Network Basics

Download as pdf or txt
Download as pdf or txt
You are on page 1of 60

SOMNOG5 Network Infrastructure

Introduction to Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Networking Today
Networks in Our Past and Daily Lives

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Interconnecting Our Lives
Networking Impacts in Our Daily Lives
 Networks support the way we learn.
 Networks support the way we communicate.
 Networks support the way we work.
 Networks support the way we play.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
 Devices
 Media
 Services

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).

Other types of networks include:


 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
 The Local Area Networks (LANs)
A network serving a home, building or campus
is considered a Local Area Network (LAN
 LANs separated by geographic distance are
connected by networks known as WAN

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Network Types
 Define the Internet
The internet is defined as a
global mesh of interconnected networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
LANs, WANs, and the Internet
Intranet and Extranet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Connecting to the Internet
Connecting Remote Users to the Internet

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Components of a Network
Network Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Copper Cabling
Copper Media

Unshielded Twisted Shielded Twisted


Pair (UTP) Cable Pair (STP) Cable

Coaxial Cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Copper Cabling
UTP Cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Copper Cabling
STP Cable
Braided or Foil Shield

Foil Shields

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Copper Cabling
Coaxial Cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Copper Cabling
Cooper Media Safety

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
UTP Cabling
UTP Cabling Standards

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
UTP Cabling
UTP Connectors

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
UTP Cabling
Types of UTP Cable

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
UTP Cabling
Testing UTP Cables
After installation, a UTP cable tester should be used to test for the following
parameters:
 Wire map
 Cable length
 Signal loss due to attenuation
 Crosstalk

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Fiber Optic Cabling
Properties of Fiber Optic Cabling
Fiber-optic cabling is now being used in four types of industry:
 Enterprise Networks
 Fiber-to-the-home (FTTH) and Access Networks
 Long-Haul Networks
 Submarine Networks

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Fiber Optic Cabling
Fiber Media Cable Design

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Fiber Optic Cabling
Types of Fiber Media

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Fiber Optic Cabling
Network Fiber Connectors

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Fiber Optic Cabling
Testing Fiber Cables

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Fiber Optic Cabling
Fiber versus Copper
Implementation Issues Copper Media Fibre Optic

Bandwidth Supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps

Relatively short Relatively High


Distance (1 – 100 meters) (1 – 100,000 meters)

High
Immunity To EMI And RFI Low
(Completely immune)

High
Immunity To Electrical Hazards Low
(Completely immune)

Media And Connector Costs Lowest Highest

Installation Skills Required Lowest Highest

Safety Precautions Lowest Highest


Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Wireless Media
Properties of Wireless Media
Wireless does have some areas of concern including:
 Coverage area
 Interference
 Security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Wireless Media
Types of Wireless Media
• IEEE 802.11 standards
• Commonly referred to as Wi-Fi.
• Uses CSMA/CA
• Variations include:
• 802.11a: 54 Mbps, 5 GHz
• 802.11b: 11 Mbps, 2.4 GHz
• 802.11g: 54 Mbps, 2.4 GHz
• 802.11n: 600 Mbps, 2.4 and 5 GHz
• 802.11ac: 1 Gbps, 5 GHz
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz

• IEEE 802.15 standard


• Supports speeds up to 3 Mb/s
• Provides device pairing over distances from 1 to 100
meters.

• IEEE 802.16 standard


• Provides speeds up to 1 Gbps
• Uses a point-to-multipoint topology to provide
wireless broadband access.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Components of a Network
Network Representations

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Components of a Network
Topology Diagrams

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Network Protocols and Communications

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Function of Protocol in Network Communication

A protocol is a set of predetermined rules


All communication, whether face-to-face or
over a network, is governed by predetermined
rules called protocols.
These protocols are specific to the
characteristics of the conversation.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
The Rules
What is Communication?

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Function of Protocol in Network
Communication

 Describe Protocol suites and industry


standards

A standard is
a process or protocol that has been endorsed by
the networking industry and ratified by a
standards organization, such as the Institute of Electrical
and Electronics Engineers (IEEE) or the Internet Engineering Task
Force (IETF).

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Protocols
Network Protocols
 How the message is formatted or structured
 The process by which networking devices share information about
pathways with other networks
 How and when error and system messages are passed between devices
 The setup and termination of data transfer sessions

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Protocols
Interaction of Protocols
 Application Protocol – Hypertext Transfer Protocol (HTTP)
 Transport Protocol – Transmission Control Protocol (TCP)
 Internet Protocol – Internet Protocol (IP)
 Network Access Protocols – Data link & physical layers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Protocol Suites
Protocol Suites and Industry Standards

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Protocol Suites
TCP/IP Protocol Suite and Communication

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Standards Organizations
Open Standards
 The Internet Society (ISOC)
 The Internet Architecture Board (IAB)
 The Internet Engineering Task Force (IETF)
 Institute of Electrical and Electronics Engineers (IEEE)
 The International Organization for Standards (ISO)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Standards Organizations
ISOC, IAB, and IETF

