CCNA by Todd Lammle ( PDFDrive ).pdf

5,259 views 152 slides Dec 29, 2022
Slide 1
Slide 1 of 152
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142
Slide 143
143
Slide 144
144
Slide 145
145
Slide 146
146
Slide 147
147
Slide 148
148
Slide 149
149
Slide 150
150
Slide 151
151
Slide 152
152

About This Presentation

hvj hkvhyrhfdyk


Slide Content

Advance Praise

“Todd methods of discussing topics are tactflly approached so the are mot confusing 10
the reader, and bis explanations are clear and easy to understand.
Amazon Reader Review

“1 passed my CCNA on the fist try after reading this book thoroughly. If yo read the
ook and do al the review questions and written lab at be end of each chapter, ou will
‘be well prepared forthe exam.

Amazon Reader Review

“This ia great book! Todd Lame has the ability to make complex topics simple. Cisco
‘books are essential once you've mastered networking basis, but there s nothing like Sybex
or learning he concepts from Ato 2."

amazon Reader Review

“Todd has been an authority this id fora long as can remember. His syle of writing
keeps the book from becoming lp aid and provides mus aná bots information thats ho
excelle real-world reference and directly relevant 10 exam objective. you are considering
taking he CCNA exam, ou old bo ll ads to not ive this book borough red.”

— Amazon Reader Review

“Thies the fie bok review Ihave ever writen on Amazon. ' e een nthe computerlnet-
work suppor field for many years, but had almost mo contact with Cisco equipment Iasi
cally knew the “enable and "config Cisco commands. Vad originally planned om shelling
out the 53000 1 take a CCNA boot camp, but decided that hat was way too much money
So I bought this book instead... took a week off from work whi [would have done any-
sway for the clas) and went ti» My homegrown boot camp pad of because I passed the
‘exam on the first try saving almost 529001
amazon Reader Review

“This isthe best technical book have ever read"
amazon Reader Review

“This book is excellent resource fr preparation for CCNA certification, It has needed infor
‘mation regarding the Cisco's objective. Sample test and Bonus Tes give extra knowledge for
‘exam’ question. Users have more knowledge and practice of test exams. wil recommend
this book for anyone who does not have any knowledge of CCNA material.”

— Amazon Reader Review

“ve recently passed the CCNA exam with 985 out of 1000 points and Todd Lames
book was my only study material (long with a Cisco 2500 router)

“cover all relevant topics in such am easy-to-understand way and gives you à grea et
working/Csco knowledge to build upon. Even now, while Im pursuing other certifications.
À serves as an replaceable reference. Every chapter concludes with review questions,
hhandson exercise o labs to give you the opportunity of applying your new stills real
world cenarios and the CD provides additonal sample tests and flashcards o consolidate
‘your knowledge.
“By reading the book twice and doing all the exercises you wil be able o answer ust about
“any question you may encounter on the exam. Highly recommended!”

Amazon Reader Review

‘had mado tree previous attempts using Cisco Press but could not get over the bmp
Needless o ay us geting prety discouraged, However, had heard good thins about
the Sybex book by Todd Lame and decided to give itty. I uns the best hing 1 could
Have done. The book read great and i explained the required concepts and topics very well.
‘The review questions and Hand-on Labs atthe end of each chapter were also very helpful.

“1 100k the test lst weekend and passed

“Thank youtt™
“Amazon Reader Review

“Good exam prep. [read this book and with only light network experience was able o pass
the CCNA.”

Amazon Reader Review

“There isn't much more | an say about ths ook than has already been sad. used Todd's
guide to help me pas the CCNA in 2000 amd am ni han again to recetfy. Just am excel.
lent book. Period.”

“amazon Reader Review

“This book covered everthing I needed to pass the exam, with hands-on experience and the
bonus material. What a great written book this is The best 1 have ever read.

recommend this book highly”
Amazon Reader Review

CCNA’:
Cisco? Certified
Network Associate

Study Guide
Sixth Edition

Todd Lammle

go Edt Je Keli
Diop Bar Tom Zar ck

Tec Eto Par Ca

dass Ebr Sah Go ems

Copy Hr nd Hoe

Vi Pen Excma Pe Rar Sway
rin amd acuso Js We

Med Poke Seno Lor Amon

a Delonte Joh Fk

Sa Quo Anu Ange Dee

Be ser Fang nd an
(Compost Cag Wendy Mage: TO ama
Ineo: Ni da

mana og Dos Rika Pci

CE Dee ya cd

pri © 2007 y Wik Pai ne nag, ira

Nop ft pb y be prod ordi roa yon wan yom ay any
‘mam don ecu ot Rene aman hr ce frm nk Soe
{Wr or tele enced Sans Copy hu cir pr sperms th Roo
{that hog pat pro pop ote Cpt Cam Cont 2 Roe
‘Dive Bane A925, 97870 SH a 979 ER I Regan othe Fler eme Sal
‘x bol the pl Dern Wy a Ic, 197 Cope nanan N AS
ASS CLS ont loo emanan

Litt bi Der Waray The bl ahr mak recone waren wih
‘onetime akan pea dati al wane a
‘Sth tn solos lr par pr Navas may beset eae yl
(otro wh nrg the par no ed ente, sn sp
Fea em pot aan all sl co Puna pn habe
Ne aii or deseo dl Eat ams ag hr Th ah ano
‘Stim or Waite reed th wk satan snr pol loe maca e et
nc tab ae ene hein hear Wee ay pee
ton moy mae Fare er sald sara bart Was cd wa ay ane
‘Sotelo desc wes wh we ar et an hon ed

Ferien cur peda anduvo por pl nuca me
Dear wn US 0) 2974 a he US STADE SO

‘Wis pubis tok in var fee foma Sm cnn tht pea rit may be
ri cuen ta

Libary ol Congres ang blica Dt avale rm th publ.

TRADEMARKS. Wi th Wi sad ho lem itr air hn
‘iy Soe ad al. Used ar and oder un may note el hat
‘itn emo. Ca CCNA rest ams Cs Sten Aller aera ee
pa of ie mprane ono Wy Fk I o ao ah any Pla senor

@WILEY

‘To Our Valued Readers:

“Thank you for looking to Sybex for your CCNA exam peep needs. We at Spex are proud
‘of our reparation For providing certifican candidates withthe practical Knowledge and
shill needed to succeed in the highly competiive IT marketplace. This test edition ofthe
et sling CCNA: Cisco Certified Network Associate Study Guide reflets our commit
ment to provide CCNA candidates with the mos uptodate, accurate, and accesible
insructional material onthe marke

Aswith previous editions, Todd and the editors have worked hard to ensure that the study
‘guide you hold in your hands is comprehensive, in-depth, and pedagogially sound. We're
«confident hat this book will exced the demanding standards of the certification marker
place and help you, the CCNA certification candidate, succeed in your endeavors

Asalways, our feedback i important 0 us. you believe you've identified an error inthe
book, pleas visite Customer Support section ofthe Wiley website. And if you have general
‘comments or suggestion, el fre to drop me aie dry at nedde@w' Tey com. At Sybex,
‘were ontimallysrivng to meet he needs individuals prparing fr cerifiction exams

Good luck in pursuit of your CCNA certificar

QOD

Neil dde
Pablisher—Certification
Sybex, an Imprin of Wiley

Acknowledgments

Monica Lam's writing syle and voice, iting abil, encouragement, and dedicacion to
ensuring that my books ate concise ye highly readable has been invaluable tothe success of
{his and many other projets She bing clarity and feo what can rly be some very arcane
and ul mate

‘Mr, Patrick Conlan has goto be the personification ofpersveranse—he' a rock! Patrick
Xica bashed and chashed each topic in this guide with me a al hours ofthe day and
ihr cruinzingehe material uni we both agreed was verify sold He as so ins
‘mental inthe development ofthis book hat I ied him a Global Training to work a a
Course developer and wine! You're going to be hearing lot more fom Me Conan ia the
‘echnical instruction and writing arena in the future for sur.

Daniel Aguera, who ha worked wth me at GlobalNet Training for even years ao
‘worked digna, helping me put together the bonus exams youl nd onthe CD (o be sure
vo gi him cali you happen vo ind a problem <G>). Dan posses both heilige.
nd opsinismeqeiredt be à pren sure of encouragement anda deep erie of problem
Solving ability whenever I found myself discouraged or burned out.

“Toni Zocearin Ackley was the main dior of tite newest book in the Sybex Cisco
serie, Thank you Ton for having the patience of Job, and fr working so hard on this book
‘vith me. Feo happy (ad lived) har you took on he jb and, mast ofall ha you dit
run sercaming from the room the next day!

lf Kells instrumental o my su inthe Cisco word and is my acquisins ao.
Jefshunksfor our guidance and continued patience. Although we wok weltogeiherand pur
‘out fantastic materia Lam suo he grans when he sex myname on alle ID!

