Download OSI layers

Document related concepts

AppleTalk wikipedia , lookup

Distributed firewall wikipedia , lookup

IEEE 1355 wikipedia , lookup

Zigbee wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

CAN bus wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Internet protocol suite wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
Ch.2 – Networking Fundamentals
Getting past some basics…
CIS 81 and CST 311
Cabrillo College and CSUMB
Rick Graziani
Fall 2005
Overview
Remember, we are just beginning to herd the cats.
Much of this will become clearer LATER!
The more we learn, the more all of this will come into focus!
Rick Graziani [email protected]
2
What is Networking?
Networking - the interconnection of workstations, peripherals, terminals
and other devices.
Whatis.com: “In information technology, networking is the construction,
design, and use of network, including the physical (cabling, hub,
bridge, switch, router, and so forth), the selection and use of
telecommunication protocol and computer software for using and
managing the network, and the establishment of operation policies and
procedures related to the network.”
Rick Graziani [email protected]
3
The Evolution of Data networks
•
Peer-to-peer: Enabling communications between two
computers, without relying on a computer server
(client/server).
• LANs (Local Area Networks): Enabling communications
between groups of computers and other devices within an
office, company, etc., including servers and printers.
• WANs (Wide Area Networks): Enabling communications
between individual computers, computers on different
etc.
Rick LANs,
Graziani [email protected]
4
Network Media Symbols
Becoming
obsolete
Usually a LAN
connection
The Serial connection symbol usually represents some
sort of WAN connection such as leased line (T1),
ISDN, Frame Relay, ATM, asynchronous dial-up
(modem), etc.
Rick Graziani [email protected]
5
Symbols for Networking Devices
Rick Graziani [email protected]
6
Network topologies
Rick Graziani [email protected]
7
Network topologies
• Network topology defines the structure of the network.
• Physical topology: Actual layout of the wire or media.
•
– Bus
– Star, Extended Star
– Ring
Logical topology: Defines how the media is accessed by
the hosts for sending data.
– Broadcast or multi-access
– Token passing
Rick Graziani [email protected]
8
Bus Topology
“A bus topology uses a single backbone segment (length of
cable) that all the hosts connect to directly.”
Rick Graziani [email protected]
9
Other Bus Topologies
Rick Graziani [email protected]
10
In the 70’s I was usually working on my bus
topology…
Rick Graziani [email protected]
11
Ring Topology
•
•
•
“A ring topology connects one host to the next and the last
host to the first.
This creates a physical ring of cable.”
Becoming less common.
Rick Graziani [email protected]
12
Token Ring
• Ring topologies use a token passing (logical topology).
• Token Ring NIC and Hub (or MAU)
• Token Ring networks are becoming obsolete and not part
of this curriculum.
Rick Graziani [email protected]
13
Star Topology
• “A star topology connects all cables to a central point of
•
concentration.
This point is usually a hub or switch, which will be
described later in the chapter.”
Rick Graziani [email protected]
14
Extended Star Topology
•
“An extended star topology uses the star topology to be
created.
• It links individual stars together by linking the
hubs/switches.
• This, as you will learn later, will extend the length and size
of the network.”
Rick Graziani [email protected]
15
Mesh Topology
Circuit and Packet
Switched networks could
be full or partial mesh.
•
•
•
•
A mesh topology is used when there can be absolutely no
break in communications, for example the control systems
of a nuclear power plant.
Each device has its own connections to all other hosts.
This also reflects the design of the Internet, which has
multiple paths to any one location.”
There are also full mesh and partial mesh topologies,
both physical and logical, which will be discussed in later
courses.
Rick Graziani [email protected]
16