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Standards Organizations
ISO

OSI Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Standards Organizations
Other Standards Organization
 The Electronic Industries Alliance (EIA)
 The Telecommunications Industry Association (TIA)
 The International Telecommunications Union – Telecommunications
Standardization Sector (ITU-T)
 The Internet Corporation for Assigned Names and Numbers (ICANN)
 The Internet Assigned Numbers Authority (IANA)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Reference Models
Benefits of Using a Layered Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Reference Models
The OSI Reference Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Reference Models
The TCP/IP Reference Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Reference Models
Comparing the OSI and TCP/IP Models

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Layers with TCP/IP and OSI Model
 Explain protocol data units (PDU) and
encapsulation
 As application data is passed down the protocol stack on its way to be transmitted
across the network media, various protocols add information to it at each level.
This is commonly known as the encapsulation process.
 The form that a piece of data takes at any layer is called a Protocol Data Unit
(PDU). During encapsulation, each succeeding layer encapsulates the PDU that it
receives from the layer above in accordance with the protocol being used.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
The Application Layer
 The Application layer provides the interface to the network.
 The application layer prepares human communication to be
transmitted over the data network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
The Presentation Layer
The Presentation layer has three primary functions:
 Coding and conversion of Application layer data to ensure that data from the source device can
be interpreted by the appropriate application on the destination device.
 Compression of the data in a manner that can be decompressed by the destination device.
 Encryption of the data for transmission and the decryption of data upon receipt by the
destination.
The Session Layer
 As the name of the Session layer implies, functions at this layer create and maintain dialogs
between source and destination applications.
 The Session layer handles the exchange of information to initiate dialogs, keep them active, and
to restart sessions that are disrupted or idle for a long period of time.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
The Transport Layer:
 The transport layer prepares the application
data for transport over the network and
process the network data for use by
application.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
The Role of Transport Layer

The Transport layer provides for the segmentation of data and


the control necessary to reassemble these pieces into the
various communication streams. Its primary responsibilities to
accomplish this are:
 Tracking the individual communication between applications
on the source and destination hosts
 Segmenting data and managing each piece
 Reassembling the segments into streams of application data
 Identifying the different applications

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Network Layer Protocols and Internet Protocol (IP)
The basic role of the Network Layer in data networks
 The Network layer encapsulation allows its contents to be passed
to the destination within a network or on another network with
minimum overhead.

To accomplish
this end-to-end
transport,
Layer 3 uses
four basic
processes:
• Addressing
• Encapsulation
• Routing
• Decapsulation

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
The Data Link Layer
 The data link layer provides a means for exchanging data
over a common local media.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Data Link Layer – Accessing the Media
why Data Link layer protocols are required
to control media access?

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Data Link Layer – Accessing the Media
 Describe the role the Data Link layer plays in linking the software and hardware
layers
 The Data Link layer exists as a connecting layer between the software processes
of the layers above it and the Physical layer below it. As such, it prepares the
Network layer packets for transmission across some form of media, be it copper,
fiber, or the atmosphere.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Data Link Sublayers

 To support a wide variety of network functions, the Data Link


layer is often divided into two sublayers: an upper sublayer
and an lower sublayer.
 The upper sublayer defines the software processes that
provide services to the Network layer protocols.
 The lower sublayer defines the media access processes
performed by the hardware.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
The two common LAN sublayers are:
 Logical Link Control
 Logical Link Control (LLC) places information in the frame that identifies which Network layer protocol is being used for the
frame. This information allows multiple Layer 3 protocols, such as IP and IPX, to utilize the same network interface and
media.
 Media Access Control
 Media Access Control (MAC) provides Data Link layer addressing and delimiting of data according to the physical signaling
requirements of the medium and the type of Data Link layer protocol in use.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Purpose of the Data Link Layer
Data Link Sublayers
Network

LLC Sublayer

Data Link

MAC Sublayer

Bluetooth
Ethernet

802.15
802.11
Wi-Fi
802.3
Physical

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Physical Layer Protocols & Services
Purpose of the Physical Layer
 The role of the OSI physical layer is to encode the binary digits that represent data
link layer frames into signals and to transmit and receive these signals across the
physical media—copper wires, optical fiber, and wireless—that connect network
devices.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Purpose of Physical Layer
To prepare a data-link frame for the journey across the medium, the physical layer
encodes the logical frame with patterns of data that will make it recognizable to the device
that will pick it up on the other end of the medium. The device can be a router that will
forward the frame or the destination device.
The delivery of frames across the local media requires the following physical layer
elements:
■ The physical media and associated connectors
■ A representation of bits on the media
■ Encoding of data and control information
■ Transmitter and receiver circuitry on the network devices
After the signals traverse the medium, they are decoded to their original bit representations
of data and given to the data link layer as a complete frame.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60

You might also like