In addition, Sarah Gro Palermo was anexcllt production cdtorandshe workedrealy
and to getthe Book done as quickly a possible, without mising the small mistakes tht ae
oca t ver look: Judy Fh was the copy editor nd she showed me that you on actualy
it a book and sil have patience, e helpful but yet work extemely hard o get this book
‘ut onthe selves as fas as posible and for ha I hank you tremendos: oth Sarah and
Judy worked very hard eng the book for what will opel tum ou 10 bea great pide
to kad you on you journey toward becoming a CCNA,

Finally a bigthanks co Craig Woods and Happenstance-Type-O-Rama,and che CD eam:
Laura Atkinson, Josh Frank, and Ange Denny

Contents at a Glance

Introduction Pr
Chapter 1 Internetworking 1
Chapter 2 Introduction to TCPIP o
Chapter 3 Subnetting, Variable Length Subnet Masks (VLSMel.and

‘Troubleshooting TCPIP m

Chapter 4 Cisco'sIntemetworting Operating System (OS) and

Security Device Manager (SOM) m
Chapter § Managing a Cisco Intemetwork 251
Chapter 6 IP Routing 327
Chapter 7 Enhanced IGRP (EIGRP) and Open Shortest Path

First (OSPF) ar
Chapter 8 Layer 2 Switching and Spanning Tree Protocol (STP) 493
Chapter 9 VinualLANS(VLANS) ss
Chapter 10 Security 603
Chapter 11 Network Address Translation (NAT) 689
Chapter 12 Cisco'sWirolos Technologies ma
Chapter 13. Internet Protocol Version 6 ve) 10
Chapter 14 Wide Area Networks m
Glossary as

Inder on

Table of Contents

Introduction Pr
Assessment Test sé
Chapter 1 Intometworking 1
Inerneeworking Basis 4
Internetworking Modes u
“The Layered Approach 2
Advantages of Reference Modes 2
‘The OSI Reference Mode 5
“The Application Layer 15
The Presentation Layer 16
‘The Sesion Layer 16
“The Transport Layer 16
The Network Layer 2
‘The Daa Link Layer 2
The Physical Layer 30
Fabre Neworking 3
Ha and ul Duplex Ethemet 5
Exerc at the Data Link Layer
there atthe Physi Layer 7
Estres Cabling »
‘Seaight Through Cable »
Cromover Cable so
Rolled Cable so
Data Encapslaion 8
‘The Cisco Thee Layer Hirarchical Model 46
The Core Layer #
‘The Dstebtion Layer a
‘The Aces Layer y
Summary »
Exam Eset »
Write Lab 1 5
Weiten Lab 1.1: 081 Questions si
Weiten Lab 1.2: Defining he OS Layers and Davis 52
Weiten Lab 13: Mentifing Collision and
Brondent Domains ss
Weiten Lab 1.4 Binary Decimal esadecial
Conversion 3
Review Questions s

Answers o Review Questions “

mi Table of Contents

Chapter

Answers ao Weiten Lab 1
Answer vo Weisen Lab 1.2
Answer to Weiten Lab 13
Answers o Weinen Lab 14

Introduction to TCPnP

TCM andthe DoD Model
‘The Process Application Layer Protocols
“The Hoste Host Layer Protocols
“The Interno Layer Protocols

I Addeesing
AP Terminology
The Hirarhical IP Addressing Scheme
Private IP Address

Broadcast Address

Exam Esencial

Weinen Lab 2

Review Questions

Answers o Review Questions

Answer to Weiten Lab 2

‘Subnetting, Variable Length Subnet Masks
(VLSMe), and Troubleshooting TCPAP.

Subneting Basis
TP Subnet Zero.
How to Greate Subnes
Sate Masks
Clases Ir Domain Routing (CIDR)
Sabnening Class € Address
Subnening Cas B Addreses
Subncting Claw A Address
Variable Length Subnet Mask (VLSMs)
VLSM Design
Implenentng VLSM Networks
Summariation
Troubleshooting IP Addresing
Determining IP Address Problems
Summary
Exam Exento
‘Written Labs à
Wien Lab 31: Weinen Subnet Paco #1
Weiten Lab 3.2: Weiten Sahne Practice
en Lab 3.3: Weinen Subnet Practice

ba

ns
1
147
150
18
157
iss
158
159
159

Table of Contents

Review Questions
Answers 0 Review Questions
Ames to Weiten Lab 3.1
[Anowers o Win Lab 32
“Answers Writen Lab 33

Gisco's Internetworking Operating System (108)
‘and Security Device Manager (SDM)

The 10S User Interface
‘Cisco Router 108
‘Connecting to a Cisco Router
Bringing Up Router
‘Command-Line trac (CLD
Emering the CL rom a Non-ISR Router
‘Overview of Router Modes
CL Prompss
ing and Help Features
Gathering Basic Routing Information
Router and Switch Administrative Configurations
Banners
Seting Passwords
Encrypting Your Passwords
Descriptions
Router ec
ringing Up an interface
‘Viewing, Saving, and Easing Configurations
Deleting the Configuration and Reloading the Router
Vesting Your Configuration
iso's Security Device Manager (SDM)
Exam Esencial
Write Lab 4
Hands-on Labs
Hands-on Lab 4.1: Logging int a Route
Hands on Lab 4.2 Using the Help and Edin Features
Hands on Lab 4.3 Saving Router Configuration
Hands-on Lab 44 Seng Your Passons
Hands-on Lab 4.5: Sing the Hostname, Descriptions
TP Address, and Clock Rate
Hands-on Lab 4.6 Iasalling SDM on Your Computer
Review Questions
Answers o Review Questions
“Answers to Writen Lab 4

161
166
169
169

sie Table of Contents

Chapter

Ing a Cisco Internetwork

‘Th Internal Components ofa Cisco Router
“The Router Boot Sequence
Managing Configuration Register
‘Understanding the Configuration Regier Bits
Checking the Current Configuration Register Value
Changing the Configuration Registr
Recovering Passwords
Boot System Commands
Hacking Up and Restoring he Cisco 10S
Verón Fash Memory
Backing Up the iso 108,
Restoring or Upgrading the Cisco Router 10S
Using the iso 1OS Fle System (Cisco IS)
Using the SDM to Manage the lash Memory
Backing Up and Restoring the Cisco Configuration
Backing Up the Cisco Router Configuration
Restoring the Ciso Router Configuration
Erasing the Configuration
Using the Cisco 108 Fil System to Manage Your
Router Configuration (Cie TFS)
Using the SDM o Back UpyRestore and Edit
the Routes Configuration
Using Caco Discovery Protocol (CDP)
‘Geng CDP Time and Holdsine Information
Gathering Neighbor Information
Gathering Interface Tras Information
Gathering Por and Interface Information
Documenting a Network Topology Using CDP
Using Tener
Teinetinginto Mulóple Device Simultaneously
Checking Telnet Connections
(Checking Telnet Users,
Closing Telnet Sessions
Using SDM to Tene ino Your Router
Resolving Hosnames
Building Host Table
Using DNS to Resolve Names
‘Checking Nework Connectivity and Troubleshooting
‘Using he ping Command
‘Using the raceronte Command
Debugsing
Using the show processes Command.
Summary

276
Ed

zu

250
2
2
zu
2
290
2
29s
27
27
27
2s
299
300
300
302
os
30s
307
308
310
au

Chapter

Fable of Contents

Exam Esencial
Write Lab $
Handeon Labs
Hands-on Lab 5.1 Baking Up Your Router 105
Hands-on Lab 5.2: Upgrading or Restoring
Your Router 108
Hands-on Lab 53: Backing Up the Router Configuration
Hands-on Lab 5.4 Using the Cinco Discovery
Protocol (CDP)
Hands-on Lab 55: Using Tener
Hands-on Lab 5.6: Resolving Hosmames
Review Questions
Answers o Review Questions
men to Weiten Lab $

1 Routing

Routing Basics
The IP Routing roces
“Testing Your IP Routing Understanding
Configuring IP Rousing
Configuring IP Routing in Our Newwork
‘State Routing
Default Routing
Dynami Routing
Routing Protocol Basics
Distance Vector Routing Protocols
Routing Loops
Routing Information Protocol (RIP)
RIP Timers
Configuring RIP Routing
‘Vesting the RIP Routing Tables
Configuring RIP Routing Example 2
Holding Down RIP Propogations
RIP Version 2 (v2)
Interior Gateway Routing Protocol (GRE)
‘Verifying Your Configurations
“The show ip protocols Command
‘The debug ip rip Command
Enabling RIPV2 on Our Internetwork
Summary
Exam Eset
Written Lab 6
Hands-on Labs
Hands-on Lab 6.1: Creating State Routes
Hands-on Lab 62: Configuring RIP Routing

su
33
33
EN

a
su

315

mi Table of Contents

Chapter

Review Questions
Answers to Review Questions
Answer to Weiten Lab 6

{Enhanced IGRP (EIGRP) and Open Shortest
Path First (OSPF)

EIGRP Features and Operation
Protocol Dependent Modules
Noghbor Dacovery
Relable Transport Protocol (RTP)
Difusing Update Algorithm (DUAL)

Using FIGRP to Support Large Networks
Mile Ases
VISM Suppor and Summaizaton
Route Discovery and Maintenance

Configuring EICRP
Corp
RI
Ra
RB
Redistibuting tothe 871W Router fom RS
Configuring Disontguous Nerworks

Load Balancing with EIGRP

Vesna EIGRP

‘Open Shortest Pah Fist (OSPF) Rass
OSPF Terminology
SPF Tre Caution

Configuring OSPE
Enabling OSPF
Configuring OSPE Aras
Configuring Our Network wth OSPF

Vesiying OSPF Configuration
“The show i ospf Command
‘The show ip sp database Command
“The show ip ospfimerace Command
“The show ip spl neighbor Command
“The ao ip protocols Command
Debugging OSPF

(OSPF DR and BDR Elections
Naghbors
Adjacencis
DR and BDR Elections

‘OSPF and Loopback Interfaces
Configuring Loopback Interfaces
OSPF ere Pires,

407
a
as

17

a
a
a
a
=
22
2
26
=
450
30
2
en
as
e
sas
se
450
453
47
ass
450

ar
42

a
466
167
469

Table of Contents

Troubeshoning OSPF

Configuring EIGRP and OSPF Summary Routes

Exam Esencial

Write Lab 7

Handvon Labs
Hands-on Lab 7.1: Configuring and Verifying EIGRP
Hands on Lab 7.2: Enabling the OSPF Process
Hands on Lab 73: Configuring OSPF Nesghbors
Hands on Lab 7.4 Verifying OSPF Operation
Hands on Lab 7.5: OSPF DR and BDR Hlecions

Review Questions

Answers o Review Questions

Answers to Write Lab 7

Layer 2 Switching and Spanning Troe
Protocol (STP)

Before Layer 2 Switching
Switching Services
Limitations of Layer 2 Switching
Begin vs LAN Sutching
The Switch Functions at Layer 2
Spanning Fe Protocol (STP)
‘Spanning Tre Terms
Spanning Tre Operations
Configuring Catalyse Suites
‘Catalyse Switch Configuration
Verifying Cisco Catal Switches
Cisco Network Assistant
Summary
Exam Eset
Written Lab 8
Review Questions
Answers to Review Questions
ones to Weiten Lab 8.1

Virtual LANs (VLANS)
VLAN Basis.