Full Mesh and Switched Telephone Lines
Rick Graziani [email protected]
17
Network protocols
010010100111000111010011100101001000111101 ...
• Protocol - Set of rules and conventions that govern a particular aspect
•
•
of how devices on a network communicate.
– Including: format, timing, sequencing, and error control in data
communication.
Protocol suites are collections of protocols that enable network
communication from one host through the network to another host.
Without protocols, the computer cannot make or rebuild the stream of
incoming bits from another computer into the original format.
Rick Graziani [email protected]
18
Network protocols
Examples:
• Ethernet
• TCP/IP protocol suite
– IP
– TCP
– UDP
– ARP
Rick Graziani [email protected]
19
Network Technologies
LANs
MANs
WANs
Rick Graziani [email protected]
20
Local-area networks (LANs)
Some common LAN technologies are:
• Ethernet
• Token Ring
• FDDI
Rick Graziani [email protected]
21
Wide-area networks (WANs)
Some common WAN technologies are:
• Modems (Asynchronous)
• Integrated Services Digital Network (ISDN)
• Digital Subscriber Line (DSL)
• Frame Relay
• US (T) and Europe (E) – T1, E1, T3, E3
•Rick Synchronous
Optical Network (SONET)
Graziani [email protected]
22
Metropolitan-area networks (MANs)
• A MAN is a network that spans a metropolitan area such as a city or
•
•
suburban area.
A MAN usually consists of two or more LANs in a common geographic
area.
For example, a bank with multiple branches may utilize a MAN.
Rick Graziani [email protected]
23
Importance of bandwidth
• Bandwidth - The amount of information that can flow through a
network connection in a given period of time.
•
Rick Graziani [email protected]
Available at http://www.thinkgeek.com
24
Analogies
Rick Graziani [email protected]
25
Measurement
•
•
•
In digital systems, the basic unit of bandwidth is bits per
second (bps).
Bandwidth is the measure of how much information, or bits,
can flow from one place to another in a given amount of
time, or seconds.
Later – The size of a bit!
Rick Graziani [email protected]
26
Limitations
•
•
Bandwidth varies depending upon:
– Type of media
– Type of technology and protocol (LAN, WAN, wireless,
etc.)
The physics of the media account for some of the
difference.
Rick Graziani [email protected]
27
Throughput
• Throughput - The amount of data transferred from one place to
•
another or processed in a specified amount of time. (wikopedia.com)
Often far less than the maximum possible digital bandwidth of the
medium that is being used. Internetworking devices
The following are some of the factors that determine throughput:
• Type of data being transferred
• Network topology
• Number of users on the network
• User computer
• Server computer
• Power conditions
Rick Graziani [email protected]
28
Digital versus Analog
DTE
DCE
digital
analog
PSTN
Dial-up network
Modulation
DTE
DCE
digital
analog
PSTN
Dial-up network
Digital Signals
Demodulation
• A signal whose state consists of discrete elements such as high or low,
GOLDMAN:
onDATACOMM
or off
FIG.02-14
Analog Signals
• A signal which is “analogous” to sound waves
• telephone lines are designed to carry analog signals
Rick Graziani [email protected]
29
Digital and Analog Bandwidth
Bandwidth = The width or carrying capacity of a communications circuit.
Digital bandwidth = the number of bits per second (bps) the circuit can
carry
• used in digital communications
• measure in bps
Analog bandwidth = the range of frequencies the circuit can carry
• used in analog communications such as voice (telephones)
• measured in Hertz (Hz), cycles per second
• voice-grade telephone lines have a 3,100 Hz bandwidth
Rick Graziani [email protected]
30
Sound Waves
Rick Graziani [email protected]
31
ISO and the OSI Model
• The International Organization for Standardization (ISO) released
•
the OSI reference model in 1984, was the descriptive scheme they
created.
“ISO. A network of national standards institutes from
140 countries working in partnership with international
organizations, governments, industry, business and
consumer representatives. A bridge between public and
