Computer Network - CCNA Basics - Beginner - S Guide
Computer Network - CCNA Basics - Beginner - S Guide
Computer Network - CCNA Basics - Beginner - S Guide
Networking Basics
Table of Contents:
Chapter 1: Introduction to Networking
Chapter 2: Networking Fundamentals
Chapter 3: Networking Media
Chapter 4: Cable Testing
Chapter 5: Cabling LAN’s & WAN’s
Chapter 6: Ethernet Fundamentals
Chapter 7: Ethernet Technologies
Chapter 8: Ethernet Switching
Chapter 9: TCP and IP addressing
Chapter 10: Routing Fundamentals Subnets
CHAPTER 1
INTRODUCTIO TO
NETWORKING
OBJECTIVES:
Network physical connection
Basic computer components
Network math and IP address concept
Connecting to the Internet
Requirements for Internet Connection
Connection to the Internet can be broken down into the following:
– Physical connection:
used to transfer signals between PCs within the local network and to
remote devices on the Internet
– Logical connection:
uses standards called protocols. A protocol is a formal description of a
set of rules and conventions that govern how devices on a network
communicate.
– The application:
interprets the data and displays the information in an understandable
form.
Information flow
Case Study: Boot process
Network Interface Cards
A network interface card (NIC) is a printed circuit board that provides
network communication capabilities to and from a personal computer
Computers
have to translate in order to use decimal numbering.
Number Systems
Knowing what base someone refers to
– Decimal uses 10 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.
– Binary uses 2 digits: 0 and 1.
Base conventions
– 101 in base 2 is spoken as one zero one.
Working with exponents
– 103 = 10 X 10 X 10 = 1000
– 24 = 2 x 2 x 2 x 2 = 16
Binary numbers
– Use principle of place value just as decimal numbers do
ASCII
The American Standard Code for Information Interchange (ASCII) is the
most commonly used code for representing alpha-numeric data in a
computer.
Bits and Bytes
Bits are binary digits. They are either 0s or 1s. In a computer, they are
represented by On/Off switches or the presence or absence of electrical
charges, light pulses, or radio waves.
Base 10 Numbers
Base 2 (Binary) Numbers
Converting Decimal to Binary
Hexadecimal
The base 16, or hexadecimal (hex), number system is used frequently when
working with computers, because it can be used to represent binary numbers
in a more readable form.
Converting Binary to Hexadecimal
There are
2 type of devices: end-user devices and network devices.
Network Devices
Each host sends its data to all other hosts onthe network medium.
First-come, first-serve.
Eg: Ethernet
Logical Topology: Token Passing
Functions of Protocols
Protocols control all aspects of data communication, which include the
following:
– How the physical network is built
– How computers connect to the network
– How the data is formatted for transmission
– How that data is sent
– How to deal with errors
LANs
Operate within a limited geographic area
Allow many users to access high-bandwidth media
Provide full-time connectivity to local services
Connect physically adjacent devices
LAN Devices and Technology
Address
– Source address, Destination address
Media
– Cable, Fiber, Atmosphere
Protocol
– Format
– Procedure
Evolution of networking standards
OSI Model
The OSI model: a framework within which networking standards can be
developed. – It provided vendors with a set of standards that ensured greater
compatibility and interoperability between the various types of network
technologies that were produced by the many companies around the world.
The lower
layers use encapsulation to put the protocol data unit (PDU) from the upper
layer into its data field and to add headers and trailers that the layer can use to
perform its function.
De-Encapsulation
When the data link layer receives the frame, it does the following:
– It reads the physical address and other control
information provided by the directly connected peer data link
layer.
– It strips the control information from the frame, thereby
creating datagram.
– It passes the datagram up to the next layer, following
the instructions that appeared in the control portion of the frame.
Encapsulation
example: E-mail
Layer-to-layer
communications
TCP/IP model development
The late-60s The Defense Advance Research Projects Agency
(DARPA) originally developed Transmission Control Protocol/Internet
Protocol (TCP/IP) to interconnect various defense department computer
networks.
The Internet, an International Wide Area Network, uses TCP/IP to
connect networks across the world.
The TCP/IP
Reference Model
TCP/IP Protocol Stack
OSI Model and
TCP/IP Model
Focus of
the CCNA Curriculum
Summary
Networking devices
Some of the common network types
Intranet and extranet
Bandwidth and throughput
The layered communication model
OSI reference model
TCP/IP networking model
Chapter 3
Networking Media
Objectives
Copper media and electronic signal
Optical media and light signal
Wireless media and wave
Copper Media
Electricity Basics
The basic unit of all matter is an atom.
– Protons – particles that have positive charge
– Neutrons – particles that have no charge (neutral)
– Electrons – particles that have negative charge and
orbit the nucleus
Static electricity
Electrons have been loosened from the atom and stay in one place,
without moving. • Electrostatic discharge (ESD).