Broadcast Control

Security

Feb and cab
VLAN Memberships

See VLAN

Dynamic VLANS

mi

a
sn
e
7

8
7
$80
si
$82
2
si
ss
sn

494
97
99
Sos

507
si
sis
EN
5
sa
se
se
su
sas
sso

ss
Sst
EN
sss
58
5
589

mi Table of Contents

Chapter 10

ening VLANS
Frame Tagging
VLAN lntiteaton Methods
VLAN Trunking Protocol (VTP)
VIP Modes of Operation
VIP Pron
Routing between VLANS
‘Configuring VLANs
Assigning vih Pons o VLANS
Contiguring rank Ports
Configuring Inter VLAN Routing
Configuring VTP
"Troubleshooting VIP
‘Telephony: Configuring Voice VLANs
Conligrin the Voice VLAN
Configuring IP Phone Voice Traffic
Using the CNA to Configure VLANs and
Tate VLAN Routing
Summary
Exam Esencial
einen Lab 9
Review Questions
Answers Review Questions
Answer to Weinen Lab 91

‘Security

Perimeter, Firewall and Intemal Routers
Recognizing Security Theis
Mitigating Security Threats

(Go's 108 Frewal
Introduction to Acces Lis

‘Mitigating Sort suce with ACL
Standard Aces Lis

‘Wildcard Masking

Standard Assess Lis Example

Controlling VEY (Feine) Access
Extended Acces Lists

Extended Aces List Example 1

Extended Acces List Example 2
Adan Acces Lit

Named ACLs

Sith Por ACLS

Lock and Key (Dynamic ACLS)

Refleune ACLs

Time Red ACL

ss
ser
Se
se
so
ses
567
ses
sm
sn
so
ss
ss
57
sw

EN
7
598

oo
0s
507

u
sin
sis
eis
ss
620
a

as
or
e
62
om
636
ra
7

Chapter 11

Chapter 12

Table of Contents

Remarks
Context Based Access Control (Cisco 1OS Firewall)
Authentication Proxy

Monitoring Aces Lists

Configuring Aces List Using SDM
‘Creating ACLs with SDM
‘Creating Firewalls with SD

Summary

Exam Eset

Aérien Lab 101

Hand Labs
Hands-on Lab 10.1: Standard IP Access Lists
Hands-on Lab 10.2; Extended IP Ages Lists

Review Questions

Answers to Review Questions

‘Answers Writen Lab 10.1

[Network Address Translation (NAT)

‘When Do We Use NAT?
“Types of Network Address Translation.
NAT Names
How NAT Works
‘Static NAT Configuration
Dynamic NAT Configuration
PAT (Overloading! Configuration
Simple Verificación of NAT
Testing and Troubleshooting NAT
Configuring NAT on Our Internetwork
Configuring NAT Using SD
Sanur
Exam Eset
Werten Lab 11
Hands-on Labs
Lab 11.1: Preparing for NAT.
Lab 11.2: Configuring Dynamic NAT
Lab 113: Configuring PAT.
Review Questions
Answers to Review Questions
iones to Weiten Lab 11

Cisco's Wireless Technologies

Introduction o Wins Technology
“The 802.11 Standards
Comparing 802.11

u

os
eso
so
os
es

m Table of Contents

Chapter 13

Cao's Unified Wireless Solution
Sie MAC Architecture
MESH and EAP.
wer.
Wickes Sscuriy
Configuring Our Wireless ners
Summary
Exam Eset
‘Written Lab 12
Review Questions
Answer to Review Questions
Anwen vo Win Lab 12

Internet Protocol Version 6 (1Pve)

‘Why Do We Need 162
‘The Bene and Uses of 6
TP Addesing and Expressions
Shortened Expression
‘Address Types
Special Addresses
How ve Work na Internenwork
‘Autocoigurtion
Configuring Cisco Routers with V6
DHCNE
lemve
1P6 Routing Protocols
ile
EIGRP 6
Ost
Migatin o ss
Dual tacking
S04 Tunning
Naren
Configuring 1P6 on Our Intemerwork
Conigarin Ring
Configuring OSPEY3
Summary
Exam Exento
Wien Lab 13
Review Questions
Answers to Review Questions
Answers to Waite Lab 13.1

m
ns
76
ms
718
zu

70
zu
735
m

739

740
En

rs
En
74
746
746
747
748
749
750
as
as
2
78
754
7

76
766
767
768
m
m

Chapter 14

Table of Contents

Wide Area Networks

Introduction to Wide Area Networks
Defining WAN Terms
WAN Connection Types
WAN Support
Cable and DSL
Cable
Digital Subscribe Line (DSL)
‘Cabling the Serial Wide Area Network
‘Ser Transmision
Data Terminal Equipment and Data Communication
Equipment
High Level Data-Link Control (HDLC) Protocol
Poin Poi Protocol (PPP)
ink Control Protocol (LCP) Configuration Options
POP Sesion Establishment
POP Authorisation Methods
Configuring PPP on Cisco Routes
‘Configuring PPP Authentication
Vesithing PPP Encapsulation
POPOE Configuration
Frame Rly
Tnerodstion 10 Frame Relay Technology
Frame Rely Implementation and Monitoring
‘Using SDM for WAN Connections
‘Configuring PP with Authentication Using SDM
‘Configuring PPPOE with SDM
‘Configuring Frame Relay with SDM
Viral Private Networks
Introduction 10 Cisco LOS IIS
1PSce Transforms
‘Configuring VPNMAPScc Using the SOM
Summary
Exam Eset
Write Lab 14
Handkcon Labs
Hands-on Lab 14.1: Configuring PPP Encapsulation
and Authentication
Hands-on Lab 14.2: Configuring and
Monitoring HDLC
Hands-on Lab 14.3: Configuring Frame Relay
and Since

mi

ma

m
m

780
m
785

786
797
788
7
290
790

m
79

7
7
sos
su
su
ES
sa
ws
826
ns
ss
836
836
$7
$7

ss

so

il Tableof Contents

Review Questions
Answers to Review Questions
Answer to Weiten Lab 141

Glossary

Index

su
$47

on

Introduction

‘Welcome to the exciting word of Cisco certification! You have picked up this book because
yourwant something better—namelya beter job wth moe satisfaction Rest sured hat ou
have made a good decision. Caco ceriinion can help you et our rs networking job or
‘more money anda promotion i you are already in the id

Cisco certification can alto improve your understanding ofthe inemetworking of more
‘haa ast Cisco proces: You wil develop a complete understanding of ctorking and how
Alifernt nctwork topologies work together to form a network, This neil to very nt
‘working job andi the reason Cisco ceraio e in such high demand, even a companies
‘ith fw Clic devices

‘Cisco isthe king of outing switching, and scuäy. the Microsoft of he inerneoworking
word. The Cicocevications reach beyond the pope certains, such asthe MCSE, o
‘Provide you with an indispensible factor i understanding todays network —inightinto he
{isco worl ofinernenworking. By deciding that you want to become Cisco ce, you are
saying that you want to be the he best at outing andthe best at switching Ths book
A ad you in that icon.

For uptothe minuto updates covering addons or modiieations to the
(CENA coria exams as wal as atonal stay tol and review ques
tions to are vite Tod Lota forum endwebsteat mw Tame. con
andre yen co.

Cisco's Network Support Certifications

niall to scur the coveted Cisco CCIE certification, you took only one test andthe you
swore faced with the fextemaly dificult) handeon lab, an llr thing approach that made
‘rough to suce,

In response, Cisco created seis of now etificatons to help you gr he cover CCIE
as well a aid prospective employer in mensring levels, Wath then new certains,
‘which make ora beter approach to prparing fr tar alight lb, Coco opened doors hat
few wer allowed through befor,

M name Te

camps ins so on, ame con and/or. Taba IE, con

ir tntrodution

Cisco Certified Network Associate (CCNA)

‘The CCNA certification was ce fürs in the new line of Cisco certifications and was he pre
cursor toa current Cinco cricron, Now you ca become a Cinco Certified Network
Associate forthe meager cost ofthis hook and eter one ts at $150 or two test at SL2S
‘ach—although the CCNA exams ate extremely hard and cover lo of material, 0 you have
to ral know your suf Taking a ico css or spending month with lande on experience
is nor out ofthe nom.

“And ance pau have your CCNA, yu dont veto stop there—you can choos to comi
‘with your ui and achieve a higher certifico, called the Caco Cert Network Pro
sons (CCNP), Somone with a CCNP has al sls and knowledge he or she needs 10
tempt the Rowing and Switching OCH lab, Ba just becoming a CCNA can land you that
job youve dreamed about

Why Become a CCNA?

Cisco, not ulike Microsoft and Novell (Linux), has created the certification process to give
administrator 4 set of skills and to equip prospective employers witha way to mesure ils
or math ena criteria. Becoming a CCNA ea be the initial sp of succes journey
toward anew highly rewarding and sustainable ar

“The CCNA program wascrestedto provide a solid introduction notony tthe Co ner
serwork Operating System OS) and Cisco hardware, but lot internetworking in general,
making helpful to you im areas that are no exclusive isos. Ar thin pont in che rt
‘ation proces, t's aoe realite that network nanage-—even the without Caco equip
ment require Cisco ceifcatons for der job applica.

