0.0.6, etc. Routers must not forward these messages outside the subnet in which

the originate.

Page 23: IACC  Professional Course Series

IP addressingInternetwork control blockAddresses in the range 224.0.0.1 to 224.0.1.255 are individually

assigned by IANA and designated the Internetwork Control Block. It is used for traffic that must be routed through the public Internet,

such as for applications of the Network Time Protocol (224.0.1.1).

AD-HOC blockAddresses in the ranges 224.0.2.0 to 224.0.255.255, 224.3.0.0 to

224.4.255.255 and 233.252.0.0 to 233.255.255.255 are individually assigned by IANA and designated the AD-HOC block.

These addresses are globally routed and are used for applications that don't fit either of the previously described purposes.

Page 24: IACC  Professional Course Series

BACKUP SLIDES

Page 25: IACC  Professional Course Series

Access methodsAn access method is a set of rules on how the

network nodes share the transmission media.Rule could be Either first come first served or take

turnsContention methodsCSMA/CD (Carrier Sense Multiple Access with

Collision Detection)CSMA/CA (Carrier Sense Multiple Access with

Collision Avoidance)Token PassingDemand Priority

Page 26: IACC  Professional Course Series

Access methodsContention Methods:

IEEE 802.3 Ethernet LAN use CSMA/CD method.WLAN uses CSMA/CA protocol and have mechanism of explicit packet acknowledgment.

Token Ring : Uses a token-passing method. Demand Priority : 100VG-AnyLAN uses this method.

Networks are connected to hubs and hubs are connected to other hubs. Contention occurs at hub level.

Demand Priority provides mechanism for prioritizing data types. If contention happens, data with highest priority takes precedence.