– ESD, though usually harmless to people, can create serious problems for
sensitive electronic equipment.
Measuring electricity: Current
The flow of charges that is created when electrons move.
Symbol: I.
Ampere (A).
Electrical definitions: AC and DC
Alternating Current (AC):
– Electrical current flows in both directions; positive and
negative terminals continuously trade places (polarity).
Direct Current (DC):
– Electrical current flows in one direction; negative to
positive.
Measuring electricity: Resistance
Protection from all types of external interference, include EMI and RFI.
– Cancellation: twisting of wires.
– Shielding.
Moderately expensive, quite difficult to install.
Speed of transmission:10Mpbs-1Gbps
Maximum cable length 100m.
Screened Twisted-Pair Cable
Cancellation
Unshielded Twisted-Pair Cable
Electromagnetic Energy
– Radio
– Microwaves
– Radar
– Visible light
– X-rays
– Gamma rays
If all the types of electromagnetic waves are arranged in order from the
longest wavelength down to the shortest wavelength, a continuum
called the electromagnetic spectrum is created.
Reflection and refraction of light
Total Internal Reflection
A light ray that is being turned on and off to send data (1s and 0s) into
an optical fiber must stay inside the fiber until it reaches the far end.
Laws of Total Reflection
The following two conditions must be met for the light rays in a fiber to
be reflected back into the fiber with out any loss due to refraction:
– The core of the optical fiber has to have a larger index
of refraction than the material that surrounds it (the cladding).
– The angle of incidence of the light ray is greater than
the critical angle for the core and its cladding.
Single-Mode
Fiber and Multimode Fiber
Other Optical Components
The type of connector most commonly used with multimode fiber is the
Subscriber Connector (SC connector). On single-mode fiber, the
Straight Tip (ST) connector is frequently used.
Advantages of optical signal
Fiber-optic cable is not affected by the sources of external noise like
EMI
Transmission of light on one fiber in a cable does not generate
interference that disturbs transmission on any other fiber
High speed, high security and long cable length
Signals and Noise in Optical Fibers
The farther a light signal travels through a fiber, the more the signal
loses strength. This attenuation is due to several factors involving the
nature of fiber itself.
– Scattering of light in a fiber is caused by microscopic
non-uniformity (distortions) in the fiber that reflects and scatters
some of the light energy.
– Absorption makes the light signal a little dimmer.
– Another factor that causes attenuation of the light
signal is manufacturing irregularities or roughness in the core-to-
cladding boundary.
Installation of Optical
Fiber
If the fiber is stretched or curved too tightly, it can cause tiny cracks in
the core that will scatter the light rays.
Bending the fiber in too tight a curve can change the incident angle of
light rays striking the core-tocladding boundary.
When the fiber has been pulled, the ends of the fiber must be cleaved
(cut) and properly polished to ensure that the ends are smooth.
Testing of Optical Fiber
When a fiber-optic link is being planned, the amount of signal power
loss that can be tolerated must be calculated. This is referred to as the
optical link loss budget.
Two of the most important testing instruments are Optical Loss Meters
and Optical Time Domain Reflectometers (OTDRs).
Wireless Media
IEEE 802 Committees
802.0 SEC
802.1 High Level Interface (HILI)
802.2 Logical Link Control (LLC)
802.3 CSMA/CD Working Group
802.4 Token Bus
802.5 Token Ring
802.6 Metropolitan Area Network (MAN)
802.7 BroadBand Technical Adv. Group (BBTAG)
802.8 Fiber Optics Technical Adv. Group (FOTAG)
802.9 Integrated Services LAN (ISLAN)
802.10 Standard for Interoperable LAN Security
(SILS)
801.11 Wireless LAN (WLAN)
802.12 Demand Priority
802.14 Cable-TV Based Broadband Communication
Network
802.15 Wireless Personal Area Network (WPAN)
802.16 Broadband Wireless Access (BBWA)
RPRSG Resilient Packet Ring Study Group (RPRSG)
IEEE 802.11
IEEE 802.11a
IEEE 802.11b WiFi
IEEE 802.11g
IEEE 802.15.1 Bluetooth
IEEE 802.11e
IEEE 802.11f
IEEE 802.11h
IEEE 802.11i Security 2004
IEEE 802.15 TG2
IEEE 802.15 TG3
IEEE 802.15 TG4
WLAN Organizations and Standards
Wireless Devices and Topologies
A wireless network may consist of as few as two devices.
Devices in WLAN are peers
An access point (AP) is commonly installed to act as a central hub for
the WLAN
How WLANs Communicate
After establishing connectivity to the WLAN, a node will pass frames
similarly to any other 802 network.