If you make i hrough the CCNA and are il terested in Cisco and internetworking,
voue head down a path to certain succes

What Skills Do You Need to Become a CCNA?
‘To meet the CCNA certification skill lvl, you must be able to understand or do the
following:

+ A GGNA cette profesional an install configure and operate LAN, WAN and wie
les acces services eure as well a troublahoot and configure salt medium ne
Works (500 nodes or ewer for peeformance

+ This knowledge includes, bu i ot inte o, use ofthese protocol IP, V6, EIGRP,
RIP, RV, OSPF serial connections, Frame Relay cable, DSL, PPPo
VLANs, Ethernet, security and acess st

Be sure and check my web sit andr Cies web it
(OENA objectives and ether Caco exams objectives and

fan change on a momants tice

How Do You Become a CCNA?
The way to become a CCNA ist pass one ite est (CCNA Compostcoxam 640-802) Then—
poofi—yuurea CCNA, (Dont you wit were hat ey?) Trc, it ean stone tt, bu you
Sl have o possess enough knowlalge o understand wha the ese writers ar saying.

However, Cisco has a two-step process that you can take in ode o become a CCNA that
may or may not be eier than taking one longer exam (ths book based on the one te
‘method 640-802) however, this book hasallhe information you need o pas alle cam

The two-step method involves pawing ie following
+ Exam 640.822 Inercomectng Cinco Networking Devices MICNDI)

+ Exam 640-816 Invoduction o Cisco Networking Devices 2 (ICND2)

{cant stes this enough Is crcl that you have some hands-on experince with Cisco
outers you can gt ahold of some 1881 0 2800 seis route, you et. Br i yu can,
ve worked hard to provide hundreds of configuration example throughout this boot he
network administrator (or people who want to become network administrators learn what
{hey nd know to pas the CCNA exam

Since he new 640-802 exam is 0 hard Cisco was 0 reward you for aking the wor ts
approach, Or soit ems Hf you take the ICNDI exam, you actualy resi a seriflanin
filled the CCENT (Cisco Certif Entry Networking Technician). Thi one step toward
our CCNA. To achieve your CCNA, you mus sil pas your IEND2 exam

“aim this hook was writen forthe CCNA 640 402 Composite exam „one oxam and you
your certification,

For iso Authored hands on raining wih CSI Tode Lamm, lease
sen gabalnetraning-con Each stant wl get hands-on experience by

“iturin teat te router and te anto = sharing eq ment

What Does This Book Cover?

This book covers everything younsed to know in order o pass the CCNA 640-502 exam.
However, aking the time to stad and practice with outers ora router simulator i the
seal key to success.
‘Yu wil earn the following informacion in this book
+ Chapter 1 introduces you 0 internerworkng. You will am the basis ofthe Open ys
{ere Imeronnecion (OS!) model the way Cisco wants yout lam theme nro
ingandstandard are dscusein dealin hi chapter as well, Tere are write abs and
Plenty of review questions to help you. Do nor skip th writen bs inthis chapter

+ Chaper2 provides you wit he background necsar for success on the exam a wellas
inthe eal world by dico TCPAP. This in-depth chapter covers he very egimnings
‘of the Internet Protocol sack and then goes al he way to IP addressing and understand:
ing he difference berwcen a network address and a broadcast address beor finally
ending with nenworktoubleshootng

mi Invocación

+ Chapter introduces you to subnet. Youwllbeableo subnets networkin your head
afer eading this chape. In addition, youl sen about Variable Length Subnet Masks
(VISA) and howto design a network sing VSM. This chapter wil finish with um
‘marzatonvchnigus and configurations, Plenty of hp ound in his chaptr if you do
ot skip the Wien Lab and Review Questions

+ Chapter inroduces yourothe Cisco Iternetwock Operating System (108) andcommand-
lineintefae (CLD. I thichaperyou willeam how totum on a soterand configure the
hanes of he 1S, sadn tin pasword bannen, and more IP configuration sing
the Secure Device Manager SDM wl he discuss and Hands-on Las wll help ou gain
fm rasp ofthe concepts taught in the chapter. Before you o through the Hands-on
Tabs he sure 1 complet the Weiten Lab and Review Questions

+ Chapter providsyow withthe management sil needed to na Cisco OS network Back
ingup and restringe 10S, as wea roue configuration, score, a are the oube-
shooting to necenary to keep newer and running. Before peering the Hand on
Labs his chapter complete the Weiten Lab and Review Question.

+ Chapter 6 eaches you abou IP routing. This isa fan chapter, because you wil begin to
bald your network, ad IP address, and route data betwee routers. You wll ako lara
about stati, default, and dynamic outing using RIP and IDV? (with a mal such of
GRP). Weiten and Hands-on Labs wll hp you understand IP routing to he fle.

+ Chapter 7 dives ino more complex dynamic touting with Enhanced IGRP and OSPF
routing. The Wien Lab, Hands-on Labs, and Review Questions wil help you maser
thes outing protocol.

Chapter gives ou a background on ayer? switching and how switches perform ares
leaning and make forwarding ad fiteing decisions, Nerwork loops and how to avoid
them withthe Spanning Tre Protocol (STP) will be discussed as wel she 802.1 STP
version. Gothrough he Weiten Lab and Review Questions t hp you really understand
the bass layer 2 switching on a inernewor

+ Chapter 9 cover ial LANs and how you an we them in your memerwork. This
‘chapter alo covers the nity ty of VLANs and the different concepts and protocol
‘sd with VLANs, as wells toublshootng. The Weiten Lab and Review Questions
will enforce the VLAN materi

+ Chapter 10 covers security and aces ss which are created on outers ter the network,
Panda, extended, ad named ae ins are covered in det Weiten and Hands on
Labs alongwith Reiew Question will you study for he cui ndash portion
‘ofthe OCNA Componte exam.

+ Chapter 11 covers Network Address Translation (NAT), This chapter has ben onthe
Spex website fra few years as an update to my last CCNA hook, but updated i and
Add io this edition, New information commands, troublehooting, nd abs wil hp
ou nl the NATCCNA objectives

+ Chapter 12 covers wires technologies. This an introductory chapter regarding wie-
lestechnoogin as Caco cs thr, However Labo addedsomeadvaneed wes opio
thar cover iso's newest gar. A this tine vanced witless is or covered within the
Cisco CCNA objectives, but thatcan chang on any given day. Make sre you understand

Introduction exh

Your hase wireless technologies lik access pints and lets, a well asthe difference
Kerween 802.113, and

+ Chapter 13 covers M6. This sa fan chapter and has some gres information. IN ino th
bi Bad sary monster hat mos people thinks. san bjt on his new exam so
say this chapter cael Keep an ye ou at lamcom or ate breaking updaten.

+ Chapter contrats on Caco wide area network (WAN) protocol This chaptercoven
HDLC, PPP and Fame Rely indepth as wells eter protocols we we ona daly ass
like Cable, BSL apd PPPoE. You must be profit inal hee protocol obere
‘onthe CCNA exam. Do not skip the Weiten Lab, Review Question, or Hands. Labs
Found in is chap.

How to Use This Book

you want soll foundation forthe serious ort of preparing forthe Cisco Cee Nework
Associate (CCNA Composite) 640.802 exam, hen lok o fre. have per hundreds of
our porting tor this bock wth he ole Intention o ping ou to pase the CCNA exam
nd Teen how configure Cisco router and switches among hundreds of ther hing).
“This bok is loaded with able infomation, and you vil che mos ou of your tia
‘ime iyo understand how ut he book wer,
"To best benefit om this Book, | commend the following study method

1. Tabetheassessmenttest immedi following this introduction. (Theanswersare atthe
cn of the test) fs okay if you dont know any of the answers; that i hy you Bought
this book Caray red over he explanations for any question you get wrongand ote
‘the haptrsin which the materi covered This information should lp you pan your
‘dy strategy. Honey, my recommendation st jus star reading rom Chapter and
‘don't top unl yout al the way through Chapter 14.

2. Study cach chaperarflly making sre that you filly understand be information and
etes objectives ltd at the begining ofeach one. Pay extra clos tention o any
‘haptr that includes material covered in questions you missed inthe assessment rst.

3 Completecach Wren Lab atthe end ofeach chaper. Domo skip hese writen exeres
Because they direct relat tothe CCNA Compote objectives and what you must glean
from the chapters in which they appear Do nor js skin these labs! Make sue you
understand completly the reason fr ich answer

44 CompletallHands on Labs in the chapter (otal chapters have and on abs refering
tothe text ofthe chaprerso that you understand the reson for each step you take you
¿o othaveCicocquipmen available, tomn.routersin.comfora outer simulator
‘that will coveral he hand labs needed fr all your Caco serian neds

5. Answerallofthe Review Questions elated tach shaper. The answers appear atthe nd
‘ofthe chapters} Note he questions that cos you and study hos sections ofthe book
‘esi, Do nor js akin these questions! Make sure you understand completely thereon
foreach answer. Remember tha these wilnot be the exit questions you find on he exam
they are weten o hep you understand the chapter materi

svi invocación

6. Tey your hand tthe ons exam that ar ichs o the companion CD. The questions
in thee exams appear only onthe CD, Check out Tame com for more Cisco exam
prep questions The quenions ound tur. lamsle.com willbe updated atleast monthly,
or wecly even di Before you take you tt, hesure and is my Web sit for gue
tion, video, ados and other uch information.

2. Also onthe companion CD ithe fst module from my complete CCNA vido seis,
‘which covers intertworking and asc networking, This cial forthe CCNA exam.
In addition, as an added bou Ihave included an audo son from my CCNA audio
program. Do not skip the video and audi seco

jotetyouknow that mention he test number 4080 in th video
cone Theis nothing be concern bout o information

8. Testyoursfusingallche flashcards onthe CD. These are brand new and update ash
«ard programs to hp you prepare forthe CCNA exam. These are a great sty oot

o ear every bi ofthe material covered inthis book, pou have wo apply yourself eg
lay and with discipline, Try o sr aide the same time prod every ay o study and select
a comfonable and ui plage to dose, you work hard you wil be surprised at how quickly
Jon lean ths mate.

fou follow the tps Ted above and rel study and practice he Review Questions,
hon exams, the Todd Lanne idofaudi sections and he lame bear, a el as
lb Wisin and Hands on Labs ie would be had failthe CCNA Composite exam, How
‘er, studying or he CCNA exam slik ing 0 get in shape you do nor gov the gym
Sry day, you wort gti shape

What's on the CD?

