Summary

This document is a module on networking, covering topics such as network components, topologies, and internet connections. The module aims to explain modern networking technologies, including examples like LANs and WANs.

Full Transcript

Module 1: Networking Today Introduction to Networks v7.0 (ITN) Module Objectives Module Title: Networking Today Module Objective: Explain the advances in modern technologies. © 2016 Cisco and/or its affiliates. All rights reserved....

Module 1: Networking Today Introduction to Networks v7.0 (ITN) Module Objectives Module Title: Networking Today Module Objective: Explain the advances in modern technologies. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 1.1 Networks Affect Our Lives © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Networking Today Networks Connect Us Communication is almost as important to us as our reliance on air, water, food, and shelter. In today‟s world, through the use of networks, we are connected like never before. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Networking Today Video – The Cisco Networking Academy Learning Experience Cisco Networking Academy: learn how we use technology to make the world a better place. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Networking Today No Boundaries World without boundaries Global communities Human network © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 1.2 Network Components © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Network Components Host Roles Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: email servers web servers Server Description Type file server Email Email server runs email server software. Clients are computers that send Clients use client software to access email. requests to the servers to retrieve Web Web server runs web server software. information: Clients use browser software to access web pages. web page from a web server email from an email server File File server stores corporate and user files. The client devices access these files. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Network Components Peer-to-Peer It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing Slower performance printers © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Network Components End Devices An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end device. Example: PCs, VoIP phones, printers, servers, laptops, wireless tablets, telePresence endpoint. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Network Components Intermediary Network Devices An intermediary device interconnects end devices. Examples include switches, wireless access points, routers, and firewalls. Management of data as it flows through a network is also the role of an intermediary device, including: Regenerate and retransmit data signals. Maintain information about what pathways exist in the network. Notify other devices of errors and communication failures. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Network Components Network Media Communication across a network is carried through a medium which allows a message to travel from source to destination. Media Types Description Metal wires within cables Uses electrical impulses Glass or plastic fibers Uses pulses of light. within cables (fiber-optic cable) Wireless transmission Uses modulation of specific frequencies of electromagnetic waves. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 1.3 Network Representations and Topologies © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Network Representations and Topologies Network Representations Network diagrams, often called topology diagrams, use symbols to represent devices within the network. Important terms to know include: Network Interface Card (NIC) Physical Port Interface Note: Often, the terms port and interface are used interchangeably © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Network Representations and Topologies Topology Diagrams Physical topology diagrams illustrate the Logical topology diagrams illustrate devices, physical location of intermediary devices ports, and the addressing scheme of the and cable installation. network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 1.4 Common Types of Networks © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Common Types of Networks Networks of Many Sizes Small Home Networks: connect a few computers to each other and the Internet Small Office/Home Office: enables computer within a home or remote office to connect to a corporate network Small Home SOHO Medium to Large Networks: many locations with hundreds or thousands of interconnected computers World Wide Networks: connects hundreds of millions of computers world- wide – such as the internet Medium/Large World Wide © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Common Types of Networks LANs and WANs Network infrastructures vary greatly in terms of: Size of the area covered Number of users connected Number and types of services available Area of responsibility Two most common types of networks: Local Area Network (LAN) Wide Area Network (WAN). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Common Types of Networks LANs and WANs (cont.) A LAN is a network infrastructure that spans A WAN is a network infrastructure that spans a small geographical area. a wide geographical area. LAN WAN Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas. Administered by a single organization or individual. Typically administered by one or more service providers. Provide high-speed bandwidth to internal devices. Typically provide slower speed links between LANs. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Common Types of Networks The Internet The internet is a worldwide collection of interconnected LANs and WANs. LANs are connected to each other using WANs. WANs may use copper wires, fiber optic cables, and wireless transmissions. The internet is not owned by any individual or group. The following groups were developed to help maintain structure on the internet: IETF ICANN IAB © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Common Types of Networks Intranets and Extranets An intranet is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization. An organization might use an extranet to provide secure access to their network for individuals who work for a different organization that need access to their data on their network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 1.5 Internet Connections © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Internet Connections Internet Access Technologies There are many ways to connect users and organizations to the internet: Popular services for home users and small offices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services. Organizations need faster connections to support IP phones, video conferencing and data center storage. Business-class interconnections are usually provided by service providers (SP) and may include: business DSL, leased lines, and Metro Ethernet. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Internet Connections Home and Small Office Internet Connections Connection Description Cable high bandwidth, always on, internet offered by cable television service providers. DSL high bandwidth, always on, internet connection that runs over a telephone line. Cellular uses a cell phone network to connect to the internet. Satellite major benefit to rural areas without Internet Service Providers. Dial-up an inexpensive, low bandwidth telephone option using a modem. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Internet Connections Businesses Internet Connections Corporate business connections may Type of Description require: Connection Dedicated These are reserved circuits within higher bandwidth Leased Line the service provider‟s network that dedicated connections connect distant offices with private voice and/or data networking. managed services Metro Ethernet This extends LAN access (Ethernet technology into the WAN. WAN) DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL). Satellite This can provide a connection when a wired solution is not available. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Internet Connections The Converging Network Before converged networks, an organization would have been separately cabled for telephone, video, and data. Each of these networks would use different technologies to carry the signal. Each of these technologies would use a different set of rules and standards. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Internet Connections The Converging Network (Cont.) Converged data networks carry multiple services on one link including: data voice video Converged networks can deliver data, voice, and video over the same network infrastructure. The network infrastructure uses the same set of rules and standards. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Internet Connections Video – Download and Install Packet Tracer This video will demonstrate the download and install process of Packet Tracer. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Internet Connections Video – Getting Started in Cisco Packet Tracer This video will cover the following: Navigate the Packet Tracer interface Customize the Packet Tracer Interface © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Internet Connections Packet Tracer – Network Representation In this Packet tracer you will do the following: The network model in this activity incorporates many of the technologies that you will master in your CCNA studies. Note: It is not important that you understand everything you see and do in this activity. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 1.6 Reliable Networks © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Reliable Network Network Architecture Network Architecture refers to the technologies that support the infrastructure that moves data across the network. There are four basic characteristics that the underlying architectures need to address to meet user expectations: Fault Tolerance Scalability Quality of Service (QoS) Security © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Reliable Network Fault Tolerance A fault tolerant network limits the impact of a failure by limiting the number of affected devices. Multiple paths are required for fault tolerance. Reliable networks provide redundancy by implementing a packet switched network: Packet switching splits traffic into packets that are routed over a network. Each packet could theoretically take a different path to the destination. This is not possible with circuit-switched networks which establish dedicated circuits. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Reliable Network Scalability A scalable network can expand quickly and easily to support new users and applications without impacting the performance of services to existing users. Network designers follow accepted standards and protocols in order to make the networks scalable. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 Reliable Network Quality of Service Voice and live video transmissions require higher expectations for those services being delivered. Have you ever watched a live video with constant breaks and pauses? This is caused when there is a higher demand for bandwidth than available – and QoS isn‟t configured. Quality of Service (QoS) is the primary mechanism used to ensure reliable delivery of content for all users. With a QoS policy in place, the router can more easily manage the flow of data and voice traffic. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Reliable Network There are two main types of network Network Security security that must be addressed: Network infrastructure security  Physical security of network devices  Preventing unauthorized access to the devices Information Security  Protection of the information or data transmitted over the network Three goals of network security: Confidentiality – only intended recipients can read the data Integrity – assurance that the data has not be altered with during transmission Availability – assurance of timely and reliable access to data for authorized users © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 1.7 Network Trends © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 Network Trends Recent Trends The role of the network must adjust and continually transform in order to be able to keep up with new technologies and end user devices as they constantly come to the market. Several new networking trends that effect organizations and consumers: Bring Your Own Device (BYOD) Online collaboration Video communications Cloud computing © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Network Trends Bring Your Own Device (BYOD) Bring Your Own Device allows users to use their own devices giving them more opportunities and greater flexibility. BYOD allows end users to have the freedom to use personal tools to access information and communicate using their: Laptops Netbooks Tablets Smartphones E-readers BYOD means any device, with any ownership, used anywhere. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Network Trends Online Collaboration  Collaborate and work with others over the network on joint projects.  Collaboration tools including Cisco WebEx (shown in the figure) gives users a way to instantly connect and interact.  Collaboration is a very high priority for businesses and in education.  Cisco Webex Teams is a multifunctional collaboration tool. send instant messages post images post videos and links © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 Network Trends Video Communication Video calls are made to anyone, regardless of where they are located. Video conferencing is a powerful tool for communicating with others. Video is becoming a critical requirement for effective collaboration. Cisco TelePresence powers is one way of working where everyone, everywhere. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Network Trends Video – Cisco WebEx for Huddles © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Network Trends Cloud Computing Cloud computing allows us to store personal files or backup our data on servers over the internet. Applications can also be accessed using the Cloud. Allows businesses to deliver to any device anywhere in the world. Cloud computing is made possible by data centers. Smaller companies that can‟t afford their own data centers, lease server and storage services from larger data center organizations in the Cloud. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Network Trends Cloud Computing (Cont.) Four types of Clouds: Public Clouds  Available to the general public through a pay-per-use model or for free. Private Clouds  Intended for a specific organization or entity such as the government. Hybrid Clouds  Made up of two or more Cloud types – for example, part custom and part public.  Each part remains a distinctive object but both are connected using the same architecture. Custom Clouds  Built to meet the needs of a specific industry, such as healthcare or media.  Can be private or public. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 Network Trends Technology Trends in the Home Smart home technology is a growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices. Ovens might know what time to cook a meal for you by communicating with your calendar on what time you are scheduled to be home. Smart home technology is currently being developed for all rooms within a house. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 Network Trends Powerline Networking Powerline networking can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option. Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet by sending data on certain frequencies. Powerline networking is especially useful when wireless access points cannot reach all the devices in the home. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 Network Trends Wireless Broadband In addition to DSL and cable, wireless is another option used to connect homes and small businesses to the internet. More commonly found in rural environments, a Wireless Internet Service Provider (WISP) is an ISP that connects subscribers to designated access points or hotspots. Wireless broadband is another solution for the home and small businesses. Uses the same cellular technology used by a smart phone. An antenna is installed outside the house providing wireless or wired connectivity for devices in the home. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 1.8 Network Security © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 Network Security Security Threats Network security is an integral part of networking regardless of the size of the network. The network security that is implemented must take into account the environment while securing the data, but still allowing for quality of service that is expected of the network. Securing a network involves many protocols, technologies, devices, tools, and techniques in order to secure data and mitigate threats. Threat vectors might be external or internal. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 Network Security External Threats: Security Threats (Cont.) Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks Threat Actor attacks Denial of service attacks Data interception and theft Identity theft Internal Threats: lost or stolen devices accidental misuse by employees malicious employees © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50 Network Security Security Solutions Security must be implemented in multiple layers using more than one security solution. Network security components for home or small office network: Antivirus and antispyware software should be installed on end devices. Firewall filtering used to block unauthorized access to the network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 Network Security Security Solutions (Cont.) Larger networks have additional security requirements: Dedicated firewall system Access control lists (ACL) Intrusion prevention systems (IPS) Virtual private networks (VPN) The study of network security starts with a clear understanding of the underlying switching and routing infrastructure. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 1.9 The IT Professional © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 The IT Professional The Cisco Certified Network Associate CCNA (CCNA) certification: demonstrates that you have a knowledge of foundational technologies ensures you stay relevant with skills needed for the adoption of next-generation technologies. The new CCNA focus: IP foundation and security topics Wireless, virtualization, automation, and network programmability. New DevNet certifications at the associate, specialist and professional levels, to validate your software development skills. Specialist certification validate your skills in line with your job role and interests. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 The IT Professional Networking Jobs At www.netacad.com you can click the Careers menu and then select Employment opportunities. Find employment opportunities by using the Talent Bridge Matching Engine. Search for jobs with Cisco, Cisco partners and distributors seeking Cisco Networking Academy students and alumni. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 The IT Professional Lab – Researching IT and Networking Job Opportunities In this lab, you will complete the following objectives: Research Job Opportunities Reflect on Research © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 1.10 Module Practice and Quiz © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 Module Practice and Quiz What did I learn in this module? Through the use of networks, we are connected like never before. All computers that are connected to a network and participate directly in network communication are classified as hosts. Diagrams of networks often use symbols to represent the different devices and connections that make up a network. A diagram provides an easy way to understand how devices connect in a large network. The two types of network infrastructures are Local Area Networks (LANs), and Wide Area Networks (WANs). SOHO internet connections include cable, DSL, Cellular, Satellite, and Dial-up telephone. Business internet connections include Dedicated Leased Line, Metro Ethernet, Business DSL, and Satellite. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Module Practice and Quiz What did I learn in this module? (Cont.) Network architecture refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network. There are four basic characteristics of network architecture: Fault Tolerance, Scalability, Quality of Service (QoS), and Security. Recent networking trends that affect organizations and consumers: Bring Your Own Device (BYOD), online collaboration, video communications, and cloud computing. There are several common external and internal threats to networks. Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but they also have other security requirements: Dedicated firewall systems, Access control lists (ACL), Intrusion prevention systems (IPS), and Virtual private networks (VPN) The Cisco Certified Network Associate (CCNA) certification demonstrates your knowledge of foundational technologies. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Module 2: Basic Switch and End Device Configuration Introductions to Networks v7.0 (ITN) Module Objectives Module Title: Basic Switch and End Device Configuration Module Objective: Implement initial settings including passwords, IP addressing, and default gateway parameters on a network switch and end devices. Topic Title Topic Objective Explain how to access a Cisco IOS device for configuration Cisco IOS Access purposes. Explain how to navigate Cisco IOS to configure network IOS Navigation devices. The Command Structure Describe the command structure of Cisco IOS software. Basic Device Configuration Configure a Cisco IOS device using CLI. Save Configurations Use IOS commands to save the running configuration. Ports and Addresses Explain how devices communicate across network media. Configure IP Addressing Configure a host device with an IP address. Verify Connectivity Verify connectivity between two end devices. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 2.1 Cisco IOS Access © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 Cisco IOS Access Operating Systems Shell - The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces. Kernel - Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Hardware - The physical part of a computer including underlying electronics. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 Cisco IOS Access GUI A GUI allows the user to interact with the system using an environment of graphical icons, menus, and windows. A GUI is more user-friendly and requires less knowledge of the underlying command structure that controls the system. Examples of these are: Windows, macOS, Linux KDE, Apple iOS and Android. GUIs can fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a CLI. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Cisco IOS Access Purpose of an OS PC operating system enables a user to do CLI-based network operating system enables a the following: network technician to do the following: Use a mouse to make selections Use a keyboard to run CLI-based and run programs network programs Enter text and text-based Use a keyboard to enter text and commands text-based commands View output on a monitor View output on a monitor © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Cisco IOS Access Access Methods Console – A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations. Secure Shell (SSH) – Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.) Telnet – Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 Cisco IOS Access Terminal Emulation Programs Terminal emulation programs are used to connect to a network device by either a console port or by an SSH/Telnet connection. There are several terminal emulation programs to chose from such as PuTTY, Tera Term and SecureCRT. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 2.2 IOS Navigation © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 IOS Navigation Primary Command Modes User EXEC Mode: Mode with limited capabilities Allows access to only a limited number of basic monitoring commands Identified by the CLI prompt that ends with the > symbol Privileged EXEC Mode: Allows access to all commands and features Allows access to higher configuration mode (like global configuration mode) Identified by the CLI prompt that ends with the # symbol © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69 IOS Navigation Configuration Mode and Subconfiguration Modes Global Configuration Mode: Used to access configuration options on the device Line Configuration Mode: Used to configure console, SSH, Telnet or AUX access Interface Configuration Mode: Used to configure a switch port or router interface © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 IOS Navigation Video – IOS CLI Primary Command Modes This video will cover the following: User EXEC mode Privilege EXEC mode Global Config mode © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71 IOS Navigation Navigation Between IOS Modes  Privileged EXEC Mode: To move from user EXEC mode to privilege EXEC mode, use the enabled command. To return to the user EXEC mode, use the disable command  Global Configuration Mode: To move in and out of global configuration mode, use the configure terminal command. To return to privilege EXEC mode, use the exit command.  