Professional Documents
Culture Documents
Certification s Introduction Why the Seven Layer Model? How Encapsulation Works The Seven Layers: Application, Presentation, Session, Transport, Network, Data Link, Physical Troubleshooting using the SevenLayer Model
Cisco
y y y y
y
IP
PC
Introduction
When we browse the Internet, a physical connection allows for us to connect to the internet, either through a modem or through an Ethernet card in the case of a Protocols dedicated connection. A TCP/IP stack allows us to pass traffic and resolve web sites to IP addresses. Finally, applications, such as Netscape and Eudora, allow us to see the web sites and receive our e-mail. Resources The modem or Ethernet function has 2 parts. The modem or Ethernet drivers provide the computer with a way to communicate with the hardware. The PPP connection, also known as Dial-up Networking, allows your computer to access the modem. These two components provide the basis of getting a connection to the Internet. Routers The TCP/IP stack allows the computer to pass traffic across the link to the Internet in a meaningful way. That is, the TCP/IP stack allows your computer to speak the same "language" as the equipment at the other end of your connection. The TCP/IP stack also allows you to resolve friendly host names, such as www.verio.net, into an IP SQL (Internet Protocol) address. Without the TCP/IP stack, we would be forced to go to each web site by it's IP address instead of a name!
Finally, the applications allow us to interact with friendly software to interpret HTML Security code into web pages for us, interact with mail servers to exchange e-mail, connect to news servers to retrieve and post news articles, and exchange data with FTP servers to allow us to download files. Without these programs, the Internet would be much more difficult to navigate through. Telecommu nications top
Tools
y A layer should be created where a different level of abstraction is needed. y Each layer should perform a well defined function. y The function of each layer should be chosen in accordance with developing
internationally standardized protocols.
Unix
y The layer boundaries should be chosen to minimize the information flow across
the interfaces.
y The number of layers should be large enough that distinct functions need not
be thrown together in the same layer out of necessity, and small enough that
the architecture does not become unwieldy. Having a way of categorizing each factor in an internet connection makes it easier for Web us to do our jobs as troubleshooters. We all inherently understand that if the modem is not plugged in, you're not going to be able to get your e-mail. The OSI model allows us to follow that logic further: for mindterm example, if you can browse the web by IP but can't see websites by name, you know that the problem is not on the Network layer, but on the Transport layer. top
Imagine that System A is requesting information from System B. System A makes an HTTP (Layer 7) request, which gets prepended with a header and appended with a footer. Layer 6 specifies whether it's a request for a GIF or an HTML document, and treats the Layer 7 header, data, and footer as its own data, prepending that with a header and appending it with a footer. The same treatment happens on Layer 5, and so on. System B receives the request on Layer 1, and begins the decapsulation process, stripping the Layer 1 headers and footers off to reveal the Layer 2 information, and so forth, all the way up to the 7th layer. top
Application
The application layer interacts with software applications (such as Netscape or Outlook Express) that implement a communicating component. Such application programs are outside of the scope of the OSI model, but they translate an enduser's typing into a Layer 7 request. Application layer functions typically include the following:
Presentation
The presentation layer provides a variety of encoding and encryption functions that are applied to the application layer data. These functions ensure that information sent from the application layer of one system will be readable by the application layer of another system. Some examples of presentation layer encoding and encryption schemes follow:
Session
The session layer establishes, manages, and terminates communication sessions between presentation layer entities. Communication sessions consist of service requests and service responses that occur between applications located in different network devices. These requests and responses are coordinated by protocols implemented at the session layer. For example, SQL is a Session layer application that manages multiple queries to the SQL database. It's what allows multiple people to log in to, say, the Intranet at the same time.
top
Transport
The transport layer implements reliable internetwork data transport services that are transparent to upper layers. Transport layer functions typically include the following:
y Flow control - Flow control manages data transmission between devices so that
the transmitting device does not send more data than the receiving device can process. Sliding Window - This allows the receiving computer to dictate to the receiving end how many packets the receiver is capable of receiving at one time. Multiplexing - Multiplexing allows data from several applications to be transmitted onto a single physical link. Virtual circuit management - Virtual circuits are established, maintained, and terminated by the transport layer. Three-way handshake - The three-way handshake is a connection establishment protocol. First, host A sends a SYN segment to host B in order to check that host B gets ready for establishing a TCP connection. Second, when host B receives the SYN segment that host A sent and is ready to start the TCP session, it sends a SYN and ACK segment back to host A. This ACK advertises an arrival of the first SYN segment to host A. Finally, host A sends an ACK segment for the second SYN and ACK segment that host B sent. Error checking and recovery - Error checking mechanisms for detecting transmission errors. Error recovery involves taking an action (such as requesting that data be retransmitted) to resolve any errors that occur.
