Chapter 1.pptx
Document Details
Uploaded by Deleted User
Full Transcript
1.2 Data Transmission © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Transmission Video - Types of Personal Data © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Transmission Types...
1.2 Data Transmission © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Transmission Video - Types of Personal Data © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Transmission Types of Personal Data The following categories are used to classify types of personal data: Volunteered data - This is created and explicitly shared by individuals, such as social network profiles. This type of data might include video files, pictures, text or audio files. Observed data - This is captured by recording the actions of individuals, such as location data when using cell phones. Inferred data - This is data such as a credit score, which is based on analysis of volunteered or observed data. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Transmission The Bit Did you know that computers and networks only work with binary digits, zeros and ones? Each bit can only have one of two possible values, 0 or 1. The term bit is an abbreviation of “binary digit” and represents the smallest piece of data. Humans interpret words and pictures, computers interpret only patterns of bits. Each group of eight bits, such as the representations of letters and numbers, is known as a byte. Using the American Standard Code for Information Interchange (ASCII), each character is represented by eight bits. For example: Capital letter: A = 01000001 Number: 9 = 00111001 Special character: # = 00100011 This page includes an ASCII bit translation engine where you can enter any character and see the 8 bit translation. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Transmission Common Methods of Data Transmission After the data is transformed into a series of bits, it must be converted into signals that can be sent across the network media to its destination. Media refers to the physical medium on which the signals are transmitted. Examples of media are copper wire, fiber-optic cable, and electromagnetic waves through the air. A signal consists of electrical or optical patterns that are transmitted from one connected device to another. There are three common methods of signal transmission used in networks: Electrical signals - Transmission is achieved by representing data as electrical pulses on copper wire. Optical signals - Transmission is achieved by converting the electrical signals into light pulses. Wireless signals - Transmission is achieved by using infrared, microwave, or radio waves through the air. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.3 Bandwidth and Throughput © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bandwidth and Throughput Bandwidth Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of data that can flow from one place to another in a given amount of time. Bandwidth is typically measured in the number of bits that (theoretically) can be sent across the media in a second. Unit of Bandwidth Abbreviation Equivalence Bits per second bps 1 bps = fundamental unit of bandwidth Kilobyte: Thousands of bits per kbps 1 kbps = 1,000 bps = 103 bps second Megabyte: Millions of bits per Mbps 1 Mbps = 1,000,000 bps = 106 bps second Gigabyte: Billions of bits per Gbps 1 Gbps = 1,000,000,000 bps = 109 second bps Terabyte: Trillions of bits per Tbps 1 Tbps = 1,000,000,000,000 bps = second 1012 bps © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bandwidth and Throughput Video - Throughput © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bandwidth and Throughput Throughput Like bandwidth, throughput is the measure of the transfer of bits across the media over a given period of time. However, due to a number of factors, throughput does not usually match the specified bandwidth. Many factors influence throughput including: The amount of data being sent and received over the connection The types of data being transmitted The latency created by the number of network devices encountered between source and destination Latency refers to the amount of time, including delays, for data to travel from one given point to another. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.5 Network Components © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Video - Network Infrastructure Symbols © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Network Infrastructure The network infrastructure contains three categories of hardware components, as shown in the figure: End devices Intermediate devices Network media © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components End Devices The network devices that people are most familiar with are called end devices, or hosts. These devices form the interface between users and the underlying communication network. Some examples of end devices are as follows: Computers (workstations, laptops, file servers, web servers) Network printers Telephones and teleconferencing equipment Security cameras Mobile devices (such as smart phones, tablets, PDAs, and wireless debit/credit card readers and barcode scanners) © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Lab - My Local Network In this lab, you will complete the following objectives: Record all the different network-attached devices in your home or classroom. Investigate how each device connects to the network to send and receive information. Create a diagram showing the topology of your network. Label each device with its function within the network. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Wireless Networks Other Wireless Networks (Cont.) Bluetooth is wireless technology that allows NFC stands for near field communications. NFC devices to communicate over short distances. is a wireless communication technology that Because Bluetooth technology can be used to enables data to be exchanged by devices that transmit both data and voice, it can be used to are in very close proximity to each other, usually create small local networks. less than a few centimeters. