itp125 - lesson 03

Download Report

Transcript itp125 - lesson 03

Chi So



Network – a set of devices, software, and
cables that enables the exchange of
information between them
Host Device – anything a person uses to
access the network
Network Device – hubs, repeaters, bridges,
switches, routes, and firewalls

Point-to-Point – involves two hosts or
devices that are directly connected to each
other and to nothing else.
 i.e. Serial Communication (not always)

Star – one host or device has multiple
connections to other hosts. Sometimes called
hub-and-spoke.
 Anything that sends traffic through the hub or
central device

Ring – when one device is connected to the
next one sequentially. The last device is
connected to the first.
 Not always a true circle
 Data moves in a logical circle
 i.e. FDDI and Token Ring

Bus – a single coaxial cable where hosts are
attached at intervals.
 i.e. cable internet

Mesh – multiple point-to-point connections
that connect each location to the others
 Full Mesh – all devices are interconnected
 Partial Mesh – some devices are interconnected



Ethernet is the most common LAN (Local
Area Network) technology
IEEE 802.3
Developed by Digital Equipment Corp., Intel,
and Xerox. Published in 1980


Segment – A coaxial cable that joins all the
hosts together
Collision – when two hosts try to use the
connection at the same time

Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) – method for Ethernet
to detect collusions.
 Listen to the line
▪ If clear, start transmission
▪ If used, wait until clear
 If collision occurs
▪ send jam signal
▪ Stop transmission
▪ Wait a random time before sending again (all hosts)

Collision domain – a group of devices that
are affected by one another’s collusions
 The more hosts in a domain, the more frequent
the collision
 Bridges and switches help resolve this issue


Half Duplex – Send or receive
Full Duplex – Send and Receive
 8 wires needed. 4 is possible

Wide Area Network (WAN)
 Interconnect two or more LANs
 Usually this service is bought from another
company
 4 types of WAN technologies
▪
▪
▪
▪
Dedicated Lease Line
Circuit-Switched Connections
Packet-Switched Connections
Cell-Switched Connections

Dedicated Leased Line
 A connection that is installed and provisioned for the





exclusive use of the customer
No other customer can affect the line
Very expensive
A lot of control (QoS, other traffic management)
Usually point to point
Protocols used
▪ Point-to-Point Protocol (PPP)
▪ High-Level Data-Link Control Protcol (HDLC)
▪ Serial Line Internet Protocol (SLIP)

Circuit-Switched Connections
 Uses the phone company as a service provider
▪ Analog dial-up or digital ISDN connections
▪ Protocols used
▪ PPP
▪ HDLC
▪ SLIP
▪ Really slow, 19.2Kbit to 128Kbit

Packet-Switched Connections
 Connect to the providers network
 Traffic is affected by others
 Usual technologies are
▪ Frame Relay
▪ X.25 (possible)

Cell-Switched Connections
 Similar to packet switched
 Difference is the unit size of the data is fixed (cell)
▪ In packet switched networks, data units are called
(frames)
 Dealing with traffic loads are typically easier and
efficient
 Examples
▪ Asynchronous Transfer Mode (ATM)

IEEE 802.11
 Advantage: Great to eliminate cables and
freedom of movement
 Disadvantage: range (?), reliability, security
 Moderate WAN distances
▪ Line of sight

Metropolitan Area Network (MAN)
 Found in urban business centers

Storage Area Network (SAN)
 Access an external storage array as a hard drive
 Expensive

Content Networks
 Making access to the information faster
 Logging and controlling access to certain kinds of
materials

Open Systems Interconnection (OSI) model
 Used to standardized networking processes
 No rules imposed onto the manufacturers or
protocol developers
 Only guidelines
 7 Layers







7 - Application
6 - Presentation
5 - Session
4 - Transport
3 - Network
2 - Data Link
1 - Physical
Any application or utility that store, send or retrieve data
across a network
 Sometimes called the user interface layer
 Examples










Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol v3 (POP3)
Network Time Protocol (NTP)
Simple Network Management Protocol (SNMP)
Domain Name Systems (DNS)
Dynamic Host Configuration Protocol (DHCP)
Secure Shell (SSH)


Responsible for formatting data so that the
application layer (layer 7) can recognize and
work with it.
Examples
 .doc
 .jpg
 .txt
 .avi


Deals with initiating and terminating network
connections
Provides instructions to
 Connect
 Authenticate (optional)
 Disconnect


Movement of data is handled by lower layers
Examples
 Login for Telnet, SSH, SQL sessions, RPC


One of the most important layers
Deals with how two hosts are going to send
data. Two methods:
 Connection-oriented (TCP)
▪ Reliable
 Connectionless (UDP)
▪ Unreliable

Deals with logical address (usually IP address)
 Other possibilities
▪ IPX
▪ AppleTalk
▪ SNA


Addresses are assigned in software
IP hosts can communicate if they are on the
same network
 If different networks, need a router to communicate

Finding a way to communicate between two
networks is call path determination


With the data unit from Layer 4, the data
segment is now called a packet ( or
datagram)
Header has the following info:

Since using logical addressing
 Hierarchical
▪ Organized into a formal or ranked order
▪ Easy to build a big system
▪ Build smaller systems, and put them together
▪ Example:
▪ Mailing address

Protocols:
 Internet Protocol (IP)
 IPX (Novell Netware)
 Internet Connection Management Protocol
(ICMP)
 OSPF, IGRP, EIGRP, RIP, ISIS (Routing Protocols)
 Address Resolution Protocol (ARP), Reverse ARP
(RARP)


Takes the Layer 3 packet and preparing a
frame for the packet to be transmitted
Examples:
 Ethernet
 Frame Relay
 Point-to-Point (PPP)
 High-Level Data Link Control Protocol (HDLC)
 Cisco Discovery Protocol (CDP)

Not hierarchical
 Flat addressing


Address are done with Media Access Control
(MAC)
MAC addresses are assigned in hardware





Transmit the data onto a wire, optical fiber, or
wireless
All signaling is digital
Electricity On = 1
Electricity Off = 0
Typically RJ-45