y y y y
The two most common Transport layer protocols are TCP and UDP. Common Transport Layer Ports 21 22 23 25 53 80 FTP SSH telnet SMTP DNS HTTP
110 POP3 143 IMAP 443 HTTPS A complete Port List top
Network
The network layer provides routing and related functions that allow multiple data links to be combined into an internetwork. This is accomplished by the logical addressing (as opposed to the physical addressing) of devices. The network layer supports both
connection-oriented and connectionless service from higher-layer protocols. Common protocols on the Network layer are BGP and OSPF. RIP is another Network layer protocol, but is not used on larger networks because of its inefficiency. top
Data Link
The data link layer is where the logical information (i.e., IP addresses) is translated into the actual electrical pulses that travel over the physical layer. Frame Relay, ATM, and DSL all work on the Data Link layer. Different data link layer specifications define different network and protocol characteristics, including the following:
y Network topology - Data link layer specifications often define how devices are
to be physically connected (such as in a bus or a ring topology).
y Error notification - Error notification involves alerting upper layer protocols that
a transmission error has occurred.
Logical Link Control Sub-layer The Logical Link Control (LCC) sublayer of the data link layer manages communications between devices over a single link of a network. LCC is defined in the IEEE 802.2 specification. IEEE 802.2 defines a number of fields in data link layer frames that allow multiple higher-layer protocols to share a single physical data link. LLC supports both connectionless and connection-oriented services used by higherlayer protocols. Media Access Control Sub-layer The Media Access Control (MAC) sublayer of the data link layer manages protocol access to the physical network medium. The IEEE MAC specification defines MAC addresses, which allow multiple devices to uniquely identify one another at the data
link layer.
top
Physical
The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. Physical layer specifications define such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and the physical connectors to be used. Common examples of things that work on the Physical layer are Fiber Optic cables, CAT5 (ethernet) cables, and Copper Twisted Pair.
top
The whole point of the OSI model is to make our jobs easier through classification and dilineation of functions. Ultimately, the easiest way to use the seven-layer model is by figuring out what the user can do on the Net, then going up one layer and seeing if they can perform the functions that are supposed to be performed on that layer. For example:
y Is the router plugged in? What lights are on? If the router is not a) plugged in
to the electrical outlet and b) plugged in to the ISDN jack, the user won't be able to ping. y If the user can ping but can't browse the internet, can the user visit a website by IP address? If the user's TCP configurations are incorrect, they will obviously not be able to translate a name to IP address, and therefore, won't be able to get mail, either. Elementary.
top
Sponsored Links
Wireless RouterCompare & Save With PC World's Buying Guide.PCWorld.com Cisco Networking HardwareNew or Used. Warranty. Big Savings Routers Switches Firewalls WirelessNetworkEquipment.net Wireless TelemetryEasy, Affordable Wireless Telemetry License-free, bi-directional I/Owww.pribusin.com Wireless / Networking Ads
y y y y y
Computer Networks Wireless Networking LAN Wan LAN Networks Wireless Networks
Sponsored Links
Are You a Fresher?Join Placement Oriented 4 Month IT Course Designed for Fresh GradsNIIT.com/IT-Training Network TroubleshootingCollect data and solve problems Track trace routes over timewww.pingplotter.com/networktroubles One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are:
y y y y y y y y
LAN - Local Area Network WLAN - Wireless Local Area Network WAN - Wide Area Network MAN - Metropolitan Area Network SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network PAN - Personal Area Network DAN - Desk Area Network
LAN and WAN were the original categories of area networks, while the others have gradually emerged over many years of technology evolution. Note that these network types are a separate concept from network topologies such as bus, ring and star. See also - Introduction to Network Topologies LAN - Local Area Network A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring. WAN - Wide Area Network As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances. LAN, WAN and Home Networking Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate directly with each other but must go through a central gateway, typically a broadband router, to reach the ISP. Other Types of Area Networks While LAN and WAN are by far the most popular network types mentioned, you may also commonly see references to these others:
y y
y y y
Wireless Local Area Network - a LAN based on WiFi wireless network technology Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation. Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus. Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel. System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network.
