0% found this document useful (0 votes)
56 views

Network Note

The document discusses the 7 layers of the OSI model from layers 1 to 7, describing the function and examples of protocols for each layer. It also discusses the 4 layers of the TCP/IP model and provides examples of protocols for each layer. Finally, it covers topics such as IP addressing, network topologies, and network operating systems.

Uploaded by

goku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

Network Note

The document discusses the 7 layers of the OSI model from layers 1 to 7, describing the function and examples of protocols for each layer. It also discusses the 4 layers of the TCP/IP model and provides examples of protocols for each layer. Finally, it covers topics such as IP addressing, network topologies, and network operating systems.

Uploaded by

goku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 13

Fundamental Network

OSI LAYER 7
OSI(open systems Interconnection)

All People seem to need data processing


1. Application Upper layer
2. Presentation ^
3. Session
4. Transport
5. Network
6. Data Link
7. Physical Lower layer
ALL layer (firewall , computer , Gateway)

Physical Hub, Cable, Wiring, Media, Repeater Data transfer Network Services
Data Link Bridge, Switches, Wireless, Access Function
Point
Network IPV4, IPV6 , Router
Transport TCP , UDP Transport
Services
Session Communicati Application-level
on network
Presentation Service Services user
function
Application Server

Note: in the year 1983 mainly by ISO(International Organization Standardization ) & ITU-
T(International Teloeommunication Union- Teclecommunication standardization sector)
Open systems interconnect (OSI)
OSI is cpmputer network standard developed by the international organization for standardization
(ISO) , along with the ITU-T.

Layer 7 : Application Data


Layer 6 : Presentation Data
Layer 5 : Session Data
Layer 4 : Transport segment (TCP) | Datagram (UDP)
Layer 3 : Network Packets
Layer 2 : Data Link Frames
Layer 1 : Physical Bits

Layer 1 : Physical

function : Transmission and reception of bit over a physical medium .


Examples : Ethernet DSL, ISDN , RS-232, DOCSIS
PUD : Bits

Layer 2 : Data Link

Function : Reliable transmission of data frames between to computers (nodes) connected by a


physical layer.
Examples : MAC , PPP , ATM , MPLS , IEEE, 802.2 , L2TP , LLDP
PDU : frames ( cisco often includes packets here)

Layer 3 : Network

Function : The management of a network , including IP address, routing and traffic control,
Examples : IPV4, IPV6, Ipsec , ICMP
PUD : packets

Layer 4 : Transport

Function : Reliable transmission of data segments between network entities. Includes segmentation,
acknowledgement , and multiplexing .
Examples : Transmission Control Protocol (TCP),User Datagram Protocol (UDP)
PDU : segment (TCP) | Datagram (UDP)

Layer 5 : Session

Function : Session management and continuous exchange of information between two nodes
Examples :TLS , FTP, HTTP , HTTPS , SMTP , Telnet , SCP , RPC
PDU : Data

Layer 6 : Presentation
Function : Translation of data between network services and applications (I.e character encoding ,
data compression , encryption , etc..)
Examples : JSON, XML, HTML, S/MIME, CSS,GIF
PDU :Data

Layer 7 : Application

function : application & APLs (resource sharing , remote file access, etc…)
Examples : SSH , SNMP, Web service , REST, SOAP)
PDU: Data

TCP/IP
TCP (Tansmission control Protocol)
IP (Internet Protocol)

1. AP Layer(Application layer)
2. Transport layer/TCP layer
3. Internet layer/IP layer
4. Data link layer /IN layer (Network Interface layer)
(1)AP layer(Application layer)
1. DNS This converts FQDN (Fully Qualified Domain Name) to the IP address.
2. DHCP This dynamically assigns the IP address.
3. SMTP This transfers e-mails to the mail server or between main servers.
4. POP This downloads e-mails from the mail server.
5. IMAP This retrieves e-mails from the mail server.
6. MIME This enables handling of audio/video data through e-mails.
7. HTTP This transfers hypertext (e.g., HTML documents).
8. FTP This transfers files.
9. SNMP This manages the network in a simple manner.
10. TELNET This performs remote login from a remote terminal.
11. NTP This synchronizes the time in several nodes.
12. NNTP This distributes news articles.
13. RTP This transfers video and audio data in a format suitable for real time.
14. BOOTP This acquires the settings of the network during OS boot.
15. SOAP This calls XMl-based data and servicer

(3) Transprt layer/TCP layer


TCP
This guarantees high reliability in connection-oriented
communication in which a logical communication channel is
established.
UDP
This provides high speed instead of not guaranteeing reliability in
connectionless communication in which a logical communication
channel is not established.