private sectors.” www.iso.ch
Rick Graziani [email protected]
32
ISO and the OSI Model
• “According to ISO, "ISO" is not an abbreviation. It is a word, derived
•
•
from the Greek isos, meaning "equal", which is the root for the prefix
"iso-" that occurs in a host of terms, such as "isometric" (of equal
measure or dimensions) and "isonomy" (equality of laws, or of people
before the law).
The name ISO is used around the world to denote the organization,
thus avoiding the assortment of abbreviations that would result from
the translation of "International Organization for Standardization" into
the different national languages of members.
Whatever the country, the short form of the organization's name is
always ISO.” www.whatis.com
Rick Graziani [email protected]
33
OSI Model
•
•
•
•
•
It breaks network communication
into smaller, more manageable
parts.
It standardizes network
components to allow multiple
vendor development and support.
It allows different types of network
hardware and software to
communicate with each other.
It prevents changes in one layer
from affecting other layers.
It divides network communication
into smaller parts to make learning
it easier to understand.
Rick Graziani [email protected]
34
OSI Model
• OSI (Open Systems Interface) was released as a suite of protocols to
•
•
•
be used as the Internet standard.
However, TCP/IP became the de facto standard.
The OSI reference model is the primary model for network
communications.
Although there are other models in existence, most network vendors,
today, relate their products to the OSI reference model, especially
when they want to educate users on the use of their products.
Rick Graziani [email protected]
35
OSI Model
The use of this model can be
confusing and will become clearer
later!
• The OSI reference model allows you to
•
– view the network functions that occur at each layer
– a framework that you can use to understand how information
travels throughout a network.
– understand, visualize, and troubleshoot the sending and receiving
data on a network
– visualize how information, or data packets, travels from application
programs, through a network medium (e.g. wires, etc.), to another
application program that is located in another computer on a
network, even if the sender and receiver have different types of
network media
Note: The Application Layer of the OSI model refers to networking
applications, and not user applications.
Rick Graziani [email protected]
36
OSI layers
Rick Graziani [email protected]
37
OSI layers
Usually not referred to.
Rick Graziani [email protected]
Usually not referred to.
38
OSI Layer 1 – Physical Layer
• The physical layer defines the
•
•
Rick Graziani [email protected]
electrical, mechanical, procedural,
and functional specifications for
activating, maintaining, and
deactivating the physical link between
end systems.
Signals, network media (cables,
wireless, …), layer 1 devices
Layer 1 devices include:
– Repeaters
– Hubs
39
OSI Layer 1 – Physical Layer
•
Determines how are the bits to be transferred over the
physical medium.
Rick Graziani [email protected]
40
Repeaters
Medium
Max Distance
Twisted Pair
100 meters
Coaxial Cable
185/500 meters
Fiber Optic
2+ kilometers
• Signals can only travel so far through media before they weaken, and
•
•
become garbled.
This weakening of signals is called attenuation.
Attenuation increases when:
• Media distances are lengthened
• Nodes are added to the media
Rick Graziani [email protected]
41
The Repeater
•
•
Repeaters are Layer 1 internetwork devices used to
combat attenuation.
Repeaters take in weakened signals, clean them up,
regenerate them, and send them on their way along the
network.
Rick Graziani [email protected]
42
Repeaters Extend Distances
NODE A
NODE A
100 M
100 M
REPEATER
NODE B
100 M
NODE B
By using repeaters, the distance over which a network can
operate is extended.
Example: 10Base-T (a wiring standard) is allowed to run
100 meters. One repeater can double this distance to 200
meters!
Rick Graziani [email protected]
43
Repeater: Layer 1 Device
Signal come in
… signal go out.
(after I amplify
it)