Standard (WIMAX), Asynchronous Transfer Mode Protocol (ATM) and many more. Among all protocols, the standard one used in MAN is the DQDB where it allows up to 30 kilometer distance between networks with speed of 34-155 Megabytes per second. Many companies, campuses and local governments are slowly switching to MAN - Metropolitan Area Network. This is because of the advantages that MAN offers and the convenience it brings to clients. Having small networks compounded into a large network such as in MAN provides security for the communication shared in between the networks
In an ethernet network there are 4 devices that from the the outside look very similar. In this article we will look at the difference between hubs, switches, bridges, and routers. Hub A hub is the simplest of these devices. Any data packet coming from one port is sent to all other ports. It is then up to the receiving computer to decide if the packet is for it. Imagine packets going through a hub as messages going into a mailing list. The mail is sent out to everyone and it is up to the receiving party to decide if it is of interest. The biggest problem with hubs is their simplicity. Since every packet is sent out to every computer on the network, there is a lot of wasted transmission. This means that the network can easily become bogged down. Hubs are typically used on small networks where the amount of data going across the network is never very high. Bridge A bridge goes one step up on a hub in that it looks at the destination of the packet before sending. If the destination address is not on the other side of the bridge it will not transmit the data. A bridge only has one incoming and one outgoing port. To build on the email analogy above, the bridge is allowed to decide if the message should continue on. It reads the address bob@smith.com and
decides if there is a bob@smith.com on the other side. If there isnt, the message will not be transmitted. Bridges are typically used to separate parts of a network that do not need to communicate regularly, but still need to be connected. Switch A switch steps up on a bridge in that it has multiple ports. When a packet comes through a switch it is read to determine which computer to send the data to. This leads to increased efficiency in that packets are not going to computers that do not require them. Now the email analogy has multiple people able to send email to multiple users. The switch can decide where to send the mail based on the address. Most large networks use switches rather than hubs to connect computers within the same subnet. Router A router is similar in a switch in that it forwards packets based on address. But, instead of the MAC address that a switch uses, a router can use the IP address. This allows the network to go across different protocols. The most common home use for routers is to share a broadband internet connection. The router has a public IP address and that address is shared with the network. When data comes through the router it is forwarded to the correct computer. This comparison to email gets a little off base. This would be similar to the router being able to receive a packet as email and sending it to the user as a fax.
What is the different between hub, bridge, switch, and router in network devices? thx?
. What routing protocol uses cost as its metric? a. RIP b. EIGRP c. OSPF d. BGP
See an unfamiliar term? Look it up in our SearchNetworking.com glossary, courtesy of Whatis.com. 2. Which of these is an exterior gateway protocol (EGP)?
a. OSPF b. BGP c. RIP d. EIGRP 3. Which of these routing protocols would be used between Autonomous systems (InterAS)? a. OSPF b. RIP c. EIGRP d. BGP 4. Which routing protocol has a default administrative distance of 110? a. BGP b. OSPF c. RIP d. EIGRP e. Static 5. Which routing method is most trusted by a router?
a. BGP b. IGRP c. Static d. RIP e. OSPF 6. What is the process of sending routes from one routing protocol to another routing protocol? a. Redistribution b. Distribution c. Filtering d. Prepending e. Source routing 7. Which command tells RIP to send hellos, out an interface, to find neighbors and to advertise routes? a. hello b. network c. interface d. advertise e. neighbor 8. You want to filter inbound routes from an OSPF neighbor. Which command do you use? a. Distribute-list b. Route-list c. Prefix-list d. Filter-list 9. In BGP, OSPF and EIGRP, an internetwork under common administration is called what? a. Routing system b. Autonomous routing c. Routing domain d. Autonomous system 10. Which command do you use to prevent OSPF HELLO packets from going out of a configured interface? a. no network b. passive c. no advertise d. hello-off e. quiet 11. In OSPF, every router must have communications back to what? a. Area zero b. The root c. OSPF central d. Area one
12. Which of these routing protocols would be unavailable on a non-Cisco router? a. OSPF b. RIP c. EIGRP d. BGP 13. What type of OSPF router would connect an area that is not using OSPF? a. BDR b. ABR c. BR d. ASBR e. OSBR 14. A router receives two identical routes from different protocols. What route is put into the routing table? a. The route with the most trusted AD b. The best route c. The OSPF route d. Both routes 15. If RIP receives two similar routes to a network, which route is put into the routing table? a. The route with the most trusted administrative distance b. The most specific route c. The RIP version 2 route d. Both routes
ANSWERS 1. C (OSPF) 2. B (BGP) 3. D (BGP) 4. B (OSPF) 5. C (Static) 6. A (Redistribution) 7. B (Network) 8. A (Distribute-list) 9. D (Autonomous system) 10. B (Passive) 11. A (Area zero) 12. C (EIGRP) 13. D (ASBR) 14. A (The route with the most trusted AD) 15. B (The most specific route)
Routing Protocols Types (RIP, IGRP, OSPF, EGP, EIGRP, BGP, IS-IS) Protocols
RIP version 1
The original specification of RIP, defined in RFC 1058,[4] uses classful routing. The periodic routing updates do not carry subnet information, lacking support for variable length subnet masks (VLSM). This limitation makes it impossible to have different-sized subnets inside of the same network class. In other words, all subnets in a network class must have the same size. There is also no support for router authentication, making RIP vulnerable to various attacks.The RIP version 1 works when there is only 16 hop counts(0-15).If there are more than 16 hops between two routers it fails to send data packets to the destination address.