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Local Network Connections Video - Types of Network Components © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Local Network Connections LAN Components There are many components that can be part of a local area network (LAN). Some examples of network components are personal computers, servers, networking devices, and cabling. These components can be grouped into four main categories: Hosts - Hosts send and receive user traffic. A host is a generic name for most end-user devices. A host has an IP address. Examples of hosts are personal computers and network attached printers. Peripherals - Shared peripheral devices do not communicate directly on the network. Instead, peripherals rely on their connected host to perform all network operations. Examples of shared peripherals are cameras, scanners, and locally attached printers. Network devices - Networking devices connect other devices, mainly hosts. These devices move and control network traffic. Examples of network devices include hubs, switches, and routers. Network media - Network media provides connections between hosts and network devices. Network media can be wired, such as copper and fiber optic, or use wireless technologies. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Local Network Connections Video - Configure IP Addressing Information on Windows © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Local Network Connections End Device Addressing To physically connect to a network, an end-user device must have a network interface card (NIC) and some configuration of the operating system so that the device can participate in the network. There are three parts to the IP configuration which must be correct for the device to send and receive information on the network: IP address - This identifies the host on the network. Subnet mask - This is used to identify the network on which the host is connected. Default gateway - This identifies the networking device that the host uses to access the internet or another remote network. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Local Network Connections Video - Manual and Automatic Addressing © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Local Network Connections Manual and Automatic Address Assignment With manual Most end-user devices configuration, the can be set up to required values are receive network entered into the configuration device by a information network dynamically. The administrator. The device requests an IP address that is address from a pool of entered is referred addresses assigned by to as a static a Dynamic Host address and must Configuration Protocol be unique on the (DHCP) server located network. within the network. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Local Network Connections Lab - Determine the IP Address Configuration of a Computer In this lab, you will determine the IP address assigned to your computer. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4.1 Network Media Types © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Media Types Video - Network Media Types © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Media Types Three Media Types Communication transmits across a network on media. Modern networks primarily use three types of media to interconnect devices. Metal wires within cables - Data is encoded into electrical impulses. Glass or plastic fibers within cables (fiber- optic cable) - Data is encoded into pulses of light. Wireless transmission - Data is encoded via modulation of specific frequencies of electromagnetic waves. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Media Types Common Network Cables The three most common network cables are twisted-pair cable, coaxial cable, and fiber-optic cable. Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Ethernet technology It was one of the earliest It can be either glass or generally uses twisted-pair network cabling types plastic and it can carry digital cables to interconnect developed. information at very high devices. It is used as a high- speeds over long distances. frequency transmission line to carry high-frequency or broadband signals. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4.2 Ethernet Cabling © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet Cabling Twisted-Pair Cables The networks in most homes and schools are wired with twisted-pair copper cable. This type of cable is inexpensive and readily available. The Ethernet patch cables are an example of copper twisted-pair cable. Twisted-pair cables consist of one or more pairs of insulated copper wires that are twisted together and housed in a protective jacket. Twisted-pair cable uses pulses of electricity to transmit data. Data transmission over copper cable is sensitive to electromagnetic interference (EMI). Another source of interference, called crosstalk, occurs when cables are bundled together for long lengths. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet Cabling Twisted-Pair Cables (Cont.) Interference can cause problems with data being transmitted on the cable. 1. A pure digital signal is transmitted. 2. On the medium, there is an interference signal. 3. The digital signal is corrupted by the interference signal. 4. The receiving computer reads a changed signal. Notice that a 0 bit is now interpreted as a 1 bit. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet Cabling Types of Twisted-Pair Cables There are two commonly installed types of twisted-pair cable: Unshielded twisted-pair (UTP) - This is the most common type of network cable in North America and many other areas. Shielded cables (STP) - These are used almost exclusively in European countries. STP cables are immune to EMI and RFI UTP cables are used to connect workstations, interference. STP cables are expensive, not as flexible, and hosts and network devices. have additional requirements because of the Ethernet UTP cables shielding. consists of 4 pairs of twisted cables. Each pair is identified by a specific color code. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet Cabling Types of Twisted-Pair Cables (Cont.) Many different categories of UTP cables have been developed to support a specific technology. Category Speed Features Cat 3 UTP 10 Mbps at 16 MHz Suitable for Ethernet LANs Most often used for phone lines Cat 5 UTP 100 Mbps at 100 MHz Manufactured with higher standard than Cat 3 to allow for higher data transfer rates Cat 5e UTP 1000 Mbps at 100 MHz Manufactured with higher standard than Cat 5 to allow for higher data transfer rates More twists per foot than Cat 5 to better prevent EMI and RFI from outside sources Cat 6 UTP 1000 Mbps at 250 MHz Manufactured with higher standard than Cat 5e More twists per foot than Cat 5 to better prevent EMI and Cat 6a UTP 1000 Mbps at 500 MHz RFI from outside sources Cat 7 ScTP 10 Gbps at 600 MHz © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4.3 Coaxial and Fiber-Optic Cabling © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Coaxial and Fiber-Optic Cabling Cable TV and Satellite Cables Coaxial cable (or coax) carries data in the form of electrical signals. It provides improved shielding compared to UTP and can therefore carry more data. It is used by cable television companies to provide service and for connecting the various components that make up satellite communication systems. With the addition of a cable modem, the cable television provider can offer data and internet service, as well as television signals and telephone over the same coaxial cable to customers. Usually terminated with a BNC or F-series connector The outer jacket is an insulator to protect against EMI and RFI A single center conductor is copper or aluminum A metallic braid helps to shield against EMI and RFI © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Coaxial and Fiber-Optic Cabling Fiber-Optic Cables Fiber-optic cables transmit data using pulses of light. Fiber-optic cable is constructed of either glass or plastic and it is immune to EMI and RFI. Parts of a fiber-optical cable are: Jacket - typically a PVC jacket that protects the fiber against abrasion, moisture, and other contaminants. Strengthening Material - Surrounds the buffer, prevents the fiber cable from being stretched when it is being pulled Buffer - Used to help shield the core and cladding from damage. Cladding - Made from slightly different chemicals than those used to create the core. It tends to act like a mirror. Core - The light transmission element at the center of the optical fiber. Light pulses travel through the fiber core. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4.4 Twisted-Pair Operation © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Twisted-Pair Operation Twisted-Pair Wiring Schemes The color coding of the wire pairs in an UTP cable is determined by the type of standard that is used to make the cable. Different standards have different purposes and are closely governed by the standards organizations. There are two standards that are widely implemented for typical Ethernet installations. The TIA/EIA organization defines two different patterns, or wiring schemes, called T568A and T568B. Each wiring scheme defines the pinout, or order of wire connections, on the end of the cable. One of the two wiring schemes (T568A or T568B) should be chosen for a network installation. It is important that the same wiring scheme is used for every termination in that project. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Twisted-Pair Operation Twisted-Pair Transmit and Receive Pairs Ethernet NICs and the ports on networking devices are designed to send data over UTP cables. Specific pins on the connector are associated with a transmit function and a receive function. The interfaces on each device are designed to transmit and receive data on designated wires within the cable. When two unlike devices are directly connected using an UTP Ethernet cable, it is important that the transmit function and the receive function on each end of the cable are reversed. This cable is called straight-through cable and it has the same color patterns on both ends of the cable. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4.5 Verify Connectivity © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Verify Connectivity Video - The ping Command © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Verify Connectivity Using the ping Command A host that sends messages across the internet must have an IP address to identify it to the other devices in the network. The ping utility can be used to test end-to-end connectivity between the IP address of the sending host and the IP address of the destination host. It measures the time that it takes test messages to make a round trip from the source to the destination, and whether the transmission is successful. However, if the test message does not reach the destination, or if delays are encountered along the way, ping cannot determine where the problem is located. The format of the ping command is ping x.x.x.x, where x.x.x.x is an IP address or domain name of the destination host: For example, ping 192.168.30.1, ping www.cisco.com, etc. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Verify Connectivity The traceroute Command The traceroute utility traces the route a message takes from its source to the destination. Each individual network through which the message travels is referred to as a hop. The traceroute command displays each hop along the way and the time it takes for the message to get to that network and back. If a problem occurs, the output of the traceroute utility can help determine where a message was lost or delayed. The traceroute utility is called tracert in the Windows environment. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Verify Connectivity Video - Build a Network in Packet Tracer © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Verify Connectivity Video - Trace a Path through the Network © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Verify Connectivity Video - Traceroute Operation © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Verify Connectivity Lab - Build a Simple Network In this lab, you will complete the following objectives: Identify cables and ports for use in the network. Cable a physical lab topology. Enter static IP address information on the LAN interface of the hosts. Verify that PCs can communicate using the ping utility. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Verify Connectivity Lab - Trace a Route In this lab, you will complete the following objectives: Test network connectivity using ping. Trace a route to a remote server using Windows tracert. Trace a route to a remote server using web-based tools and software tools. Compare traceroute results. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.1 The Rules © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 The Rules The Three Elements The primary purpose of any network is to provide us with a method to communicate and share information. All communication begins with a message, or information, that must be sent from one individual or device to another. All communication methods have three elements in common: The first of these elements is the message source, or sender. Message sources are people, or electronic devices, that need to communicate a message to other individuals or devices. The second element of communication is the destination, or receiver, of the message. The destination receives the message and interprets it. The third element is called a transmission medium, or channel. It provides the pathway over which the message can travel from source to destination. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 The Rules Communication Protocols Before beginning to communicate with each other, we establish rules or agreements to govern the conversation: What method of communication should we use? What language should we use? Do we need to confirm that our messages are received? These rules, or protocols, must be followed for the message to be successfully delivered and understood: An identified sender and receiver Agreed upon method of communicating (face-to-face, telephone, letter, photograph) Common language and grammar Speed and timing of delivery Confirmation or acknowledgment requirements © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 The Rules Why Protocols Matter Protocol Description Characteristic When a message is sent, it must use a specific format or structure. Message Message format formats depend on the type of message and the channel that is used to deliver the message. The rules that govern the size of the pieces communicated across the network are very strict and can be different, depending on the channel used. Message size It may be necessary to break a longer message into smaller pieces in order to ensure that the message can be delivered reliably. Many network communication functions are dependent on timing. Timing determines the speed at which the bits are transmitted across the network. It Timing also affects when an individual host can send data and the total amount of data that can be sent in any one transmission. Messages sent across the network are first converted into bits by the sending host. Each bit is encoded into a pattern of sounds, light waves, or electrical Encoding impulses. The destination host receives and decodes the signals in order to interpret the message. Each message transmitted on a network must include a header that contains addressing information that identifies the source and destination hosts. Encapsulation Encapsulation is the process of adding this information © 2020 Cisco and/or its to theAllpieces affiliates. of data rights reserved. Cisco Confidential 50 that make up the message. The Rules Lab - My Protocol Rules In this lab, you will complete the following objectives: Relate computer network protocols to the rules that you use every day for various forms of communication. Define the rules that govern how you send and interpret text messages. Explain what would happen if the sender and receiver did not agree on the details of the protocol. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 5.2 Communication Standards © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 Communication Standards Video - Devices in a Bubble © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 Communication Standards The Internet and Standards A standard is a set of rules that determines how something must be done. Networking and internet standards ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner. Using standards, it is possible for different types of devices to send information to each other over the internet. For example, the way in which an email is formatted, forwarded, and received by all devices is done according to a standard: If one person sends an email via a personal computer, another person can use a mobile phone to receive and read the email as long as the mobile phone uses the same standards as the personal computer. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 Communication Standards Network Standards Organizations An internet standard is the end result of a comprehensive cycle of discussion, problem solving, and testing. These different standards are developed, published, and maintained by a variety of organizations. When a new standard is proposed, each stage of the development and approval process is recorded in a numbered Request for Comments (RFC) document. RFCs for internet standards are published and managed by the Internet Engineering Task Force (IETF). Other standards organizations that support the internet are shown in the figure. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 5.3 Network Communication Models © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 Network Communication Models Video - Network Protocols © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 Network Communication Models Video - The Protocol Stack © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Network Communication Models The Protocol Stack Successful communication between hosts requires interaction between a number of protocols. These protocols are implemented in software and hardware that are installed on each host and networking device. The interaction between the different protocols on a device can be illustrated as a protocol stack, as shown in the figure. A stack illustrates the protocols as a layered hierarchy, with each higher-level protocol depending on the services of the protocols shown in the lower levels. The separation of functions enables each layer in the stack to operate independently of others © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Network Communication Models The Protocol Stack (Cont.) The protocols in the figure are described as follows: Hypertext Transfer Protocol (HTTP) – This protocol governs the way a web server and a web client interact. HTTP defines the content and formatting of the requests and responses that are exchanged between the client and server. Transmission Control Protocol (TCP) – This protocol manages the individual conversations. TCP is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices. Internet Protocol (IP) – This protocol is responsible for delivering messages from the sender to the receiver. IP is used by routers to forward the messages across multiple networks. Ethernet – This protocol is responsible for the delivery