Repeaters are Layer 1 devices.
They do NOT look at Layer 2, Data Link (MAC, Ethernet)
addresses or Layer 3, IP Addresses.
Rick Graziani [email protected]
44
Hub
Hub is nothing but a multiport repeater.

Hubs are Layer 1 devices.

Data that comes in one port is sent out all other ports, except for the port
it came in on.
Hubs are sometimes called
 Ethernet concentrators
 Multiport repeaters
 In Token Ring nets, Multi-station Access Units (MAU or MSAU)

Rick Graziani [email protected]
45
Hub: Layer 1 Device


Hubs are Layer 1 devices.
They do NOT look at Layer 2, Data Link (MAC, Ethernet)
addresses or Layer 3, IP Addresses.
Rick Graziani [email protected]
46
Repeaters
•
•
•
•
In the “old days”, repeaters were typically used to extend
the size or length of a bus-topology network.
Repeaters take a signal in on one end and regenerate that
signal out the other end.
In most networks (LANs), repeaters have been replaced
by hubs, which have been mostly replaced by switches.
MORE LATER!
Rick Graziani [email protected]
47
Hubs
•
•
•
•
•
Hubs allow computers and other network devices to
communicate with each other, and use a star topology.
Like a repeater, a hub regenerates the signal.
Hubs have the same disadvantage as a repeater, anything
it receives on one port, it FLOODS out all other ports.
Wherever possible, hubs should be replace by switches.
More LATER!
Rick Graziani [email protected]
48
OSI Layer 2 – Data Link Layer
• The data link layer provides reliable
•
•
Rick Graziani [email protected]
transit of data across a physical link.
In so doing, the data link layer is
concerned with physical (as opposed
to logical) addressing, network
topology, network access, error
notification, ordered delivery of
frames, and flow control.
Frames and Layer 2 protocols
Layer 2 devices include:
– Switches
– Bridges
49
Switches
•
•
•
•
•
Switches are the core devices in today’s modern LANs.
Switches are Layer 2 devices, like bridges.
Switches keep tables of MAC addresses.
Switches keep track of and examine Layer 2, Data Link addresses
(MAC addresses) – more later.
Switches learn about devices on each port and “decide” whether or not
it needs to forward the traffic: Flood or Filter.
Rick Graziani [email protected]
50
Switches
Etherfast 5-port 10/100
switch with one free nic
$47.99 Click here for lease
options! (Data Warehouse)
• Switches filter or flood. – more later
• Switches can have a number of different “layer 2 features”
•
and may cost anywhere from $50 to over $100,000
What is a “layer 3 switch”? – Later, but it is nothing more
than a switch with a router.
Rick Graziani [email protected]
51
Switches
Switches will be discussed:

More this semester

More in CIS 83.
 More in course: Multilayered Switched Networks

LAN design, media types, VLANs, VLAN Trunking Protocol, ISL,
802.1Q, Spanning Tree (802.1d), Inter-VLAN routing, Multilayer
Switching, Flow Masks, HSRP, VACLs, Multicasting, and IGMP.
Rick Graziani [email protected]
52
Switches
Switch
• Switches look a lot like hubs, but internally are much different.
• Switches can learn where devices are on the network, so they do not
•
have flood information (frames), but can FILTER them so the
information only goes out the port towards the destination device.
Switches also uses a star topology.
Rick Graziani [email protected]
53
Bridges
• A bridge is a two port switch.
• In the early days there were other types of bridges such as translation
bridges that joined two different types of networks such as Ethernet
and Token Ring.
Rick Graziani [email protected]
54
Network Interface Card (NIC)
Rick Graziani [email protected]
55
Network Interface Card (NIC)
Network Interface Card (NIC)
• www.whatis.com “A network interface card (NIC) is a computer circuit
board or card that is installed in a computer so that it can be connected
to a network. Personal computers and workstations on a local area
network (LAN) typically contain a network interface card specifically
designed for the LAN transmission technology, such as Ethernet or
token ring. Network interface cards provide a dedicated, full-time
connection to a network. Most home and portable computers connect
to the Internet through as-needed dial-up connection. The modem
provides the connection interface to the Internet service provider.’
• Data Link, Layer 2 Device
Rick Graziani [email protected]
56
Network Interface Card (NIC)
Rick Graziani [email protected]
57
Network Interface Card (NIC)
Network Interface Card (NIC)
• Layer 2, Data Link Layer, device
• Connects the device (computer) to the LAN
• Responsible for the local Layer 2 address (later)
• Common Layer 2 NICs:
– Ethernet
– Token Ring
• Common Bandwidth
– 10 Mbps, 10/100 Mbps, 10/100/1000 Mbps
Rick Graziani [email protected]
58
Network Interface Card (NIC)