A virtual local area network, virtual LAN or VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical local area network (LAN), but it allows for end stations to be grouped together even if they are not located on the same network switch. LAN membership can be configured through software instead of physically relocating devices or connections. To physically replicate the functions of a VLAN, it would be necessary to install a separate, parallel collection of network cables and equipment which are kept separate from the primary network. However unlike a physically separate network, VLANs must share bandwidth; two separate one-gigabit VLANs using a single one-gigabit interconnection can both suffer reduced throughput and congestion. It virtualizes VLAN behaviors (configuring switch ports, tagging frames when entering VLAN, lookup MAC table to switch/flood frames to trunk links, and untagging when exit from VLAN.)
Uses
VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain. This is also useful if someone wants to create multiple layer 3 networks on the same layer 2 switch. For example, if a DHCP server is plugged into a switch it will serve any host on that switch that is configured to get its IP from a DHCP server. By using VLANs you can easily split the network up so some hosts won't use that DHCP server and will obtain link-local addresses, or obtain an address from a different DHCP server. VLANs are layer 2 constructs, compared with IP subnets which are layer 3 constructs. In an environment employing VLANs, a one-to-one relationship often exists between VLANs and IP subnets, although it is possible to have multiple subnets on one VLAN. VLANs and IP subnets provide independent Layer 2 and Layer 3 constructs that map to one another and this correspondence is useful during the network design process. By using VLANs, one can control traffic patterns and react quickly to relocations. VLANs provide the flexibility to adapt to changes in network requirements and allow for simplified administration
VLAN Trunking Protocol (VTP) is a Cisco proprietary Layer 2 messaging protocol that manages the addition, deletion, and renaming of Virtual Local Area Networks (VLAN) on a network-wide basis. Cisco's VLAN Trunk Protocol reduces administration in a switched network. When a new VLAN is configured on one VTP server, the VLAN is distributed through all switches in the domain. This reduces the need to configure the same VLAN everywhere. To do this, VTP carries VLAN information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1q, IEEE 802.10 and LANE trunks. VTP is available on most of the Cisco Catalyst Family products.[1] The comparable IEEE standard in use by other manufacturers is GVRP or the more recent MVRP.
VTP Modes
VTP operates in one of three modes:
Server In this VTP mode you can create, remove, and modify VLANs. You can also set other configuration options like the VTP version and also turn on/off VTP pruning for the entire VTP domain. VTP servers advertise their VLAN configuration to other switches in the same VTP domain and synchronize their VLAN configuration with other switches based on messages received over trunk links. VTP server is the default mode. The VLANs information are stored on NVRAM and they are not lost after a reboot. Client VTP clients behave the same way as VTP servers, but you cannot create, change, or delete VLANs on the local device. Remember that even in VTP client mode, a switch will store the last known VTP information including the configuration revision number. Don t assume that a VTP client will start with a clean slate when it powers up.
Transparent When you set the VTP mode to transparent, then the switches do not participate in VTP. A VTP transparent switch will not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received messages. VLANS can be created, changed or deleted when in transparent mode. In VTP version 2, transparent switches do forward VTP messages that they receive out of their trunk ports.
VTP sends messages between trunked switches to maintain VLANs on these switches in order to properly trunk. VTP messages are exchanged between switches within a common VTP domain. If the domain name is different, the switch simply ignores the packet. If the name is the same then it checks by a revision number. If the revision number of an update received on a client or server VTP switch is higher than the previous revision, then the new configuration is applied. Otherwise, the configuration is ignored. When new devices are added to a VTP domain, revision numbers should be reset on the entire domain to prevent conflicts. Utmost caution is advised when dealing with VTP topology changes, logical or physical. Exchanges of VTP information can be controlled by passwords. You need to put the same password on every switch for it to work
The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and ensuing broadcast radiation. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for manual enabling/disabling of these backup links. STP is a Data Link Layer protocol. It is standardized as IEEE 802.1D. As the name suggests, it creates a spanning tree within a mesh network of connected layer-2 bridges (typically Ethernet switches), and disables those links that are not part of the spanning tree, leaving a single active path between any two network nodes. STP is based on an algorithm invented by Radia Perlman while working for Digital Equipment Corporation.[1][2]