‘We worked hardo provide some ely gen tolsto help you with your certification process.
Alf the following tos shouldbe ended on yur workstation when your studying for the
test Asa (ata bona, was abe co add seston from both my CCNA vide and ado
seres tothe CD included wich this ook

‘The Sybex Test Preparation Software

“The test preparation software prepars you 0 pass he CCNA exam. In his est engine, you
il fin ll the review ad animent questions rom the boo, plo two adional bonus
Sams that appear exclsively on the CD.

Electronic Flashcards for PC, Pocket PC, and Palm Devices
To prepare forthe exam, you can read this book, study the Review Questions atthe end of
sch chapter, and werk through he practic exam included in he book and on the comp
ion CD. But wai there more! Youcan abo est yourself with he shears included on the

Introduction ake

(CD. you can gt through these fu questions and understand the answers, youll know
our ready forthe CCNA exam,

The flashcards include over 250 questions specifically writen o hit you hard and make
sure jou are ready fr the exam. Between the review questions, bonus exams, and flashcards
‘onthe CD, youl be more than prepared forthe exam

CCNA: Cisco Certified Network Associate Study Gi PDF

Sybex offers he CCNA Exam 640-802 Study Guide in PDF on the CD so you can rad the
book on your PC o laptop. (Acrobat Reader 7 i also included onthe CD)

Todd Lammie Videos
{have created full CCNA seis of videos that an be pushased in cbr DVD or down
loadable format. However, a a bons included with his book, the First module ofthis series
is included onthe CD in ts etry. Te video à ver ome hour of informative CCNA infor
‘maton. This isa $149 value Do not skipthis video aitcoverstheinerneworkingobjectives,
‘which are very important othe CCNA exam

Todd Lammle Audios

Inacio tthe videos included for fe on he CD, have ss inca fl section from
my CCNA audi seis, The CCNA audi seis is $199 value This a gest tool toad o
‘sour arsenal of study material to help you pas the CCNA exam.

ee

OL lan ee mur. lame And wel you's er. up ony

Forum. Tor is lot of sul information tat an found inthe four, ls
ocn ext me questions cl related your as.

Where Do You Take the Exams?

You may take the CCNA Composite exam a any Person VUE authorized tsi
(ove. conor cll 377-404 EXAM (3926)
To regir ora Cheo Ceti Network Associate exam

1. Determine the number ofthe exam you wat to take, (The CCNA Composite exam
‘number 640-802.)

2. Register withthe nearest Pearson VUE ring center. At thi point, pou will be atk to
payin advance for he exam At the ine ofthis wein, the exam $150 and must be
taken within one yea of payment. You enschede exams up six weeks in advance or
es ae the sn day you want ote rbot you fila ico exam, you sus walt
five days before you willbe allowed ro retake the exam, something comes up and you
med cancel o schedule your exam appointment, contact Prometric or Pearson VU
at leat 24 hour in advance

x Invodución

3. When you schedule she exam, you insruchons regarding all ppoinument and cancch
lation procedures the ID requirements and information abou th testing. ete location

Tips for Taking Your CCNA Composite Exam

The CCNA Compost exam et contains about 55 to 60 questions and must be completed
in 751090 minute or les This information can change por exam. You must get sore of
hour 85% to pas his exam, but again, uch exam can be diferent.

Mary queens on the exam ha answer choi tht at fr lance look dela
setas questions! Remember read through th choice carly case clone docs cat
Ifyou get commands inthe wrong order e forge one mas character, youl ge ih question
‘wrong o, to practic, Jo the handvon exerci the end of th books chapter ner andoner
ga an hey fe tral oyo

"co never forge hat he righ answers the Cisco answer. In many caes mor han one
appropriate nsweri presented, ur the com amoo ithe one that Caco recommends. O
le exam, yout always arte to pick one, uo, ae thre, never “choose al that appl.”
The CCNA Composite 640402 exam may include the following ct forma
+ Moliplechoice single answer

+ Mulilehoice multiple answer
+ Dragan drop
+ Fillinhe lank
+ Route simulations

In addition to multiple choice ad fin response questions, Cisco Career Cerificaione
exam may include performance simulation exam em

Check out the software at mu. routersin-cam ha lts you design and configure an
cited br of iso ours and swiche running male song protocol

The sofware on the CD and at Route im.com provides step by step instruction on how
configure both Cisco routers and switches However, router simulations in Cisco proctor
‘xan lla show the test follow in completing a router interface configuration. They do
Glow partial command responses For example, show config ur sho contig sh conf woul
he aecepable Router#show ip protocol ur router#show ip prot woul be aceptable.

Here are some general tips for exam acces:

+ Arrive aya the exam center so you ea relax and review your dy materials

+ Read he questions corel, Don’ amp toconcasions. Make sre you'r clear about
exactly what cach question sks,

+ When answering mate choice questions that you're os sure about, use the proces of
limination to gti ofthe obviously incorect answers fist. Doing tis gray improves
our odds if you need 1 make an edacatl ges

+ You can no longer move forward and backward though the Cisco exams so double
check your answer before clicking Next since you can change your mind.

Introduction mi

Alter you complete an exam, you'll ger immedit, online oricaton of your paso al
status a printed Examination Score Report that indicates your pass or il stats, and your
exam ests by section. (The et administrator wil give you the printed core report) Tet
‘cores are automaticaly forward to Co within ve working day after you ake thet,
Soyou don'tnced to send yourscor to them. ou pass the exam yu recive confirmation
ram Cisco, typical within two to four eco, sometimes longer

How to Contact the Author

‘You cn cach Todd Lammie tough his forum at mer. amm e.con.

Assessment Test

at protocol docs PPP wes dni the Network ye proc?
a ner
e. mic
Dic

2. You have 10 users plgged nt a hub running 1OMbpshlfduple. There ser

rected othe switch runing 10Mps hal duplex as well, How much bandwidth oes each

A. 1006p
8. Mbps
©. 2Mips
D. 10Mbps
3 Ina neowrk with dozen of switches, how many rot bios woul you hae?
ai
82
es
on

4. Wat docs he command routerCcanFig)# ne cons allow you to perform nex?
A Sa te Telas pasword
©. Shut dow the router
©. Se your sone pasord
D. Disable console conection
5. How longis an V6 ables?
ETS
8. 128 byes
©. tie
& hat PP protocol pride dynamic adding hen, and mink?
ANC
8. HDLC
cr
D. x2

sav Assessment Test

2 at command wil play he inc, protocol, DLCH and LM information of nitro?
Ash me
B. chow interface
son frane-relay pve
D. sho rum
8. Which ofthe allowing the ad ost ange forthe sun om which the Padres
192,168 168.188 259255 25192 wake?
A. 192:168.68.129-190
B. 192.168.168.129-191,
G 192:168:168.125-190
D. 192.168.168.128-192

9. What dos he passive command provide to drnami oi roca?
A. Stops animes from sein e rcivin er dynamic pats
B. Stopsan ierface from ending pride dynamic updates hu not rom ecving pes
©. Sopsche ou from sing any ami updates
D. Stops he roter ram sending any dynamic upaes
10. Which protocol dos Ping uch
are
8. ARP
G cu
D. Boot?

1, How many colision domaine are created when you ment a enwock with 12-por sich?
AL
82
Os
on
12. Which ofthe following commande il al put e our Tenet paswordona Cote?
AL Vine telnet 0 4
B. Tine aux 0 4
©. tne vty 0 4
D. tine cono
1, Which router command allows ot view the emit contents fal aces it?
AL show all access-145ts
B. show access-1ists
Ca show ip interface
D. show interface

‘Assessment Test oo

14 What doc a VIAN do?
AL Ac sac por a eine
E. Provide maple colision domains on ne sich port
©. Breaks up rondes domain a layer switch ineracework
D. Provides male roads domains within single coli domain

15. Ifyou wanted o delete the configuracion sol in NVRAM, what ou ou spe?
B. erase moran
©. delete nvran
D erase running
18. Which prococol is use o send a destination network unknown message back o originar
ing hoe?
are
8 ARP
G ca
D. Boos?
1. Which lu fades has he mnt hos resis vale by defo?
AA
on
ae
D. Aand 8
18. How often ae BPDUS sent from a layer? deve?
A. Nowe
B. Every 2 condo
©. Every 10 minutes
Every 30 seconds
18. Which one ote following ue reading VEAN
A Two VLANS ar configure by default o ll Cisco stos

B. VLANs only work you have complete Cisco switched intencwork. No offbrand
she ar alowed

©. You shoul not have more an 10 switches inthe sme VTP domain.
D. VIP suid to send VLAN infomation to sitchen configure VTP domain.
20. Which WLAN IEEE action allows upto S4MBps at ACH}
AN
on
06
>

som Assessment Test

2%. How many bras domain as crated when you segue anton wih Lt
ai
cs
on
22. What favor of Network Ales Translation can Be se o ave one IP ads low many
es to connect oe lola nene
A NAT
8. Sic
©. Dynamic
D rar
28. What protools are wet configure nin ona sick? (Choos wo.)
A VIAN Trunkin Protocol
8 VIAN
©. 02.19
24. What ica sa nee
A Ancnwork with more han on eit pine
B. A network with more than one eit nd entry point
Amero wih only one ete and o eit pint
D. A nctwork thats nly one entry andá pin

25, Wherein hab soci he OS mods?
A. Seton taper
B. Physical layer
©, Dita Link hie
D. Aplicacion ayer
28. What ree main eps of acess conto ists (ACTS?
A Sanda
8. IEEE
©. Extended
D Special
22. To back ypan 0S, what command will you?
A. backup 105 disk
B copy dos eft
Ca copy tftp flash
D. copy flash eft

‘Assessment Test di

‘What commands wed o ce a backup configuracion?
A copy running backup

©. config nen

Do we men

‘Whats he main non the OS model was cect?