Routers with Ethernet and Token Ring Interfaces also have
NICs.
Rick Graziani [email protected]
59
OSI Layer 3 – Network Layer
• The network layer provides
•
•
Rick Graziani [email protected]
connectivity and path selection
between two host systems that may
be located on geographically
separated networks.
IP Addressing, routing and Layer 3
protocols
Layer 3 devices include:
– Routers
60
The Router
• The purpose of a router is to examine incoming packets, choose the
•
•
best path for them through the network, and then switch them to the
proper outgoing port.
Routers work at Layer 3, the Network Layer.
Routers examine Layer 3 addresses IP (legacy technologies: IPX,
Appletalk, etc.)
Rick Graziani [email protected]
61
Router
• Routers can also connect different Layer 2 technologies, such as
•
Ethernet, Token-ring, and different serial technologies such as ISDN,
PPP, etc.
However, because of their ability to route packets based on Layer 3
information, routers have become the backbone of the Internet, running
the IP protocol.
Rick Graziani [email protected]
62
Router
Juniper
Router
IMP
(Interface
Message
Processor)
• A router connects different networks or subnets.
• A router connects:
– LAN to LANs
– LANs to WANs
– WANs to WANs
Rick Graziani [email protected]
63
Router
• Much more on routing:
• CIS 82: Routing theory, routing protocols, router configuration
• CIS 83: EIGRP, Single Area OSPF, classful and classless routing
•
protocols
CIS 185: Advanced Routing, multi-area OSPF, EIGRP, IS-IS, BGP,
VLSM, CIDR, route redistribution, summarization and optimization.
Rick Graziani [email protected]
64
Router
•
•
A router is used to separate or segment one network from
another network.
This will make more sense LATER!
Rick Graziani [email protected]
65
Devices and their layers
Transceiver
• Hosts and servers operate at Layers 2-7; they perform the
•
•
•
encapsulation process.
Routers: Layers 1 through 3, make decisions at layer 3
Switches and NICs: Layers 1 and 2, make decisions at layer 2
Hubs and transceivers: Layer 1, no decisions to make
Rick Graziani [email protected]
66
Ethernet and TCP/IP
Ethernet & TCP/IP are the most pervasive LAN
protocols, and are often used together.
Application Layer
Presentation Layer
Session Layer
TCP/IP
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Rick Graziani [email protected]
Ethernet
67
Rick Graziani [email protected]
68
Peer-to-peer communications
• In order for data to travel from the source to the destination, each layer
of the OSI model at the source must communicate with its peer layer at
the destination.
• This form of communication is referred to as peer-to-peer.
• During this process, the protocols of each layer exchange information,
called protocol data units (PDUs).
• Each layer of communication on the source computer communicates
with a layer-specific PDU, and with its peer layer on the destination
computer as illustrated in Figure
Rick Graziani [email protected]
69
TCP/IP model
•
•
•
•
TCP/IP was developed as an open standard.
This meant that anyone was free to use TCP/IP.
This helped speed up the development of TCP/IP as a standard.
Although some of the layers in the TCP/IP model have the same name
as layers in the OSI model, the layers of the two models do not
correspond exactly.
Rick Graziani [email protected]
70
TCP/IP model
Some of the common protocols specified by the TCP/IP reference model layers.
Some of the most commonly used application layer protocols include the
following:
• File Transfer Protocol (FTP)
• Hypertext Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
• Domain Name System (DNS)
• Trivial File Transfer Protocol (TFTP)
The common transport layer
protocols include:
• Transport Control Protocol (TCP)
• User Datagram Protocol (UDP)
The primary protocol of the
Internet layer is:
• Internet Protocol (IP)
Rick Graziani [email protected]
71
OSI and TCP/IP
Rick Graziani [email protected]
72
Detailed encapsulation process
• All communications on a network originate at a source, and are sent to
•
•
a destination.
The information sent on a network is referred to as data or data
packets.
If one computer (host A) wants to send data to another computer (host
B), the data must first be packaged through a process called
encapsulation.
Rick Graziani [email protected]
73
Detailed encapsulation process
Networks must perform the following five conversion steps in order to
encapsulate data:
1. Build the data.
2. Package the data for end-to-end transport.
3. Add the network IP address to the header.
4. Add the data link layer header and trailer.
5. Convert to bits for transmission.
Rick Graziani [email protected]
74
Data Encapsulation Example
Application
Header + data
Application Layer
Layer 4: Transport Layer
Layer 3: Network Layer
Layer 2:
Network
Layer
010010100100100100111010010001101000…
Layer 1: Physical
Layer
Let us focus on the Layer 2, Data Link, Ethernet Frame for
now.
Rick Graziani [email protected]
75
This will make much more sense later!
Rick Graziani [email protected]
76
Ch.2 – Networking Fundamentals
Getting past some basics…
CIS 81 and CST 311
Cabrillo College and CSUMB
Rick Graziani
Fall 2005