(3) Internet layer/ IP layer


1. IP This uses the IP address to transfer packets.
2. RIP This is used to select the communication path.
3. ARP This acquires a MAC address from an IP address.
4. RARP This acquires an IP address from a MAC address.
5. ICMP This gives notification of communication error and network status.

(4) Data Link layer /NI layer (Network Interface layer)


PPP This uses the telephone line to connect to the network.
PPPoE This establishes a dial-up connection on the Ethernet.

Network Operating System


 Novell Netware
 Microsoft Windows
 Unix/ Linux
 Macintosh OS (Mac OS)
Novell Netware
 Server version only
 Fairly minimal hardware requirement
 Simple user interface
 Third party support
 Interoperability with many type of computer
 Combine two protocol
Microsoft Windows
o Server version and Workstation
o Maximum hardware requirement
o Built in utilities and Third party support
o Interoperability with many type of computer
o World wide protocol and MS NetBIOS

UNIX and Linux


 Server version and Workstation
 Use Special hardware requirement for UNIX
 Simple user interface (not user friendly)
 Poor Application and Device Driver
 Interoperability with many type of computer
 Basic internet protocol -(TCP/IP)

Macintosh OS (Mac OS)


o Server version and Workstation
o Use Special hardware
o Simple user interface (user friendly)
o Mac Application and Device Driver
o Interoperability with many type of computer
o Apple protocol

Network to topology

Physical & Logical Topology


Physical Topology Logical Topology
Layout of the cables and location Define how the information or data
of all network components. flows within the network.
.Bus .Bus
.Star .Ring
.Ring .Mesh
.Mesh
IP address
Number system
1.Binary number system
2.Decimal number system
3.Hexdimal number system

IPV4
Special IP address
-Network address
address in which the host address part of the IP address (network nameplates)
-Unicast address (one to one)
An address used to send to specified node only
-Broadcast(data to all nodes )
Used for broadcast data to all the nodes belonging to a network
-Multicast address ( data to Group)
used for broadcasting data to all the nodes belonging to a specified group
class D IP address used for identifying the specified group(multicast Groups)

Number system

1,2.3,4,
binary number system
2=0.1
decimal number system
10= 0,1,2,3,4,5,6,7,8,9
hexadecimal
15 =0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

IPV4
32 bit address format
-Consist of four set of eight binary number (octets)
-Each set separated by period (dotted decimal notation)
-Can be write binary and decimal format
-All eight binary number is “00000000” = “0” value
-All eight binary number is “11111111” = “255” value
-Broadcast address = 255.255.255.255
-Loop back address = 127.0.0.1 (local host address)
-Unique number for each system (can be conflict)
-Class A, Class B, Class C, Class D, Class E address
-Public address and private address
-Classful address and classless address
-Automatic private IP address (APIPA)- 169.254.0.0

Internet Assigned Numbers Authority


Private IP address & Public address
Private IP address(LAN)

class Private IP RANGE


A 10.0.0.0 through 10.255.255.255(8)
B 172.16.0.0 through 173.31.255.255(16)
C 192.168.0.0 through 192.168.255.255(256)

Public Ip address(Internet)(WAN)
We refer to all other IP address as public IP address
class Public IP RANGE
A 1.0.0.0 to 9.255.255.255
11.0.0.0 to 126.255.255.255
B 128.0.0.0 to 172.15.255.255
172.32.0.0 to 191.255.255.255

C 192.0.0.0 to 192.167.255.255
192.169.0.0 to 223.255.255.255

Leading Class Default Bits First Hosts per Address


Bits Subnetmask Decimal network
Value
O A 00000000- 255.0.0.0 /8 1-126 16777214 10.0.0.0~
01111111 126.0.0.0
10 B 10000000- 255.255.0.0/16 128-191 65534 128.0.0.0~191.25
10111111 5.0.0
110 C 11000000- 255.255.255.0/ 192-223 254 192.0.0.0~
11011111 24 2230255.0.0
1110 D 11100000- For Multi cast 224-239 Multi cast 224.0.0.0~
11101111 address 239.255.0.0
1111 E 11110000- For Research 240-255 Experimenta 240.0.0.0~
11111111 l address 255.255.255.2

wireless Network
same frequency for wireless Network
CSMA/CA(collision Auoidance)
type speed frequency
b 11mbps 2.4ghz
a 54mbps 5ghz
g 54mbps 2.4ghz
n 100mbps,300mbs,600mps 5/2.4ghs
wireless security
1. WEP (Wire Equivalent Protocol)
use key