Radio frequency
interference (RFI), which is noise from other signals being transmitted
nearby
Electromagnetic interference (EMI), which is noise from nearby
sources such as motors and lights
Laser noise at the transmitter or receiver of an optical signal
Narrowband Interference and white
noise
Noise that affects all transmission frequencies equally is called white
noise.
5.4.3.2.1 Rule
5 sections of the network.
4 repeaters or hubs.
3 sections for hosts.
2 sections for link purposes.
1 large collision domain.
This rule states that no more than four repeaters can be used between
hosts on a LAN.
This rule is used to limit latency added to frame travel by each repeater.
Too much latency on the LAN increases the number of late collisions
and makes the LAN less efficient.
Hubs: Layer 1
Multiport repeater
The physical topology for using a hub star.
Sometimes called concentrator
There are 3 types of hub: active, passive and intelligent
Every device
connected to the same network segment is said to be a member of a
collision domain.
Network Segmentation
When the number of network node is big, reducing network
performance, it is necessary to break up a large LAN into smaller, more
easily managed segments.
Bridge Functions
Switches and bridges operate at the Data Link layer of the OSI model.
The function of the bridge is to make intelligent decisions about
whether or not to pass signals on to the next segment of a network.
Bridge Functions
They makes these decisions based upon the layer 2 physical address
(MAC).
A switch therefore has two main functions:
– switch data frames
– build and maintain tables
LAN Switch
Switches operate at much higher speeds than bridges and can support
new functionality, such as virtual LANs.
– Connect the
phone cable to the ADSL port on the router.
– Connect the other end of the phone cable to the phone
jack.
DSL works over standard telephone lines using pins 3 and 4 on a
standard RJ-11 connector.
Routers and Cable Connections
The Cisco uBR905 cable access router provides highspeed network
access on the cable television system to residential and small office,
home office (SOHO) subscribers.
Setting Up Console Connections
The console port allows monitoring and configuration of a Cisco hub,
switch, or router.
The AUX port allows remote monitoring and configuration of devices
over modem connection.
To set up a connection between the terminal and the Cisco console port,
perform two steps.
– Connect the devices using a rollover cable from the
console port, on the router, to the serial port, on the terminal
(workstation).
–
Naming.
Framing.
Media access control rules
MAC address
MAC addresses are burned into read-only memory (ROM) and are
copied into random-access memory (RAM) when the NIC initializes.
Presentation formats: 0000.0c12.3456 or 00-00-0c-12-34-56.
Broadcast address: FFFF.FFFF.FFFF
Layer 2 Framing
Framing helps obtain essential information that could not, otherwise, be
obtained with coded bit streams alone. Examples of such information
are:
– Which computers are communicating with one
another?
– When communication between individual computers
begins and when it terminates
– Provides a method for detection of errors that occurred
during the communication
–
Whose turn it is to "talk" in a computer "conversation“
Generic Frame Format
At the data link layer the frame structure is nearly identical for all
speeds of Ethernet from 10 Mbps to 10,000 Mbps.
Ethernet requires that the frame be not less than 46 octets or more than
1518 octets
IEEE
802.3 Ethernet
Ethernet II
Ethernet Operation
Media Access Control (MAC)
MAC refers to protocols that determine which computer on a shared-
medium environment, or collision domain, is allowed to transmit the
data.
There are two broad categories of Media Access Control, deterministic
(taking turns) and non-deterministic (first come, first served).
Media Access Control (MAC) Protocols
Ethernet (IEEE 802.3)
– Logical bus topology
– Physical star or extended star
– Nondeterministic
First-come, first-served
Token Ring (IEEE 802.5)
– Logical ring
– Physical star
topology
– Deterministic
Token controls traffic
– Older declining technology
FDDI (IEEE 802.5)
– Logical ring topology
– Physical dual-ring topology
– Deterministic
Token controls traffic
– Near-end-of-life technology
CSMA/CD Process
Ethernet Transmission Mode
Full duplex :
– send and receive simultaneously
– no collisions occur.
Half duplex:
– only send or receive at a specific moment
– transmit 64 bits of timing synchronization information
that is known as the preamble to make sure collision do not
occur.
Ethernet Timing
For CSMA/CD Ethernet to operate, collision must be sensed before
completing transmission of a minimum-sized frame.
At 100 Mbps the system timing is barely able to accommodate 100
meter cables. For this reason half duplex is not permitted in 10-Gigabit
Ethernet.
Slot time
Ethernet standard specifications limit
– maximum segment
length
– maximum number of stations per segment
– maximum number of repeaters between segments
Slot time >= round trip delay
Interframe Spacing
The minimum time space between two non-colliding frames is also
called the interframe spacing.
After a frame has been sent, all stations on a 10-Mbps Ethernet are
required to wait a minimum of 96 bit-times (9.6 microseconds) before
any station may legally transmit the next frame.