of messages from one NIC to another NIC on the same Ethernet local area network (LAN). © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Network Communication Models The TCP/IP Model A layered model depicts the operation of the protocols occurring within each layer, as well as the interaction with the layers above and below it. The layered model has many benefits: Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below. Fosters competition because products from different vendors can work together. Enables technology changes to occur at one level without affecting the other levels. Provides a common language to describe networking functions and capabilities. TCP/IP Model Layer Description Application Represents data to the user, plus encoding and dialog control. Transport Supports communication between various devices across diverse networks. Internet Determines the best path through the network. Network Access Controls the hardware devices and media that make up the network. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 Network Communication Models The OSI Reference Model OSI Model Layer Description 7 - Application The application layer contains protocols used for process-to-process communications. 6 - Presentation The presentation layer provides for common representation of the data transferred between application layer services. 5 - Session The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange. 4 - Transport The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices. 3 - Network The network layer provides services to exchange the individual pieces of data over the network between identified end devices. 2 - Data Link The data link layer protocols describe methods for exchanging data frames between devices over a common media 1 - Physical The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de- activate physical connections for a bit transmission to and from a network device. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 Network Communication Models Upper and Lower Layers of the OSI Model Common Network Components Group Layer Number Layer Name Associated with this Layer 7 Application Network aware applications Email Upper Web browsers and servers 6 Presentation Layers File transfer 5 Session Name resolution Video and voice streaming mechanisms 4 Transport Firewall filtering lists IP addressing 3 Network Routing Lower Network interface cards and drivers Layers 2 Data Link Network switching WAN connectivity Physical medium (copper twisted pair, fiber- 1 Physical optic cables, wireless transmitters) Hubs and repeaters © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 Network Communication Models OSI Model and TCP/IP Model Comparison The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI reference model: The functions that occur at the internet layer in the TCP/IP model are contained in the network layer of the OSI Model. The transport layer functionality is the same between both models. The network access layer and the application layer of the TCP/IP model are further divided in the OSI model to describe discrete functions that must occur at these layers. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 5.4 Ethernet © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Ethernet The Rise of Ethernet In the early days of networking, each vendor used its own proprietary methods of interconnecting network devices and networking protocols. As networks became more widespread, standards were developed that defined rules by which network equipment from different vendors operated. Standards are beneficial to networking in many ways: Facilitate design Simplify product development Promote competition Provide consistent interconnections Facilitate training Provide more vendor choices for customers © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 Ethernet The Rise of Ethernet (Cont.) There is no official local area networking standard protocol, but over time, Ethernet has become the most common. Ethernet protocols define how data is formatted and how it is transmitted over the wired network. The Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model. Ethernet has become a de facto standard, which means that it is the technology used by almost all wired local area networks, as shown in the figure. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 Ethernet Ethernet Evolution The Institute of Electrical and Electronic Engineers, or IEEE, maintains the networking standards, including Ethernet and wireless standards. Each technology standard is assigned a number that refers to the committee that is responsible for approving and maintaining the standard. The committee responsible for the Ethernet standards is 802.3. Each version of Ethernet has an associated standard. For example, 802.3 100BASE-T. This standard notation translates as: 100 is the speed in Mbps BASE stands for baseband transmission T stands for the type of cable, in this case, twisted-pair cable standards. Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of Ethernet operate at 10 Gigabits per second and more. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 Ethernet Video - Ethernet Addressing © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69 Ethernet The Ethernet MAC Address All communication requires a way to identify the source and destination. The source and destination in human communication are represented by names. When your name is called, you listen to the message and respond. Other people in the room may hear the message, but they ignore it because it is not addressed to them. On Ethernet networks, a similar method exists for identifying source and destination hosts. Each host connected to an Ethernet network is assigned a physical address which serves to identify the host on the network. Every Ethernet network interface has a physical address assigned to it when it is manufactured. This address is known as the Media Access Control (MAC) address. The MAC address identifies each source and destination host on the network. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 Ethernet Lab - Determine the MAC Address of a Host In this lab, you will complete the following objectives: Determine the MAC address of a Windows computer on an Ethernet network using the ipconfig /all command. Analyze a MAC address to determine the manufacturer. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71