A Tor a layer mode ler han the DoD mode

B. So appicain developers can change only oe bye protocols a time
©. So diferent ono ould commune

D. So Cisco cout us the model

Which protocol docs DHCP ne athe Trampor layer?
A

8 rœ
o vor
D. ARP

your router lit a CSUDSU, which ofthe allowing commands do youncedt ne
10 provide the our wa 6400p ial ik?

AL RouterA(config) bandwidth 64
B. RouterA(config-f)bandideh 64000
©. Routeralconfig)rclockrate 64000
D. RouterACconfig-iPaciock rate 64
E Routeralconfig-ifnclock rate 61000

Which command is sed to determine Fan I cs lis enabled na particles?
AL show access-Iists

B. show interface

©. show ip interface

D. show interface access-tésts

‘Which command is sed to upgrade an 1OS on a Co router?

AL copy tftp run

B copy tftp start

©. contig net

D. copy wtp flash

oi Answersto Assessment Test

Answers to Assessment Test

1. AL Network Control Protocol ie help ide the Nek layer protocol sein
put Se Chapter 14 for more inform.

2. D. Each has 10Mpls to he ever. See Chapter 8 fr more informacion.
A. ou should hae only one oot bride pr network See Chapter 8 or more information.

4G, The command Mine console places you at a pomp whe you a he set your con
sole eemade password. Se per or more information.

SD. AntPv6adirsis 128 bes long compaedeoan ares which only 32 long.
See Chapter 13 for more information

6 C. Link Control Protocol ia the PPP sack provides dynamic adirsing suben and
mink, Se Chapter 4 fe mor information,

2. The show interface command shows he ine, poco
An ira. See Chapter 14 for more information

& A. 266-1922 64.64 64 2 128,128» 64= 192. The subnsis 18, roads ine
15191, andre valid hos range th numbesin between o 128-190. See Chapter 3 for more
informacion

LCI and LMI infomation of

9B Thepassivecommand, short forpassive- interface, stops regulares rom being
‘ov ouate However, he ira cal cv updaten Sr Chapter 6 or mor
informacion

10. €. 1CMPishe protocol athe Network aye tar usd send eho requests and rel
Se Care 2 for mor information

1M. D. Layer 2vicin rindi colon domain Se Cape or morinkomanon.

12 €. The command Vine vty 04 places youn a ramp chat wil allow yout set or change
ou Te password Se Caper for mor formation,

12 8. To ethe comen fa age li the show access-16ss command, Se Chapter 10
fer more cena

14 C VLANs eek up boa domi at yer, Ss Chap 9 for more information.

15. A. Thecommand erase startup-config des he coaigraton sorlin NVRAM.
SceChaper fo mor information.

16. €. 1CMPisthe protocol athe Network aer thas used send mesg back ton
‘fgg router See Cape 2 for mor information,

MR A. Chass adri prove 24 bi for hadron, See Chapter 3 for more information.

BB. Every 2 seconds PDU are sen ou fom allie bide port hy deb Se Chapter 7
firms inion.

Answer to Assessment Test sank

D. Switches donot propagate VLAN information by fault you mus conigar the VTP
domain. VLAN Traing Protocol (VTP sel propagate VLAN information ato
trunk ink See Cape for more information

LC HEEE 802.1186 2 Gr byt witha maximum of ly 11 Mbps IEEE 802.116 in he
2 AG range, with op ced of EM ee Chapter 12 fr more infomation

A. By dba, sitos break up coin domains hut are one lege broadcast domain See
“Chapter for more information

D. Poet Ares Translation PAT allows onco-many approche address
Han. See Chapt 1 fr more information.

C.D. Vitis nor ight because ha nothing do wich ruin except eat sens VLAN
information across trunk ink. 802. 1Q and SL ewe wo configure wunkingon or. See
Capa lo mor formation.

D. Stub meros have only one connection to a nemo, Only deal routes can be
scons subbnework or network loop may esc See Chap 7 or more information.

Hubs regenerate cal ral, which ae specifi tthe Physical layer. Se Chapter 1
ferme lore.

A.C. Stndaedandewende ssscota ss(ACLs ac scho confuses ona otr
Se Cape 10 for more information

D. The command copy flash tftp vil prompt yout back up a exiting 10S in ash v0
2 TFTP hore. Se Chapter Sor more nome

E. The command to hack wp the configuration on a outer copy running- config
startup-config Se Chapter § for mor information.

©. The primary awn ch OS mod watcrete vas so that diferent nor coser
‘operate See Chapter | for mare infomation.

LC. Us Dog Peso conection network ei dhe Taper lagers an
DHCP nes ih connection semis, See Chapter 2 for moe informan

E, The clock rate command i two word the ped oftheineisin bp. se Chapter 4
Kor me information.

©. The on p interface command wil show you any outound inbound interfaces
have ec int See Chapter 10 fr mare formation.

D. The copy tftp Flash command laces new fein ash memory, which the eat
[ation fr he Caco 108 in Co ones Sr Chapter 9 for more titan,

Internetworking

THE CCNA EXAM TOPICS COVERED IN THIS
CHAPTER INCLUDE THE FOLLOWING:

¥ Describe how a network works
+ Describe the purpose and functions of various network

devices.

+ Select he components required to meet a network
specification

+ Use the OSI and TCPAP models and their associated

protocol to explain how data flows in à network
= Describe common networked applications including
‘web applications

+ Describe the purpose and basic operation of the
protocols in the OSI and TCP models

+ Describe the impact of application (Vol Over IP and
Video Over IP) ona network
Interpret network diagrams

+ Describa the components required for network and
Internet communications
+ Identity and correct common network problems at layers
1,2,3and 7 using a layered model approach
+ Differentiate borweon LANWAN operation and features
Configure, verity and troubleshoot a switch with VLANs and
Interewiteh communications
+ Select the appropriate media, cables, ports, and
connectors to connect switches1 thor network devices
and hosts
+ Explainthe technology and media access controlmethod
for Ethernet networks

+ Explain network so
management concepts

tation and basic waffe

X Implement an IP addressing scheme andiP Services to moet
network requirements ina medium-size Enterprise branch
‘office network
— + Explain the operation and benefits of using DHCP and ONS.
Y Configure, verity and troubleshoot basic router operation
‘and routing on Cisco devices
bles, ports, and
‘other network devices

and hosts

Welcome 1 the exiting word fintenenworking. This fist
+ chapter wi call help you understand the basis of inte
a= ¡working by focusing on howto connect networks together using
Cisco router and switches Fs, yo need to kno exactly what an interno ight?
You createaniternetwork when you connect two or more LANs or WANS va à route and
configure a logical nework addressing scheme with a protocol such as IP

Tbe covering these our topics hs chapter:

Intenerworking basis
Network segmentation
How bridges suche, and routes a sed to physically segment a network

How outers ae employed to rate an internet work

Fm also going to dt the Open Systems Interconnection (OS) model and describe
achat on dei ane you real eed god grap o for he oi found
‘ion oui ud our neworkng Lnowledge upon. The OS! mode! hs even herria
lagers that were declopedo enable diferent acworks o communicne cha} beneen
disparate systems Since this bok centring upon st ths CCNA, ls ceca or
ont understand the OS models Caco scsi ar Ro ibe resenting he seen
Tier you

"Since here area busch of different types of devices specified at the different layers of the
(st meh 1 ala very impor vo understand the many pe of able and connectors
toed for comeing ell tore dvs toa network Well o oro cabling Caco device de
iaghow tconnect wa ono sich (along wh Eher LAN technologie) snd even
owes cons a ote er sich wih console once.

"Well nthe cheer by dicos the thee layer hierarchical model hat was dele
oy Cico wo lp you ds implement, and roublahoorinenetworks

‘Mier you in reading ischapr,jouHenenaner 20 review guess and four writen
ie Than yon oral ok beicon rem dape o our remo.
Soda skip den!

‘Tofinduptotho mini ut forth chat loose com
dor wm syborcom

4 cn

+ ntornonworking

Internetworking Basics

Before we explore internetworking modes ad the specifications of the OS reference model,
you've gor vo understand the bi pictur and lam the answer 1 he key question, Why sit
do imponane to earn Cac imernenmarkirg?

Networks and networking hive grown exponentially over the as 15 ears—understandbly
so. They ve had ro evolve at ight sped jst 0 Keep up with hug increases in Bas mision»
es ser needs such a sharing data and pines a well sore adrancod demanda such as
videoconferencia Unlesseveryone who needs sharenetwork esouresislcatediathe same
‘fice are (an increasingly uncommon station), the challenge so connect the somtimes
‘many releva networks togethers all srs share the networks wealth

‘Staring witha look a Figure 1.1, you gta picture ofa basic LAN network that's con
ected together ing a hub. This network all one colision domain and one broadest
¿main but mo worries if you ave no sda what this means because Tin going to ak about
oi colisio and broadcast domains so much throughout this whole chape, youl probably

cen deca about them!

FIGURE 1.1 Thobasicnatwork

ee

=

ar

nase tone dev se man,
‘eterno ne eta es).
Te RC sy ran oH SS.

