1 / 19

Internetworking Basics

Internetworking Basics. How would you say the PC named Bob communicates with the PC named Sally?. Internetworking Basics. Switches can replace the hub, breaking up collision domains. Keep in mind that the hub used in the figure just extended the one collision domain from the switch port.

oren-knox
Download Presentation

Internetworking Basics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internetworking Basics How would you say the PC named Bob communicates with the PC named Sally?

  2. Internetworking Basics Switches can replace the hub, breaking up collision domains. Keep in mind that the hub used in the figure just extended the one collision domain from the switch port

  3. OSI : Open System Interconnection

  4. OSI : Open System Interconnection

  5. Physica Layer • - Physica Layer- Is the stage of physical or perceived to represent both a network card, modem, and Alkounktorz and cables used in a network are converted into electrical signals data and placed on the cables and thus each of the network card or modemAnd components that run in this class and the HUB and the cable Repeaters It is only an intermediary for the transfer of data and not fall any amendment to the data or the work of additionsThe data at this stage in the form of electrical impulses or Bits

  6. Data Link Layer • - Data Link LayerIt was divided into Logical Link Control (LLC)And are converted to the Bits Bytes and then transferred to Frames is determined by the type and size of the Frame by the Logical Network Topology and are intended to address the way devices do you use for example the Token ring or the star, for example, a common way the volume of the Frame is different here, as well as the type of protocol used is differentthe size of the Frame

  7. Data Link Layer • Media Access Control (MAC)Are established at this stage of the Mac Address of baccarat, a unique network and are not repeated in any device to the Frame and also to discuss how to develop data on the cable there are two ways, namely CSMA / CD or CSMA / CA, in short without going into details is the way they used to put on datacable secured for the development do not conflict with another device on the cable to your provider at the same time (can be explained in a separate issue)Some of the protocols that operate at this stage• LAN protocols: 802.2 (LLC), 802.3 (Ethernet), 802.5 (Token Ring), 802.11 (Wireless)• WAN protocols: HDLC, PPP, Frame Relay, ISDN, ATM

  8. Network Layer • Network LayerThe stage is the provision of the Logical Address is the IP and put it in the Packets or packet data and here is added the device's IP sender and the addressee of the other device is selected and also the path used to transfer data, a so-called Basel Routing Protocol in accordance with the user in the network between Routers • These are some of the protocols used at this stage• IP• IPX• AppleTalk• DECNE

  9. Transport Layer • Transport LayerAt this stage is to determine if the type of communication Reliable (connection-oriented) or unreliable (connectionless) communications and to clarify the difference between themReliable (connection-oriented), a communication that requires a reply from both parties if the data was transferred correctly and complete or not, which requires the acknowledgment of any receiver is the sender has received such and such data are they complete or not the sender is contained incomplete Data arrangedas well as the position as well as the future is contained if sent again and so on until the parties make sure that the data has arrived in full, safe and an example of this is the TCP / IP protocol

  10. Transport Layer • unreliable (connectionless) communications, a communication which does not require a response from both parties, which in case of transmission Maystkhaddm collective Some sites can be heard from the radio station or watch a movie Here, the server transmission is Broadcast and requirement toward the collective response from the recipients Imagine thousands of recipients at one time if theEvery one of them to communicate with the server and the request for restitution and data loose ends and causing a brunt on the server and this explains why you cut off the sound when listening to the radio through the Internet and the reason is the fall of some of the data in the road without your request to recover again

  11. Session Layer • Session LayerThis layer is responsible for maintaining the sessions or methods of communication open at the same time mean more to explain, for example you are working on Messenger and talking with a friend at the same time, the work of the Tackle Shop and also browse all at the same time, this class is responsible for maintaining the sessionOpen each application separately at the same time

  12. Presentation Layer • Presentation LayerThe stage is the identification of the type and nature of the data you are sending pictures or **** or compressed files or audio files and images are encrypted and whether or not a case in point• JPEG, BMP, TIFF, PICT• MPEG, WMV, AVI• ASCII, EBCDIC• MIDI, WAV

  13. Application Layer • Application LayerA stage of applications used and the way for the user with the device or the user interface, such as your browser or Messenger or program is doing Wires or any program you use and do interact with the network and is specified here as the protocol type and protocol, the program is running, such as• HTTP• Telnet• FTP• TFTP• SNMP

  14. An example of what happens daily from each of you and where the use of the OSI without feeling • Now imagine you are sitting in front of your computer and browser, using HTTP or Istamlalbrootokol program to upload files to the FTP site user or the user Birsaloimil the SNMP or Messenger, you are now at the stage of the Application LayerWill send data to a friend on Messenger and you put the compressed image for example is now obsolete and the Presentation Layer where data determine the type of sendingThe Session Layer is now working to keep the communication between you and your colleague at the same time when the Almtcefhandk or any other programNow entering the stage where the Transport Layer is selected Nuaalbrootokol user in this case it is the TCP / IP

  15. Are now entering the phase where the Network Layer is added to the IP of your device and also the private IP to your friend Alyaldata and identify the way forward for data to reach a friendThen enter Vymrahlp Data Link Layer is added where the Mac Address of your device and the Mac Address to the first Device you and continued to do and not Suech is then cut to data Frames Bhjmsgerdata is now a collection of the All Frames Frame contains your IP, IP of your friend and also the Mac Address of your Mac Address and the amount by which AcialbalsoichNow entering the stage of Physical Layer where Thoelhzh the Frames into electrical signals and put it on network cablesdata Ilyjhaz up a friend and do the OSI Layers in reverse to get their data

More Related