2. WPA (wifi protected access)


personal -use preshare keys
Enterprise-use REDIUS server

3. WPA2i protected access 2)


personal -use preshare keys
Enterprise-use REDIUS server

cable
Network Media & connect

• bounded Media
• Unbounded Media

bounded media

• coaxial cable

• Twisted Pair cable

• fiber option cable

coaxial cable

• Thin coaxial cable -10base 2(use for bus Network)

• Thick coaxial cable -10 base 5(use for backbone cable)

Twisted pair cable

• shield twisted pair

• unshield twisted pair-UTP

Fiber optic cable

• single mode fiber (support long distance)

• multi mode fiber (support multi single )

unbounded Media(wireless)

• Radio wave transmittion

• Micro wave transmittion

• Infrared wave transmittion

coaxial cable

• Thin coaxial cable -10base 2(use for bus Network)

-use for bus network

-speed-Max 10mbps

-Rj-58 & BNC connetcor

-length- maximum185m

• Thick coaxial cable -10 base 5(use for backbone cable)

-use backbone cable

-length – maximum 500m


-use BNC transceiver

Twisted pair cable

• shield twisted pair

-use for ring network

-4 pair 8 wire

-10 base T, 100 baseT, 1000baseT

• unshield twisted pair-UTP

-use for star network

-10 base Tx,100 base TX,1000 base TX

-speed 10,100,1000 Mbps

-length -max 100m

-use RJ45

Virtual Private Network


A virtual private network (VPN) extends a private network across a public
network, and enables users to send and receive data across shared or public networks
as if their computing devices were directly connected to the private network. VPN is
OSI all layer use.
VPN is four critical functions , confidentiality (encryption), Data integrity, origin
authentication and Anti-replay .

VPN type and Usage is

1. Remote access VPNs


2. Site to site VPNs
3. Extranet VPNs

Remote access VPNs


Connects individual internet uses to the enterprise network .Remote access VPN
features is provide communications between a corporate Network and remote or
mobile employees.
Remote access VPNs features are strong authentication is critical to verify
remote and mobile user’s identities as accurately and efficiently as possible.
Remote access VPNs require centralized management .
Remote access VPNs require ahigh degree of scalability to handle the vast
number of remote users accessing the VPNs.

Two types of remote access VPNs is client-Initiated and Network access


server-initiated.
• Client-Initiated is remote users use clients to establish a secure tunnel across a
shared ISP Network to the enterprise.
• Network access server-initiated is remote users dial in to an ISP .
The NAS establishes a secure tunnel to the enterprise private Network that
might support multiple remote use-initiated sessions.

Site to site VPNs

A site to site VPN that connects all the computers at two site of the same
organization , usually using one VPN device at each site.
Site to site VPNs features are
• Facilitate secure communications between a company’s internal departments
and its branch offices.
• Requires strong data encryption to protect sensitive information.
• Must be reliable to ensure the prioritization of mission-critical applications.
• Must provide scalable management to accommodate rapidly growing numbers
of news users, new offices and new applications.

Extranet VPNs
A site to site VPN that connects all the computers at two site of different but
partnering organizations usually using one VPN device at each site.
Extranet VPN features are
• Extranet VPNs are between a company and its strategic partners, customers
and suppliers .
• Extranet VPNs require an open, standards-based solution to ensure
interoperability. The accepted stand for Internet-based VPNs is the Internet
protocol Security [ Ipsec] standard.

Virtual Private Network tunneling Protocol

Tunneling Protocol for VPN is

• Layer 2 Forwarding (L2F) -cisco


• Point to Point Tunneling protocol (PPTP) -Microsoft
• Layer 2 Tunneling Protocol (L2TP) -cisco & Microsoft
• Generic Routing Encapsulation(GRE) -cisco

You might also like