Line Configuration Mode: To move in and out of line configuration mode, use the line command followed by the management line type (example: line console 0). To return to global configuration mode, use the exit command. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72 IOS Navigation Navigation Between IOS Modes (Cont.) Subconfiguration Modes: To move out of any subconfiguration mode to get back to global configuration mode, use the exit command. To return to privilege EXEC mode, use the end command or key combination Ctrl +Z. To move directly from one subconfiguration mode to another, type in the desired subconfiguration mode command. In the example, the command prompt changes from (config-line)# to (config-if)#. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73 IOS Navigation Video – Navigation Between IOS Modes This video will cover the following: enable disable configure terminal exit end Control + Z on keyboard Other commands to enter sub configuration modes © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74 2.3 The Command Structure © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75 The Command Structure Basic IOS Command Structure Keyword – This is a specific parameter defined in the operating system (in the figure, ip protocols). Argument - This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76 The Command Structure IOS Command Syntax Check A command might require one or more arguments. To determine the keywords and arguments required for a command, refer to the command syntax. Boldface text indicates commands and keywords that are entered as shown. Italic text indicates an argument for which the user provides the value. Convention Description Boldface text indicates commands and keywords that you enter literally as boldface shown. italics Italic text indicates arguments for which you supply values. [x] Square brackets indicate an optional element (keyword or argument). {x} Braces indicate a required element (keyword or argument). Braces and vertical lines within square brackets indicate a required choice [x {y | z }] within an optional element. Spaces are used to clearly delineate parts of the command. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77 The Command Structure IOS Command Syntax Check (Cont.)  The command syntax provides the pattern, or format, that must be used when entering a command.  The command is ping and the user-defined argument is the ip-address of the destination device. For example, ping 10.10.10.5.  The command is traceroute and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254.  If a command is complex with multiple arguments, you may see it represented like this: © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78 The Command Structure IOS Help Features The IOS has two forms of help available: context-sensitive help and command syntax check. Context-sensitive help enables you to Command syntax check verifies that quickly find answers to these questions: a valid command was entered by Which commands are available in each command the user. mode? If the interpreter cannot understand the Which commands start with specific characters or command being entered, it will provide group of characters? feedback describing what is wrong with the command. Which arguments and keywords are available to particular commands? © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79 The Command Structure Video – Context Sensitive Help and Command Syntax Checker This video will cover the following: Use the help command in user EXEC, privileged EXEC, and global config mode Finish commands and arguments with the help command Use the command syntax checker to fix syntax errors and incomplete commands © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80 The Command Structure Hot Keys and Shortcuts The IOS CLI provides hot keys and shortcuts that make configuring, monitoring, and troubleshooting easier. Commands and keywords can be shortened to the minimum number of characters that identify a unique selection. For example, the configure command can be shortened to conf because configure is the only command that begins with conf. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81 The Command Structure Hot Keys and Shortcuts (Cont.)  The table below is a brief list of keystrokes to enhance command line editing. Keystroke Description Tab Completes a partial command name entry. Backspace Erases the character to the left of the cursor. Left Arrow or Ctrl+B Moves the cursor one character to the left. Right Arrow or Ctrl+F Moves the cursor one character to the right. Recalls the commands in the history buffer, beginning with Up Arrow or Ctrl+P the most recent commands. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82 The Command Structure Hot Keys and Shortcuts (Cont.) When a command output produces more text than can be displayed in a terminal window, The table below lists commands that can the IOS will display a “--More--” prompt. The be used to exit out of an operation. table below describes the keystrokes that can be used when this prompt is displayed. Keystroke Description Keystroke Description When in any configuration mode, ends the Enter Key Displays the next line. Ctrl-C configuration mode and returns to privileged EXEC mode. When in any configuration mode, ends the Space Bar Displays the next screen. Ctrl-Z configuration mode and returns to privileged EXEC mode. Ends the display string, returning to All-purpose break sequence used to abort DNS Any other key Ctrl-Shift-6 privileged EXEC mode. lookups, traceroutes, pings, etc. Note: To see more hot keys and shortcuts refer to 2.3.5. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83 The Command Structure Video – Hot Keys and Shortcuts This video will cover the following: Tab key (tab completion) Command shortening Up and down arrow key CTRL + C CTRL + Z CTRL + Shift + 6 CTRL + R © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84 The Command Structure Packet Tracer – Navigate the IOS In this Packet Tracer, you will do the following: Establish Basic Connections, Access the CLI, and Explore Help Explore EXEC Modes Set the Clock © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85 The Command Structure Lab – Navigate the IOS by Using Tera Term for Console Connectivity In this lab, you complete the following objectives: Access a Cisco Switch through the Serial Console Port Display and Configure Basic Device Settings (Optional) Access a Cisco Router Using a Mini-USB Console Cable © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86 2.4 Basic Device Configuration © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87 Basic Device Configuration Device Names The first configuration command on any device should be to give it a unique hostname. By default, all devices are assigned a factory default name. For example, a Cisco IOS switch is "Switch.” Guideline for naming devices: Start with a letter Contain no spaces End with a letter or digit Note: To return the switch to the default Use only letters, digits, and dashes prompt, use the no hostname global Be less than 64 characters in length config command. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88 Basic Device Configuration Password Guidelines The use of weak or easily guessed passwords are a security concern. All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be encrypted and legal notifications provided. Password Guidelines: Use passwords that are more than eight characters in length. Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences. Note: Most of the labs in this course use simple passwords such as cisco or class. These Avoid using the same password for all devices. passwords are considered weak and easily Do not use common words because they are guessable and should be avoided in production easily guessed. environments. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89 Basic Device Configuration Configure Passwords Securing user EXEC mode access: First enter line console configuration mode using the line console 0 command in global configuration mode. Next, specify the user EXEC mode password using the password password command. Finally, enable user EXEC access using the login command. Securing privileged EXEC mode access: First enter global configuration mode. Next, use the enable secret password command. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90 Basic Device Configuration Configure Passwords (Cont.) Securing VTY line access: First enter line VTY configuration mode using the line vty 0 15 command in global configuration mode. Next, specify the VTY password using the password password command. Finally, enable VTY access using the login command.  Note: VTY lines enable remote access using Telnet or SSH to the device. Many Cisco switches support up to 16 VTY lines that are numbered 0 to 15. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91 Basic Device Configuration Encrypt Passwords  The startup-config and running-config files  Use the show running-config command display most passwords in plaintext. to verify that the passwords on the device are now encrypted.  To encrypt all plaintext passwords, use the service password-encryption global config command. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92 Basic Device Configuration Banner Messages  A banner message is important to warn unauthorized personnel from attempting to access the device.  To create a banner message of the day on a network device, use the banner The banner will be displayed on attempts to access the device. motd # the message of the day # global config command. Note: The “#” in the command syntax is called the delimiting character. It is entered before and after the message. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93 Basic Device Configuration Video – Secure Administrative Access to a Switch This video will cover the following: Access the command line to secure the switch Secure access to the console port Secure virtual terminal access for remote access Encrypt passwords on the switch Configure the banner message Verify security changes © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94 2.5 Save Configurations © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95 Save Configurations Configuration Files  There are two system files that store the device configuration: startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off. running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted. To save changes made to the running configuration to the startup configuration file, use the copy running-config startup-config privileged EXEC mode command. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96 Save Configurations Alter the Running Configurations If changes made to the running config do not have the desired effect and the running-config has not yet been saved, you can restore the device to its previous configuration. To do this you can do any of the following: Remove the changed commands individually. Reload the device using the reload command in privilege EXEC mode. Note: This will cause the device to briefly go offline, leading to network downtime. If the undesired changes were saved to the startup-config, it may be necessary to clear all the configurations using the erase startup- config command in privilege EXEC mode. After erasing the startup-config, reload the device to clear the running-config file from RAM. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97 Save Configurations Video – Alter the Running Configuration This video will cover the following: Copy the running-config file to the startup-config file Show the files in the flash or NVRAM directory Use command shortening Erase the startup-config file Copy the start-config file to the running-config file © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98 Save Configurations Capture Configuration to a Text File Configuration files can also be saved and archived to a text document. Step 1. Open terminal emulation software, such as PuTTY or Tera Term, that is already connected to a switch. Step 2. Enable logging in to the terminal software and assign a name and file location to save the log file. The figure displays that All session output will be captured to the file specified (i.e., MySwitchLogs). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99 Save Configurations Capture Configuration to a Text File (Cont.) Step 3. Execute the show running- config or show startup-config command at the privileged EXEC prompt. Text displayed in the terminal window will be placed into the chosen file. Step 4. Disable logging in the terminal software. The figure shows how to disable logging by choosing the None session logging option Note: The text file created can be used as a record of how the device is currently implemented. The file could require editing before being used to restore a saved configuration to a device. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100 Save Configurations Packet Tracer – Configure Initial Switch Settings In this Packet Tracer, you will do the following: Verify the Default Switch Configuration Configure a Basic Switch Configuration Configure a MOTD Banner Save Configuration Files to NVRAM Configure a second Switch © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101 2.6 Ports and Addresses © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102 Ports and Addresses IP Addresses The use of IP addresses is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet. The structure of an IPv4 address is called dotted decimal notation and is represented by four decimal numbers between 0 and 255. An IPv4 subnet mask is a 32-bit value that differentiates the network portion of the address from the host portion. Coupled with the IPv4 address, the subnet mask determines to which subnet the device is a member. The default gateway address is the IP address of the router that the host will use to access remote networks, including the internet. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103 Ports and Addresses IP Addresses (Cont.) IPv6 addresses are 128 bits in length and written as a string of hexadecimal values. Every four bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values. Groups of four hexadecimal digits are separated by a colon “:”. IPv6 addresses are not case-sensitive and can be written in either lowercase or uppercase. Note: IP in this course refers to both the IPv4 and IPv6 protocols. IPv6 is the most recent version of IP and is replacing the more common IPv4. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104 Ports and Addresses Interfaces and Ports Network communications depend on end user device interfaces, networking device interfaces, and the cables that connect them. Types of network media include twisted- pair copper cables, fiber-optic cables, coaxial cables, or wireless. Different types of network media have different features and benefits. Some of the differences between various types of media include: Distance the media can successfully carry a signal Environment in which the media is to be installed Amount of data and the speed at which it must be transmitted Cost of the media and installation © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105 2.7 Configure IP Addressing © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 106 Configure IP Addressing Manual IP Address Configuration for End Devices End devices on the network need an IP address in order to communicate with other devices on the network. IPv4 address information can be entered into end devices manually, or automatically using Dynamic Host Configuration Protocol (DHCP). To manually configure an IPv4 address on a Windows PC, open the Control Panel > Network Sharing Center > Change adapter settings and choose the adapter. Next right-click and select Properties to display the Local Area Connection Properties. Next, click Properties to open the Internet Protocol Version 4 (TCP/IPv4) Properties window. Then configure the IPv4 address and subnet mask information, and default gateway. Note: IPv6 addressing and configuration options are similar to IPv4. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 107 Configure IP Addressing Automatic IP Address Configuration for End Devices DHCP enables automatic IPv4 address configuration for every end device that is DHCP-enabled. End devices are typically by default using DHCP for automatic IPv4 address configuration. To configure DHCP on a Windows PC, open the Control Panel > Network Sharing Center > Change adapter settings and choose the adapter. Next right-click and select Properties to display the Local Area Connection Properties. Next, click Properties to open the Internet Protocol Version 4 (TCP/IPv4) Properties window, then select Obtain an Note: IPv6 uses DHCPv6 and SLAAC (Stateless IP address automatically and Obtain DNS Address Autoconfiguration) for dynamic address server address automatically. allocation. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108 Configure IP Addressing Switch Virtual Interface Configuration To access the switch remotely, an IP address and a subnet mask must be configured on the SVI. To configure an SVI on a switch: Enter the interface vlan 1 command in global configuration mode. Next assign an IPv4 address using the ip address ip-address subnet-mask command. Finally, enable the virtual interface using the no shutdown command. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109 Configure IP Addressing Switch Virtual Interface Configuration Similar to a Windows hosts, switches configured with an IPv4 address will typically also need to have a default gateway assigned. To configure the default gateway on a switch: Enter the ip default-gateway ip-address command in global configuration mode. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110 Configure IP Addressing Packet Tracer – Implement Basic Connectivity In this Packet Tracer, you will do the following:  Perform a Basic Configuration on two switches  Configure the PCs  Configure the Switch Management Interface © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111 2.8 Verify Connectivity © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112 Verify Connectivity Video – Test the Interface Assignment This video will cover the following:  Connect a console cable from the PC to the switch  Use the terminal emulation program and accept the defaults to bring you to the command line  Use enable to enter privileged EXEC mode  Use the global configuration mode and the interface configuration mode to enter the no shutdown command © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113 Verify Connectivity Video – Test End-to-End Connectivity This video will cover the use of the ping command to test connectivity on both switches and both PCs. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114 2.9 Module Practice and Quiz © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115 Module Practice and Quiz Packet Tracer – Basic Switch and End Device Configuration In this Packet Tracer, you will do the following:  Configure hostnames and IP addresses on two switches  Use Cisco IOS commands to specify or limit access to the device configurations  Use IOS commands to save the running configuration  Configure two host devices with IP addresses  Verify connectivity between the two PC end devices © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116 Module Practice and Quiz Lab – Basic Switch and End Device Configuration In this lab, you complete the following objectives: Set Up the Network Topology Configure PC Hosts Configure and Verify Basic Switch Settings © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 117 Module Practice and Quiz What did I learn in this module? All end devices and network devices require an operating system (OS). Cisco IOS software separates management access into the following two command modes: User EXEC Mode and Privileged EXEC Mode. Global configuration mode is accessed before other specific configuration modes. From global config mode, the user can enter different subconfiguration modes. Each IOS command has a specific format or syntax and can only be executed in the appropriate mode. Basic device configurations- hostname, password, encrypt passwords and banner. There are two system files that store the device configuration: startup- config and running-config. IP addresses enable devices to locate one another and establish end- to-end communication on the internet. Each end device on a network must be configured with an IP address. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 118 Module 3: Protocols and Models Instructor Materials Introduction to Networks v7.0 (ITN) Module 3: Protocols and Models Introduction to Networks 7.0 (ITN) Module Objectives Module Title: Protocols and Models Module Objective: Explain how network protocols enable devices to access local and remote network resources. Topic Title Topic Objective The Rules Describe the types of rules that are necessary to successfully communicate. Protocols Explain why protocols are necessary in network communication. Protocol Suites Explain the purpose of adhering to a protocol suite. Standards Organizations Explain the role of standards organizations in establishing protocols for network interoperability. Reference Models Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process. Data Encapsulation Explain how data encapsulation allows data to be transported across the network. Data Access Explain how local hosts access local resources on a network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 121 Class Activity – Design a Communications System Design a Communications System Objectives: Explain the role of protocols and standards organizations in facilitating interoperability in network communications. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 122 3.1 The Rules © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123 The Rules Video – Devices in a Bubble This video will explain the protocols that devices use to see their place in the network and communicate with other devices. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 124 The Rules Communications Fundamentals Networks can vary in size and complexity. It is not enough to have a connection, devices must agree on “how” to communicate. There are three elements to any communication: There will be a source (sender). There will be a destination (receiver). There will be a channel (media) that provides for the path of communications to occur. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 125 The Rules Communications Protocols All communications are governed by protocols. Protocols are the rules that communications will follow. These rules will vary depending on the protocol. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 126 The Rules Rule Establishment Individuals must use established rules or agreements to govern the conversation. The first message is difficult to read because it is not formatted properly. The second shows the message properly formatted © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 127 The Rules Rule Establishment (Cont.) Protocols must account for the following requirements: An identified sender and receiver Common language and grammar Speed and timing of delivery Confirmation or acknowledgment requirements © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 128 The Rules Network Protocol Requirements Common computer protocols must be in agreement and include the following requirements: Message encoding Message formatting and encapsulation Message size Message timing Message delivery options © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 129 The Rules Message Encoding Encoding is the process of converting information into another acceptable form for transmission. Decoding reverses this process to interpret the information. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 130 The Rules Message Formatting and Encapsulation When a message is sent, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 131 The Rules Message Size Encoding between hosts must be in an appropriate format for the medium. Messages sent across the network are converted to bits The bits are encoded into a pattern of light, sound, or electrical impulses. The destination host must decode the signals to interpret the message. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 132 The Rules Message Timing Message timing includes the following: Flow Control – Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered. Response Timeout – Manages how long a device waits when it does not hear a reply from the destination. Access method - Determines when someone can send a message. There may be various rules governing issues like “collisions”. This is when more than one device sends traffic at the same time and the messages become corrupt. Some protocols are proactive and attempt to prevent collisions; other protocols are reactive and establish a recovery method after the collision occurs. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 133 The Rules Message Delivery Options Message delivery may one of the following methods: Unicast – one to one communication Multicast – one to many, typically not all Broadcast – one to all Note: Broadcasts are used in IPv4 networks, but are not an option for IPv6. Later we will also see “Anycast” as an additional delivery option for IPv6. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 134 The Rules A Note About the Node Icon Documents may use the node icon , typically a circle, to represent all devices. The figure illustrates the use of the node icon for delivery options. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 135 3.2 Protocols © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 136 Protocols Network Protocol Overview Network protocols define a Protocol Type Description common set of rules. Can be implemented on devices in: Network enable two or more devices to communicate over Communications one or more networks Software Hardware Network Security secure data to provide authentication, data integrity, and data encryption Both Protocols have their own: Routing enable routers to exchange route information, compare path information, and select best path Function Format Service used for the automatic detection of devices or Rules Discovery services © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 137 Protocols Network Protocol Functions Devices use agreed-upon protocols to communicate. Protocols may have may have one or functions. Function Description Addressing Identifies sender and receiver Reliability Provides guaranteed delivery Flow Control Ensures data flows at an efficient rate Sequencing Uniquely labels each transmitted segment of data Error Detection Determines if data became corrupted during transmission Application Interface Process-to-process communications between network applications © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 138 Protocols Protocol Interaction Networks require the use of several protocols. Each protocol has its own function and format. Protocol Function Hypertext Transfer  Governs the way a web server and a web client interact Protocol (HTTP)  Defines content and format Transmission Control  Manages the individual conversations Protocol (TCP)  Provides guaranteed delivery  Manages flow control Internet Protocol (IP) Delivers messages globally from the sender to the receiver Ethernet Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 139 3.3 Protocol Suites © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 140 Protocol Suites Network Protocol Suites Protocols must be able to work with other protocols. Protocol suite: A group of inter-related protocols necessary to perform a communication function Sets of rules that work together to help solve a problem The protocols are viewed in terms of layers: Higher Layers Lower Layers- concerned with moving data and provide services to upper layers © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 141 Protocol Suites Evolution of Protocol Suites There are several protocol suites. Internet Protocol Suite or TCP/IP- The most common protocol suite and maintained by the Internet Engineering Task Force (IETF) Open Systems Interconnection (OSI) protocols- Developed by the International Organization for Standardization (ISO) and the International Telecommunications Union (ITU) AppleTalk- Proprietary suite release by Apple Inc. Novell NetWare- Proprietary suite developed by Novell Inc. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 142 Protocol Suites TCP/IP Protocol Example TCP/IP protocols operate at the application, transport, and internet layers. The most common network access layer LAN protocols are Ethernet and WLAN (wireless LAN). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 143 Protocol Suites TCP/IP Protocol Suite TCP/IP is the protocol suite used by the internet and includes many protocols. TCP/IP is: An open standard protocol suite that is freely available to the public and can be used by any vendor A standards-based protocol suite that is endorsed by the networking industry and approved by a standards organization to ensure interoperability © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 144 Protocol Suites TCP/IP Communication Process A web server encapsulating and sending a A client de-encapsulating the web page for web page to a client. the web browser © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 145 3.4 Standards Organizations © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 146 Standards Organizations Open Standards Open standards encourage: interoperability competition innovation Standards organizations are: vendor-neutral non-profit organizations established to develop and promote the concept of open standards. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 147 Standards Organizations Internet Society (ISOC) - Promotes Internet Standards the open development and evolution of internet Internet Architecture Board (IAB) - Responsible for management and development of internet standards Internet Engineering Task Force (IETF) - Develops, updates, and maintains internet and TCP/IP technologies Internet Research Task Force (IRTF) - Focused on long-term research related to internet and TCP/IP protocols © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 148 Standards Organizations Internet Standards (Cont.) Standards organizations involved with the development and support of TCP/IP Internet Corporation for Assigned Names and Numbers (ICANN) - Coordinates IP address allocation, the management of domain names, and assignment of other information Internet Assigned Numbers Authority (IANA) - Oversees and manages IP address allocation, domain name management, and protocol identifiers for ICANN © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 149 Standards Organizations Electronic and Communications Standards Institute of Electrical and Electronics Engineers (IEEE, pronounced “I-triple-E”) - dedicated to creating standards in power and energy, healthcare, telecommunications, and networking Electronic Industries Alliance (EIA) - develops standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment Telecommunications Industry Association (TIA) - develops communication standards in radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) - defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 150 Standards Organizations Lab – Researching Networking Standards In this lab, you will do the following: Part 1: Research Networking Standards Organizations Part 2: Reflect on Internet and Computer Networking Experience © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 151 3.5 Reference Models © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 152 Reference Models The Benefits of Using a Layered Model Complex concepts such as how a network operates can be difficult to explain and understand. For this reason, a layered model is used. Two layered models describe network operations: Open System Interconnection (OSI) Reference Model TCP/IP Reference Model © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 153 Reference Models The Benefits of Using a Layered Model (Cont.) These are the benefits of using a layered model: Assist in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below Foster competition because products from different vendors can work together Prevent technology or capability changes in one layer from affecting other layers above and below Provide a common language to describe networking functions and capabilities © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 154 Reference Models The OSI Reference Model OSI Model Layer Description 7 - Application Contains protocols used for process-to-process communications. Provides for common representation of the data transferred between application 6 - Presentation layer services. 