0% found this document useful (0 votes)
18 views42 pages

0 Network Fundamental

Uploaded by

moh bens
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views42 pages

0 Network Fundamental

Uploaded by

moh bens
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Introduction To CCNA 200-301

CCNA R&S, CCNP R&S, CCNP Sec, Fortinet Products,


PaloAlto, F5 Big_IP, CCTV, MCSA, TrendMicro, CEH, MPLS
Prepared by Eng. Hesham Ali
2 Network fundamental
TOPICS

Network Technology

Network components

Network Type

Protocols And rules

Reference Model
3
NETWORKING TECHNOLOGIES

 Network:
 Group of Device Connected together

 Importance of Networks:
 Easy access and sharing of information
 Resources (Printers)
 Modern Technologies (VOIP__IOT_Cloud_BYOD)
 Administration
 Monitoring

4
NETWORK TRENDS
RECENT TRENDS
The role of the network must adjust
and continually transform in order to be
able to keep up with new technologies
and end user devices as they
constantly come to the market.
Several new networking trends that
effect organizations and consumers:
 Bring Your Own Device (BYOD)
 Online collaboration
 Video communications
 Cloud computing

5
NETWORK TRENDS
BRING YOUR OWN
DEVICE
Bring Your Own Device (BYOD) allows
users to use their own devices giving them
more opportunities and greater flexibility.
BYOD allows end users to have the
freedom to use personal tools to access
information and communicate using their:
 Laptops
 Netbooks
 Tablets
 Smartphones
 E-readers
BYOD means any device, with any
ownership, used anywhere.

6
 Collaborate and work with others over the network on joint
projects.
 Collaboration tools including Cisco WebEx (shown in the figure)
gives users a way to instantly connect and interact.
 Collaboration is a very high priority for businesses and in
education.
 Cisco Webex Teams is a multifunctional collaboration tool.
 send instant messages
 post images
 post videos and links

NETWORK TRENDS
ONLINE COLLABORATION
7
Cloud computing allows us to store .Applications can also be accessed using the Cloud
personal files or backup our data on Allows businesses to deliver to any device anywhere
.in the world
.servers over the internet

Cloud computing is made possible Smaller companies that can’t afford their own data
centers, lease server and storage services from larger
.by data centers .data center organizations in the Cloud

NETWORK TRENDS
CLOUD COMPUTING
8
Four types of Clouds:
• Public Clouds
• Available to the general public
through a pay-per-use model or for
free.
• Private Clouds
NETWORK • Intended for a specific organization
or entity such as the government.
TRENDS • Hybrid Clouds
Made up of two or more Cloud types
CLOUD

– for example, part custom and part
public.
COMPUTING • Each part remains a distinctive
object but both are connected using
(CONT.) •
the same architecture.
Custom Clouds
• Built to meet the needs of a specific
industry, such as healthcare or
media.
• Can be private or public.
 Smart home technology is a
growing trend that allows
technology to be integrated into
every-day appliances which allows
them to interconnect with other
devices.
 Ovens might know what time to
cook a meal for you by
communicating with your calendar
on what time you are scheduled to
be home.
 Smart home technology is currently
being developed for all rooms within
a house.

NETWORK TRENDS
TECHNOLOGY TRENDS IN THE HOME
10
NETWORK COMPONENTS
 Network has three main components
 End Device :
 PC – laptops – printer – IP phone-Servers

 Network Devices
 - Devices that interconnect different computers together
 - ex: Repeaters, hub, bridge, switch, router, NIC, modems, AP, and Firewall

 Media
 - Media that physically connect the computers and network devices
 - ex: Wireless and cables

11
NETWORK TYPES
 LAN (Local Area Network):
 It is a group of network components that work
 within a small area

 MAN (Metropolitan Area Network):


 It is a group of LANs that are interconnected
 within the medium area

 WAN (Wide Area Network):


 It is a group of LANs that are interconnected
 within the large area

12
COMMON TYPES OF NETWORKS
Small Home Networks – connect a

NETWORKS OF MANY SIZES few computers to each other and the
Internet
• Small Office/Home Office – enables
computer within a home or remote
office to connect to a corporate
network

Small Home SOHO • Medium to Large Networks – many


locations with hundreds or
thousands of interconnected
computers
• World Wide Networks – connects
hundreds of millions of computers
world-wide – such as the internet
Medium/Large World Wide
PROTOCOLS AND
MODELS
Introduction to Networks
1 THE RULES

Cisco and/or its affiliates. All rights reserved. Cisco 2016 ©


Confidential 15
Networks can vary in size and
complexity. It is not enough to have a
connection, devices must agree on
“how” to communicate.

THE RULES There are three elements to any


communication:
COMMUNICATIONS  There will be a source (sender).

FUNDAMENTALS  There will be a destination (receiver).


 There will be a channel (media) that
provides for the path of
communications to occur.
THE RULES
Protocols must account for the
following requirements:

RULE
An identified sender and receiver
 Common language and grammar

ESTABLISHMEN
 Speed and timing of delivery
 Confirmation or acknowledgment

T
requirements
Common computer protocols must be in
agreement and include the following
requirements:
 Message encoding
 Message formatting and encapsulation
 Message size
 Message timing
 Message delivery options

THE RULES
NETWORK PROTOCOL
REQUIREMENTS
• Encoding is the process of converting
information into another acceptable form for
transmission.
• Decoding reverses this process to interpret
the information.

THE RULES
MESSAGE ENCODING
• When a message is sent, it must use a specific
format or structure.
• Message formats depend on the type of message
and the channel that is used to deliver the
message.

THE RULES
MESSAGE FORMATTING
AND ENCAPSULATION
Encoding between hosts must be in an
appropriate format for the medium.
 Messages sent across the network are
converted to bits
 The bits are encoded into a pattern of light,
sound, or electrical impulses.
 The destination host must decode the signals
to interpret the message.