(Okay, abou Figure 1.1. How would you say the PC namol Bob communicates withthe
PC named Sally? Well they're both onthe same LAN connected with a multipot repeat a
hub) So does Bob just end outa data message, “Hey Sally you here?" or dos Bob use all's
addres andput things more like," Hey 192-168. ate youther?” Hopeuly you picked
the IP addres option, but even if you dd, the news is il bad—both answer are wrong!
‘Why? Because Bob actualy going cous Sal's MAC address (known ae hardware
ares, which is bord ight no he network cardo als PC, to get hold of her
‘Great, but how does Bob ge Sal MAC addres since Bob knows only Sally's mane and
docs even have her addres ye? Bob is going to start with name resolution (hostname o

Iemetworking Bases #

IP ads resolution) something that’s usual accomplished using Domain Name Service
DNS) And of nos these o ar onthe same LAN, Bob can js broadcast Sally asking
herfor he information (no DNS needed welcome to Micro Windows (Vita included

eres an output from a network analyzer depicig simple name eolution proces om
Bobo Salle

Tine Surce Destination Protocol Info
53.892794 192.168.0.2 192.168.0.255 NS. ame query MB SALLYCOO>

As already mentioned, since the two hosts ate on a local LAN, Windows (Bob) wil just
randcast to resolve the name Sally (he destination 192.168.055 isa broadcast addres).
Lees take lok a the rex of he information:

FthermetII,Srcs192.168,0.2(00:14:2:b0:18:30),Dst

‘What his ourpu shows is that Bob knows his own MAC address and soe IP adress but
or Sal IP address or MAC address s Bob ends broadcast address ofall forthe MAC
res (a Data Link layer broadcast and an IP LAN broadcast o 192.168.0255, Ain,
‘don’ freak—you'te going to am all about broadcas in Chapter 3, “Subneting, Variable
Length Subnet Masks (VESMS) and Troubleshooting TCPMP-”

clore the name soled theft thing Bob has todo is broadcast on the LAN to ge
Sally's MAC addres so he cn communicate to ee PC and resolve her name oan IP adds

roca (FRASER FEED,

Tine Source Destination Protocol Info
5.153054 192.168.0.2 Broadcast ARP Mo has 192.164.0.37 Tel] 192.168.0.2

Nes check ou Sal's response

Tine Source Destination Protocol Info
5.153403 192.168.0.3 192.168.0.2 MAP 192,168.0.3 45 at 00:06:b:99:03:5¢
5.5).89317 192.166.0.3 192.16.0.2 MINS Mane query response NE 192.168.0.3

Okay act Bob now has both Sali IP adress and her MAC adres These are both
listed a the source addr at his point beats thi information was sen rom Sally Back o
Bob. So, fly ob has al the goods he neds wo communicate with Sal. And jus so you
Know, Em going o tell you al about ARP and show you exactly how Sal's IP address wae
salted toa MAC addr à i ltr in Chapter 6, "IP Routing”

‘By the way, want you to understand tha Sal sl had to go though the ame resolucion
process vo communicate hack to Bob -saunds crazy, huh? Consider ti welcome to IP
And basi networking with Window’ (ad we haven't even added a outer yet!)

"Tocomplicate things further sab ikl har at some point yo hero break upon lage
scework banch of smaller ones Because sr response will have dined o asl clas
‘henetwork re and grew. And vih alar growth, your LAN waiccongstion as each
ic proporions The answer this breaking pa really big network mo a number of smaller

© Chan

+ ntornonworking

«nestor cll network epmntton. Yon do bis by sing device ie outer che,
nd bridge, Figure 12 displays a network that’s en sented with switch wo cach newark
‘Segment connected he sich is oa sept lon domain, Bu make note of he fc that
‘his nctwork sl one broadcast domain

FIGURE 1.2. Aswitencan,oplec the hu, breaking up colin dom

ous)

|
D
oy

Keepin ind ha the hub sedán Figure 1.2 jue extended the ne colision domain om the
wich por. Hors sto some of he ings that commonly cause LAN rafi cons

+ Too many hosts brasdess domain

+ Brandes storms

+ Making

+ Low bandwidth

+ Adding hubs for connectivity tothe network

+A bunch of ARP or IPX tafe (PX isa Novel protocol thats ke IP, but eal, really

‘hay. Typically nor used in today" rod.)

Take another look at Figure 12—did you novice hat replaced he main hub fom Figure 1.1
‘witha sch? Whether you id r di the rss dts ec hubs don sent ant
‘works hey just connec new segment ogro basally san ineapesie way ont
couple PCS together, which eat for home use and restos, bu that about e

Now routers ae used to comet networks together and route packets of data rom one
corto another, Cisco became the defacto standard of outers because fs high-quality
router product reat selection, and ante serie. Routes by default, break up a road.
cast domain the se ofall devices on a network segment that hea all he broadcasts sent on.
hat segment Figure 1.3 shows arouterinourlislenewwork that tates an internenwork and
breaks up brosdess domains

9 chap

+ ntornonworking

frames, outers ayer 3 switches) us logica addressing and provide what scaled packet
«chingo Rowers can also provide pack filtering by uring aces Its, and whe routers
Connect voor more networks together and us lial addressing IP or IP), thin called
An inerntwork. Last routers sea rouing table (map of he ntrnework) to make path
clio and o forward packets to remote networks

Convent, switches aren't wet crete interne (they do not breakup broadcast
domains by default theyre employed oad functionality 10 a network LAN. The main pur
pow ofa sitchisto make a LAN work bete optimize prformance—providin more
Bandwidh forthe LAN users, And switches don't forward paket to oihr networks as
routers do, Instead, they only “evi” frames from one por to another within he switched
‘ncwork, Okay you may be thinking, “Wait a minute, wha ar Frames and packets? i
ou al about chem ter in bis chapter, promise

"y default, witches break up olson domains. This an Etre tem used o describe
ner scenario wherein one particule deic sends à packt on à network segment foe
ingevery the device om that same sement to pay attention tot A ihesame ne dire
enc retransmit, lading toa clon, after which both devices mus retransmit one
taime. Not very efficient! This simio spall found ina hub environment where cach
ox segment connects oa hubtha represent only one colon domain and only one broad
«ast domain, By contrast each and every port ona switch represents ts own colin domain.

‘Switches creat aparato colon domains but ingl broadcast domain.
Router provide a soporte broadcast domain for eh nice.

“The teem bridging was introduced before omtersand bub wer implemented so prety
common t hear people referring vo bridges as switches. Tha’ because ries and switches
Bailly do the same hing res up coon domains ona LAN in rely, po cannot bay
physical ride these days, only LAN switchs, bu the se bridging technologie, so Cisco
‘ileal chem maire bridges)

So vhs mens hata wich basic usta multiple por bridge with more bein
power, ight? Well, prety much, but there are differences. Switches do provide this function,
But they do 0 with realy enhanced management ay and features Ps, mos of the time,
bridges only had 2 or ports. Yes, you cold et your hands on a bridge with upto 16 poss,
but har’ nothing compared tothe hundreds available on some switches!

‘You would uso a bridg ina networkto educ colision within brondset
domains and oneroso the number of colision domina in your network.
Doing ths provides mare Bandwidth fr users And op in mind at sing

hubs your neworkcancontibutoto congestion on your Ethernet network,
As always, plan your armor design carta!

Figure 1: shows how a network would look with ll these iatererwork devices in place,
Remember thar the router wll aor only break up broadest domains for every LAN interface,
ic will beak up cl domains as well

Iemetworking Bases 3

FIGURE 1.4. Intomeworting devine

‘When you looked a Figure 1, id you ot hat the outers found a center stage and
hat connes each physical neework together? We have o use this your because ofthe
‘older technologie imvoleed—brides and hubs.

‘On the top inerntwosk in Figure LA, youll notice that bridge was sed 10 connect the
hubs toa router. The bridge breaks up colision domains, but al the hoss connected o both
bs ar il erammed nto the same broadcast domain. Alo the bridge only crested two
collision domains, so cac deve connected o a hub is in the same colision domain a chery
‘other device connected o that same hub Ths is actualy prety lame, but ssl Bete han
having one clon domain for al hot

‘Notice something else The thee hubs atthe bottom that ae connecte abo connect the
outer, creating one colision domain and one broadcast domain, This makes the bridged net.
‘wor look much ete inde

‘Athough bigosswitehes are use to segment near, thoy wal nat so
Int brondcst or molest packte,

Iemetworking Basics 7

=e

“Thenerwork in Figure 1.3 isa pretty coa nctwork Fach ost isconnctedoitsown colision
main, andthe outer hs create brad domains. And don't fogosa owe pro
vids connections to WAN service as wel! The router uns something called a serial ice
for WAN connections, special, a 1.38 physical iterac ona Cie rote.

Breakingup broadcast domain important because whena host or sewer sends a network
"rodeo every dvico he network must read and roses that roadess unless You've ot
‘ror, When the rote? inerte receives this broadcast can rspand by basally sang,
Thanks, bu no thanks,” and discard the boadcast without forwarding i on to hr net
work. Even though routers re known For breaking up broadcast domains by def,
Important vo remember hat they break up colision domains aswel

“There are two advantages of using routes in your network

They don’ forward broadcasts by def

1+ They can fte tb network haw on yer 3 Nek yer information (oP abe).
Four router functions in your network an be listed as follows:

+ Packet sitching

+ Packet filtering

+ Incernetwor communication

+ ath elestion

Remember tha outers are really switches theyre actually what we al yer 3 wich
(el ale about layers aer in his chapter) Une layer 2 sitches, which forward or filter

Ch

+ ntornonworking

‘The best network connected to the route is the LAN switch network on the ef. Why?
Because each port on tha switch breaks up colon domains Burs oral goal devices
ar sil he same broadcast domain. Do you remember why tis can he a realy bad hing?
Because alldevics muse ten o all road rame, at why. And your broadcast
domains are oo Tag, he users have less bandwidt and ao reir to process more broad-
st and network response time wil low to evel ha ould case office it

‘Once we have only switches in our network, things change lo! Figure 15 shows the
work chat ypicall found today

FIGURE 1.5 Switched naworks cresting an itemetwork

222222

‘Okay, breve placed he LAN switches a he comer ofthe network word so
reconnecting oly logcal networks together. implemented is kind of setup,
‘Vital LANs (VLANS, something Fm gong 1 el you about in Chapter 9, “Vital LANS
VLANS)” So don’ stes ut itis cally important to understand shat even hough you have
aswiched network, you sl ned a router to provide your inter VLAN communication, or
Jtemerworking. Dot forget cat

‘Obviously he best nework is one that's correctly configured to meet the business require
ment ofthe company it seves. LAN switches ith muten, corey placed in the network,
Arche best nctwork design This book will help you undentand the base of router and
écho so you can make tight, informed decisions ona case cs basi

Lets o back to Figure 1-4 gain. Looking atthe figure, how many collision domaine and
Iradcase domains are in his internerwork? Hopefall jou answered nine colision domains
andehrc broadcast domains The broadcast domains are defintely the cast ose oca
‘nly routers break up broadcast domains by default And sinc thereat thre connections,
that gives you thre broadest domains. But do you se the nine colision domains? Justin case
hats no PI explain. The llhub network one olson domain; he bridge network
quals coito domains. Add in the sh network of ve colon domains one for
‘ich sich port—and you've got a otal of nin.