5 - Session Provides services to the presentation layer and to manage data exchange. Defines services to segment, transfer, and reassemble the data for individual 4 - Transport communications. 3 - Network Provides services to exchange the individual pieces of data over the network. 2 - Data Link Describes methods for exchanging data frames over a common media. 1 - Physical Describes the means to activate, maintain, and de-activate physical connections. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 155 Reference Models The TCP/IP Reference Model TCP/IP Model Description Layer Application Represents data to the user, plus encoding and dialog control. Transport Supports communication between various devices across diverse networks. Internet Determines the best path through the network. Network Access Controls the hardware devices and media that make up the network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 156 Reference Models OSI and TCP/IP Model Comparison The OSI model divides the network access layer and the application layer of the TCP/IP model into multiple layers. The TCP/IP protocol suite does not specify which protocols to use when transmitting over a physical medium. OSI Layers 1 and 2 discuss the necessary procedures to access the media and the physical means to send data over a network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 157 Reference Models Packet Tracer – Investigate the TCP/IP and OSI Models in Action This simulation activity is intended to provide a foundation for understanding the TCP/IP protocol suite and the relationship to the OSI model. Simulation mode allows you to view the data contents being sent across the network at each layer. In this Packet Tracer, you will: Part 1: Examine HTTP Web Traffic Part 2: Display Elements of the TCP/IP Protocol Suite © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 158 3.6 Data Encapsulation © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 159 Data Encapsulation Segmenting Messages Segmenting is the process of breaking up messages into smaller units. Multiplexing is the processes of taking multiple streams of segmented data and interleaving them together. Segmenting messages has two primary benefits: Increases speed - Large amounts of data can be sent over the network without tying up a communications link. Increases efficiency - Only segments which fail to reach the destination need to be retransmitted, not the entire data stream. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 160 Data Encapsulation Sequencing Sequencing messages is the process of numbering the segments so that the message may be reassembled at the destination. TCP is responsible for sequencing the individual segments. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 161 Data Encapsulation Encapsulation is the process where protocols Protocol Data Units add their information to the data. At each stage of the process, a PDU has a different name to reflect its new functions. There is no universal naming convention for PDUs, in this course, the PDUs are named according to the protocols of the TCP/IP suite. PDUs passing down the stack are as follows: 1. Data (Data Stream) 2. Segment 3. Packet 4. Frame 5. Bits (Bit Stream) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 162 Data Encapsulation Encapsulation Example Encapsulation is a top down process. The level above does its process and then passes it down to the next level of the model. This process is repeated by each layer until it is sent out as a bit stream. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 163 Data Encapsulation De-encapsulation Example Data is de-encapsulated as it moves up the stack. When a layer completes its process, that layer strips off its header and passes it up to the next level to be processed. This is repeated at each layer until it is a data stream that the application can process. 1. Received as Bits (Bit Stream) 2. Frame 3. Packet 4. Segment 5. Data (Data Stream) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 164 3.7 Data Access © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 165 Data Access Addresses Both the data link and network layers use addressing to deliver data from source to destination. Network layer source and destination addresses - Responsible for delivering the IP packet from original source to the final destination. Data link layer source and destination addresses – Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 166 Data Access Layer 3 Logical Address The IP packet contains two IP addresses: Source IP address - The IP address of the sending device, original source of the packet. Destination IP address - The IP address of the receiving device, final destination of the packet. These addresses may be on the same link or remote. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 167 Data Access Layer 3 Logical Address (Cont.) An IP address contains two parts: Network portion (IPv4) or Prefix (IPv6) The left-most part of the address indicates the network group which the IP address is a member. Each LAN or WAN will have the same network portion. Host portion (IPv4) or Interface ID (IPv6) The remaining part of the address identifies a specific device within the group. This portion is unique for each device on the network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 168 Data Access Devices on the Same Network When devices are on the same network the source and destination will have the same number in network portion of the address. PC1 – 192.168.1.110 FTP Server – 192.168.1.9 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 169 Data Access Role of the Data Link Layer Addresses: Same IP Network When devices are on the same Ethernet network the data link frame will use the actual MAC address of the destination NIC. MAC addresses are physically embedded into the Ethernet NIC and are local addressing. The Source MAC address will be that of the originator on the link. The Destination MAC address will always be on the same link as the source, even if the ultimate destination is remote. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 170 Data Access Devices on a Remote Network What happens when the actual (ultimate) destination is not on the same LAN and is remote? What happens when PC1 tries to reach the Web Server? Does this impact the network and data link layers? © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 171 Data Access Role of the Network Layer Addresses When the source and destination have a different network portion, this means they are on different networks. PC1 – 192.168.1 Web Server – 172.16.1 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 172 Data Access Role of the Data Link Layer Addresses: Different IP Networks When the final destination is remote, Layer 3 will provide Layer 2 with the local default gateway IP address, also known as the router address. The default gateway (DGW) is the router interface IP address that is part of this LAN and will be the “door” or “gateway” to all other remote locations. All devices on the LAN must be told about this address or their traffic will be confined to the LAN only. Once Layer 2 on PC1 forwards to the default gateway (Router), the router then can start the routing process of getting the information to actual destination. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 173 Data Access Role of the Data Link Layer Addresses: Different IP Networks (Cont.) The data link addressing is local addressing so it will have a source and destination for each link. The MAC addressing for the first segment is : Source – AA-AA-AA-AA-AA-AA (PC1) Sends the frame. Destination – 11-11-11-11-11-11 (R1- Default Gateway MAC) Receives the frame. Note: While the L2 local addressing will change from link to link or hop to hop, the L3 addressing remains the same. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 174 Data Access Data Link Addresses Since data link addressing is local addressing, it will have a source and destination for each segment or hop of the journey to the destination. The MAC addressing for the first segment is: Source – (PC1 NIC) sends frame Destination – (First Router- DGW interface) receives frame © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 175 Data Access Data Link Addresses

Use Quizgecko on...
Browser
Browser