Error Handling
Collisions are to resole contention for network access which results in
network bandwidth loss.
When collision occurs, the devices with data to transmit return to a
listen-before-transmit mode and no device have priority to transmit
data.
Types of Collisions
The 5-
4-3-2-1 rule also provides guidelines to keep roundtrip delay time in a
shared network within acceptable limits.
Segmenting a collision domain with bridge
Segmentation increases the opportunity for each host in the network to
gain access to the media.
This
effectively reduces the chance of collisions and increases available
bandwidth for every host.
Broadcasts
in Bridged Environment
Private networks can use private address to assign their machines in the
local network.
RFC 1918 sets aside three blocks of IP addresses for private, internal
use.
– Class A: 10.0.0.0
– Class B: 172.16.0.0 ?? 172.31.0.0
– Class C: 192.168.0.0 ?? 192.168.255.0
Connecting a network using private addresses to the Internet requires
translation (overloading) of the private addresses to public addresses.
This translation is served by NAT
Valid address?
150.100.255.255
175.100.255.18
195.234.253.0
100.0.0.23
188.258.221.176
127.34.25.189
224.156.217.73
IPv4 versus IPv6
Introduced by IETF in 1992, IPv6, known as IPng, uses 128 bits rather
than the 32 bits currently used in IPv4.
IPv6 uses hexadecimal numbers to represent the 128 bits.
Successor to BOOTP.
Automatically allows a host to obtain an IP address from an IP pool
Use 4-steps IP registration and requires IP leased time
DHCP Initialization Sequence
Broadcast request and discover DHCP server
Offer IP address, DHCP server address and Default Gateway address…
Request for the offered IP statistics
Acknownledge the request, confirm registration
Encapsulation
Address Resolution Protocol
In order for devices to communicate, the sending devices need both the
IP addresses and the MAC addresses of the destination devices.
ARP enables a computer to find the MAC address of the computer that
is associated with an IP address.
Address resolution protocol
ARP table in host
ARP operation
ARP operation: ARP request
ARP operation: Checking
ARP operation: ARP reply
ARP operation: Caching
ARP: Local Destination
Internetwork communication
How to communicate with devices that are not on the same physical
network segment.
Default
gateway
IP does not verify that the data reached its destination. This function is
handled by the upper layer protocols.
Packet Propagation
Process in Router
IP header format
IP header format:
Version
IP header format: Header length
IP header format:
Service type
IP header format: Total length
IP header format: Identification
IP header format: Flags
IP header format: Fragment offset
IP header format:
Time to Live
IP header format:
Protocol
IP header format: Header checksum
IP header format: Addresses
IP header format: Options
IP header format: Padding
IP header format: Padding
IP Routing Protocol
Routing Overview
Routing is an OSI Layer 3 function.
Routing is the process of finding the most efficient path from one
device to another.
Two key functions of router:
– maintain routing tables
–
use
the routing table to forward packets
Layer 2 Switching and Layer 3 Routing
Routing vs. Switching
Routing Protocol
Routing protocols
allow routers to choose the best path for data from source to
destination. A routing protocol functions includes the following:
– Provides processes for sharing route information
– Allows routers to communicate with other routers to
update and maintain the routing tables
Eg:RIP, IGRP, OSPF, EIGRP, BGP
Routed vs. Routing protocol
Path Determination
Path determination enables a router to compare the destination address
to the available routes in its routing table, and to select the best path.
The router uses path determination to decide which port an incoming
packet should be sent out of to travel on to its destination.
Routing Tables
Routing tables contain the information of a route to forward data
packets across connected networks :
– Protocol type
– Destination/next-hop associations
– Route metric and routing protocol reliability
– Outbound interfaces
Routing Algorithms
Routing protocols often have one or more of the following design
goals:
– Optimization
– Simplicity and low overhead
– Robustness and stability
– Flexibility
– Rapid convergence
Routing Metrics
Metrics can be based on a single characteristic of a path, or can be
calculated based on several characteristics. The following are the
metrics that are most commonly used by routing protocols:
– Bandwidth: The data capacity of a link
– Delay: The length of time required to move a packet
along each link
– Load: The amount of activity on a network resource
– Reliability: Usually a reference to the error rate
– Hop count: The number of routers that a packet must
travel through before reaching its destination
– Ticks: delay on a data link using IBM PC clock ticks.
One tick is approximately 1/18 second.
– Cost: An arbitrary value, usually based on bandwidth,
monetary expense, or other measurement, that is assigned by a
network administrator.
IGP and EGP
An autonomous system is a network or set of networks under common
administrative control.
Two families of routing protocols are:
– Interior Gateway Protocols(IGPs): exchange routes
within an autonomous system. Eg: RIP, IGRP, OSPF, IS-IS…
–