1 / 26

IACC Professional Course Series

IACC Professional Course Series. Network Certification Preparation. Module - 1. Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing and subnetting MAC addressing. Todays’s networks. Service Provider

fadey
Download Presentation

IACC Professional Course Series

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IACC Professional Course Series Network Certification Preparation

  2. Module - 1 • Communication methods • OSI reference model and layered communication • TCP/IP model • TCP and UDP • IP addressing and subnetting • MAC addressing

  3. Todays’s networks • Service Provider Job to connect all these different networks together Design and other rules are different and more intense Mission critical more than any other networks More complex and more issues • Enterprise There are hundreds and thousands of users Policies in place Speed and efficiency is important Need connectivity to remote sites or home users • Residential Small Local area networks Evolving networks i.e. wireless, fiber, fax machines etc

  4. OSI Model and Layered approach • Why we need layered approach • OSI Model Seven layers of OSI model • TCP/IP Model Four layers in TCP/IP model

  5. TCP/IP Model

  6. TCP/IP Model - continued

  7. TCP/IP Model - continued

  8. OSI Model

  9. OSI Model - Layered communication

  10. OSI Model – layer communication

  11. TCP • TCP - Transmission Control Protocol • Most commonly used protocol on the Internet. • Reliable - It is connection oriented hence guaranteed delivery • TCP uses flow control which determines when data needs to be re-sent, and stops the flow of data until previous packets are successfully transferred. • This works because if a packet of data is sent, a collision may occur. When this happens, the client re-requests the packet from the server until the whole packet is complete and is identical to its original, hence it is slow protocol. • Ordered Delivery • Offers error correction • Examples: World Wide Web (Apache TCP port 80), e-mail (SMTP TCP port 25), File Transfer Protocol (FTP port 21) and Secure Shell (OpenSSH port 22) etc.

  12. TCP – 3 way handshake • Host A sends a TCP SYNchronize packet to Host B • Host B receives A's SYN • Host B sends a SYNchronize-ACKnowledgement • Host A receives B's SYN-ACK • Host A sendsACKnowledge • Host B receives ACK. TCP socket connection is ESTABLISHED. • TCP Three Way Handshake(SYN,SYN-ACK,ACK) SYNchronize and ACKnowledge messages are indicated by a bit inside the header of the TCP segment.

  13. TCP – 3 way handshake

  14. UDP • UDP - User Datagram Protocol – connectionless protocol • UDP is never used to send important data such as webpages, database information, etc; • UDP is commonly used for streaming audio and video, because it offers speed! • The reason UDP is faster than TCP is because there is no form of flow control or error correction. The data sent over the Internet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality. • Not reliable • Not ordered delivery • Example :Domain Name System (DNS UDP port 53), streaming media applications such as IPTV or movies, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP) and online multiplayer games etc

  15. TCP Frame

  16. UDP Frame

  17. MAC Address • A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. • MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model. • MAC addresses assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware. • MAC address also referred to as the burned-in address, Ethernet hardware address (EHA), hardware address or physical address. • 6 bytes of address. 3 bytes are for Manufacturer identifier and 3 bytes are NIC specific.

  18. IP addressing • IP address is a unique identifier which distinguishes a node from other in a network. • An IPv4 address is 4 bytes/32 bites long • IP address has a format of a.b.c.d, where a,b,c,d are octets in binary. • Each ip address has two portions, network and host • Different classes of IP address schemes. • Class A, Class B, Class C, Class D, and Class E

  19. IP addressing Class A • Binary address start with 0 i.e. most significant bit of first byte is always 0. • Hence the decimal number can be anywhere from 1 to 126. • The first 8 bits (the first octet) identify the network and the remaining 24 bits indicate the host within the network. • An example of a Class A IP address is 102.168.212.226, where "102" identifies the network and "168.212.226" identifies the host on that network.

  20. IP addressing Class B • Binary addresses start with 10 i.e. two most significant bits of first bytes are always 10. • Hence the decimal number can be anywhere from 128 to 191. (The number 127 is reserved for local machine and loopback interfaces). • The first 16 bits (the first two octets) identify the network and the remaining 16 bits indicate the host within the network. • An example of a Class B IP address is 168.212.226.204 where "168.212" identifies the network and "226.204" identifies the host on that network.

  21. IP addressing Class C • Binary addresses start with 110 i.e. three most significant bits of first octet is always 110. • Hence the decimal number can be anywhere from 192 to 223. • The first 24 bits (the first three octets) identify the network and the remaining 8 bits indicate the host within the network. • An example of a Class C IP address is 200.168.212.226 where "200.168.212" identifies the network and "226" identifies the host on that network.

  22. IP addressing Class D • Binary addresses start with 1110 i.e. four most significant bits are always 1110. • Hence the decimal number can be anywhere from 224 to 239. • Class D networks are used to support multicasting. Local Subnet: • Addresses in the range 224.0.0.0 to 224.0.0.255 are individually assigned by IANA and designated for multicasting on the local subnetwork only. • Routing Information Protocol (RIPv2) uses 224.0.0.9, Open Shortest Path First (OSPF) uses 224.0.0.5 & 224.0.0.6, etc. • Routers must not forward these messages outside the subnet in which the originate.

  23. IP addressing Internetwork control block • Addresses in the range 224.0.0.1 to 224.0.1.255 are individually assigned by IANA and designated the Internetwork Control Block. • It is used for traffic that must be routed through the public Internet, such as for applications of the Network Time Protocol (224.0.1.1). AD-HOC block • Addresses in the ranges 224.0.2.0 to 224.0.255.255, 224.3.0.0 to 224.4.255.255 and 233.252.0.0 to 233.255.255.255 are individually assigned by IANA and designated the AD-HOC block. • These addresses are globally routed and are used for applications that don't fit either of the previously described purposes.

  24. BACKUP SLIDES

  25. Access methods • An access method is a set of rules on how the network nodes share the transmission media. • Rule could be Either first come first served or take turns • Contention methods CSMA/CD (Carrier Sense Multiple Access with Collision Detection) CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) • Token Passing • Demand Priority

  26. Access methods • Contention Methods: IEEE 802.3 Ethernet LAN useCSMA/CD method. WLAN uses CSMA/CA protocol and have mechanism of explicit packet acknowledgment. • Token Ring : Uses a token-passing method. • Demand Priority : 100VG-AnyLAN uses this method. Networks are connected to hubs and hubs are connected to other hubs. Contention occurs at hub level. • Demand Priority provides mechanism for prioritizing data types. If contention happens, data with highest priority takes precedence.

More Related