THE RULES
MESSAGE SIZE
Message timing includes the following:
Flow Control – Manages the rate of data
transmission and defines how much information
can be sent and the speed at which it can be
delivered.
Response Timeout – Manages how long a device
THE RULES waits when it does not hear a reply from the
destination.
MESSAGE Access method - Determines when someone can
send a message.
TIMING  There may be various rules governing issues
like “collisions”. This is when more than one
device sends traffic at the same time and the
messages become corrupt.
 Some protocols are proactive and attempt to
prevent collisions; other protocols are reactive
and establish a recovery method after the
collision occurs.
Message delivery may one of the following
methods:
 Unicast – one to one communication
 Multicast – one to many, typically not all
 Broadcast – one to all

Note: Broadcasts are used in IPv4 networks, but


are not an option for IPv6. Later we will also see
“Anycast” as an additional delivery option for
IPv6.

THE RULES
MESSAGE DELIVERY
OPTIONS
• Documents may use the node icon , typically a circle, to represent all devices.
• The figure illustrates the use of the node icon for delivery options.

THE RULES
A NOTE ABOUT THE NODE ICON
2 PROTOCOLS

Cisco and/or its affiliates. All rights reserved. Cisco 2016 ©


Confidential 25
PROTOCOLS
NETWORK PROTOCOL
Protocol Type Description OVERVIEW
Network enable two or more devices to Network protocols define a common set of
rules.
Communications communicate over one or
more networks • Can be implemented on devices in:
 Software
Network Security secure data to provide  Hardware
authentication, data integrity,  Both
and data encryption • Protocols have their own:

Routing enable routers to exchange  Function


route information, compare  Format
path information, and select  Rules
best path
Service used for the automatic
Discovery detection of devices or
services
PROTOCOLS
PROTOCOL
Protocol Function INTERACTION
Hypertext  Governs the way a web server • Networks require the use of several
Transfer and a web client interact protocols.
Protocol (HTTP)  Defines content and format • Each protocol has its own function and
format.
Transmission  Manages the individual
Control Protocol conversations
(TCP)  Provides guaranteed delivery
 Manages flow control
Internet Delivers messages globally from
Protocol (IP) the sender to the receiver
Ethernet Delivers messages from one
NIC to another NIC on the
same Ethernet Local Area
Network (LAN)
PROTOCOL SUITES
TCP/IP COMMUNICATION PROCESS

• A web server encapsulating and • A client de-encapsulating the web


sending a web page to a client. page for the web browser
STANDARDS
ORGANIZATIONS
OPEN STANDARDS
Open standards encourage:
• interoperability
• competition
• innovation
Standards organizations are:
• vendor-neutral
• non-profit organizations
• established to develop and
promote the concept of open
standards.
REFERENCE MODELS

- describe data transfer standards


- a framework (guideline) for network implementation and
troubleshooting
- divides complex functions into simpler components
- Reference model types :
- OSI
- TCP/IP

30
REFERENCE MODELS

7 Application
6 Presentation Application
5 Session
4 Transport Transport
3 Network Internet
2 Data Link Network
1 Physical Access 31
THE OSI REFERENCE MODEL
transmission example

A
B

7 Application 7 Application
6 Presentation 6 Presentation
5 Session 5 Session
4 Transport 4 Transport
3 Network 3 Network
2 Data Link 2 Data Link
1 Physical 1 Physical

32
LAYER 7 - THE APPLICATION LAYER

7 Application This layer deal with


networking applications.
6 Presentation
5 Session Examples:
4 Transport  Email
 Web browsers
3 Network
2 Data Link PDU - User Data
1 Physical
33
LAYER 6 - THE PRESENTATION
LAYER
7 Application This layer is responsible
for presenting the data in
6 Presentation
the required format which
5 Session may include:
4 Transport  Encryption
 Compression
3 Network  Encoding
2 Data Link
PDU - Formatted Data
1 Physical
34
LAYER 5 - THE SESSION LAYER

7 Application This layer establishes,


manages, and terminates
6 Presentation
sessions between two
5 Session communicating hosts.
4 Transport
Example:
3 Network  Client Software
2 Data Link ( Used for logging in)

1 Physical PDU - Formatted Data


35
LAYER 4 - THE TRANSPORT LAYER

7 Application This layer breaks up the data


from the sending host and
6 Presentation
then reassembles it in the
5 Session receiver.
4 Transport
It also is used to insure
3 Network reliable data transport
2 Data Link across the network.
1 Physical
PDU - Segments
36
LAYER 3 - THE NETWORK LAYER

7 Application Sometimes referred to as the


“Cisco Layer”.
6 Presentation
5 Session Makes “Best Path
4 Transport Determination” decisions
based on logical addresses
3 Network (usually IP addresses).
2 Data Link
PDU - Packets
1 Physical
37
LAYER 2 - THE DATA LINK LAYER

7 Application This layer provides reliable


transit of data across a
6 Presentation
physical link.
5 Session
4 Transport Makes decisions based on
physical addresses (usually
3 Network MAC addresses).
2 Data Link
PDU - Frames
1 Physical
38
LAYER 1 - THE PHYSICAL LAYER
This is the physical media
7 Application through which the data,
6 Presentation represented as electronic
signals, is sent from the
5 Session
source host to the
4 Transport destination host.
3 Network
Examples:
2 Data Link  UTP
1 Physical  Coaxial (like cable TV)
 Fiber optic
39
PDU - Bits
ENCAPSULATION PROCESS

40
TCP/IP MODEL

7 Application
6 Presentation Application
5 Session
4 Transport Transport
3 Network Internet
2 Data Link Network
41
1 Physical Access
42

You might also like