Intemetworking Models 1

[Now ia Figure 1.5 cach port onthe switchs separate colision domain and each VLAN
‘sa separate broadcast domain. But you sl needa router for outing between VLANS. How
many colision domains do you se ere? l'a counting 10--remeniber tht conaetions
benwoen the switches ae considered colision domain

[Eneas wort semare
held et Rpts Aye wth ches?

says that he ot your rquistionto buy a switch and isnot sure about opproving the expense:
vou realy met

Wl you con, sure = no? Sache ra ad alt of functionality oa network at
ab just dont have But mosto us dont have an united budget, Hubs el can rate
ioe network that sf course. you design and implemonttho network core.

Lots say ht you have usara plugged int fourhubs, users each. AL the point the hab
ar conacts together o that you have ene large oliio domain and oe large bread
‘ast domain you can afford to buy just no switch and plug ach hub into switch por

the servers ito the surte, then you now have four clio domains and one
Iomon. Not goa, but oe ri o one switch, your network a much beter
thing. Se go aho Put that requson int buyall new switches What you hove tose?

Sonow that you've gotten an introdcton ro internetworking andthe various device that
live in an internenwork, time o head ino inernetworking models.

Internetworking Models

‘When neck ist ame into being, computes could sica communicate only wth compar
crs from th same monolacurr For example companies an her a complete DECHe solution
‘ean IBM solurion—not both otra het 1970s, the Open Stes Itercomection O81)
‘efrence mode waa crest y te International Oration fr Sanda (SO) to break
share,

“The OSI model was meant 10 help vendors create iteroperable network devices and of
war in the form of protocols so tha diferent vendor network could work with ach other
Tike world peace, probably never happen completely, bu 4% stil geet goal

“The OSI mode isthe primary architectural model for networks. I describes how
data and network information are communicated from an aplication on one computer
"hough the network media to an application on another computer. The OS reference
model breaks this approach ino ayers.

m ch

+ ntornonworking

In the following section, Lam going o explain he Iyerd approach and how we cn se
his approach help us woubleshor our intenerwor.

The Layered Approach

A reference model's a concpral beprint of how communications shou take plas, le
adress al the processes quie fr elective communication and divides these process
inc logis groupings calle ayers. When a communication system sdsignedin his manner,
its known a layered architecture

“Think of ike this: You and som fends want to str company. One of the fs things
ou dt down and think srough whar asks mus be done, who wil do them, the order
hic the will be done, and how thy elt toeach other Ultimate, you might group thew
‘ass into department. Le sy you decido to have am onder-aking department, an inventory
(&parment, and a shipping depunment Each of your depamens as own unique asks,
keeping ts ef members huy and rquiing them to focus on only her own dae.

"ns scenario, im using departments sea metaphor forthe aces in a communication
system. For hinge to run smoothly, the staff o ack department wi ave to trust and rl
csv upon the others todo hei jobs and competen handle hir unique responsible.
In your planning sessions, you would probably take noe, cording the nic processo fai
ae liter discussion about standards of operation ha will sre as our bins blueprint,
‘reference model

‘Once your business launched, your department heads, ich armed wih he part of he
acpi eating to thei um department, will ed to develop practical methods ple
‘ment hir assigned tasks. These racial methods, os protocols willed tobe compied into.
andar operating procures manual and followed closely Each of the various procedures
in your manual wil have hen included or different reasons and have varying deseo of
importance andimplementation. lou forma patershipo agir another compan, wil
Ie imperative hat ts sins protocole business lacprim „mach ours fra eas he
compatible wi

‘Silay, software developers an use a reference model to understand computer com
‘munication processo and se what types of funcions ace o be accomplishedon an one
layer If they are developing a protocol for rain layer, al they ned o concern then
selves with is hat speiiclayer funcion, no thos f anyother layer. Another layer and
protocol will handle the other functions. The technical term for this ide siding, The
Communication process that are related o each other are bound, or groupe together at
particular layer

Advantages of Reference Models

"The OSI models hierarchical and the same benefits and advantages an apply o any layer
model. The primary purpose ofall such models especialy the OS model, sw allow diferent
‘eons network 0 interoperate

‘Tne OSI Reference Mods! 1

Advantages of using the OS! ayer model include, bu re no limited to, the lowing:

1+ Iedivideshe network communication process into smaller andsimpler component hs
siding component development, dig, and troubleshooting

+ allows makiple-vendo development through standardization of network components.

+ Teencourags industry andaezation by defining what funcions occu at each yer of
the model

+ Teallows various pes of nrwork hardware and sofware to communi

+ teprosents changes in one ayer fom affting othe ayers, oi docs not hamper
evelopment

The OSI Reference Model

One ofthe gests functions of the OSI specification sto asi in daa tanner between ds
patte hat meaning, for example that they enable us to ransfr data beeween a Univ host
nda PC ora Mac

The OS it a physical modo, hough. Rather, is ase of guidelines hat api
developers can use o crate and implement applications that run on à network. I aso pro
vides a framework or cres and implementing networking standard, devices and inter
networking schemes

“The OSthasscven diferent ayers, divide imo rwo groups. The tp thes ayers define how
‘he applications within the end station will communicate with each ater and with nes. The
bottom fou layer definchow data ransmtrl end tend. Figure hote thee upper
layers and thee function, and Figure 1.7 shows the four lower layers and thee unions

The uppertayers

Pree a

"Chan

+ ntornonworking

‘When you stud Figure 1.6, understand ha heuer intrfce withthe computer the
Application layer and also tha the upper layers ar sponsible for applications communica
ingherween hass. Remembe tha none ofthe upper layers knows anything about networking
‘rnetwork ados. That's the responsiblity ofthe our bottom yer.

ln Figure 1.7, you an setharis th four bottom ayers that define how datas ranted
‘trough a physical wie or through suche and route. These bottom ayers alo determine
Iho to ebd data srca rom a transmiting host a destination host's application.

Pete rn e tt ney
o eno como lora

Pis ga ten
ose emos

Gama ps y os
Las D ms sent ass
memos anna cr

‘ate vag wa se,
ES

The following network devices operat a al seven layers ofthe OSI mode
+ Nework management sins (NMSS)
+ Web and application servers
Gateways (ot default gateways)
+ Neowork hosts

Basel the SO is prety much the Emily Pos ofthe nexwork protocol world Just as Ms
Pos wrote the book sting the standards—or potocal for human social interaction the
ISO developed the OS ference model asthe precedent and guide or an open neta po
tocol se, Defining the rique o communication models remains toda the most popular
means ofconparon or protocol sas

“The OM reference mode has seven yer

+ Application ayer (ayer 7)
1+ Presetation layer (layer 6)
+ Session layer layer)

+ Transport ayer ayer 4)
+ Nework lye ayer 3)
+ Data Link aye ayer 2)
+ Payer (yer 1)

The OSI Reference Model 1

Figure 1.8 shows a summary ofthe funcion defined a cach ayer ofthe OSI model. Wik
this in hand, outre now ready to explore each ayers funcion in det,

FIGURE 1

Layer funcions

The Application Layer

The Applicaton pero the OS mode mark the sot wher ses actually communicate o
the computer. This layer only comes int play when is apparent that acceso the network
Gs pogo be need soon, Take the case of Interner Explorer (IE You sould uma eve
trace of networking components from a yıtem, such as TCP, NIC card, andxo o, and yo
‘ould stil ws IE vo view local HTML document problem. But things would definitly
fet messy you ti odo somthing ike view an HTML document that mast be eerie
{Sing HTTP or nab file with FTP or TFTP. That's cause IE wil espond o requests sch
“stos y atempringto aces the Application aer And ha happening that the Ap
‘tion ayer eating a an interface Between the actual application program which ne at
ls par ofthe Layered stractore—and the next layer down by providing ways for th app
“ation to send information down through the protocol stack. I her words, IE docs aly
‘reside within the Application Layer terfaes wich Application layer protocol when
‘ead o deal with emote resources,

“The Application layers alo responsible for idemising and xalishingthe availability of
the inended commenti partner and determining whether suficientes for he
intended communication exis.

These tasks ae important because computer application sometimes require more than
on desktop resources Ofte, hey unite conmaniating componen from mor than ne
‘network aplication. Prine examples at le tantes and ema, swell as enabling remote
ces, network management ati, iemrter process, and information location.
‘Many network applications provide services for communication over enterprise network, bat
for present and future intemerworking, the ned i fas developing to reach beyond the ints
of current physical nnworking

* + Imernasworking

Isimportanttoremombar thatthe Application yor is acting as an interface
teen ho acts! eppleton programs This moans tht Microsoft Wor,
{or example, dos notreido atthe Application layer but stades

"2 Applicaton lyr protocol Chapter? wi resort somo programs
‘at he Application lyor—-or oxample, FTP and TTP

The Presentation Layer

“The Presentation Layer ets is name fom its purpose: e presents data tothe Application layer
and is responsible for data translation and code formating.

“This ayers essentially à translator and provides coding and conversion functions. À uc
cessful data rante techniques adap the data into a standard format before transmision
‘Computer ae configured to recive is general formatted data and thon convert the data
ack no ty ative forma for actual reading (or example, EBCDIC 10 ASCII By providing
ration service, he Presentation layer ensures that data ansfered fom the Application
layer of one system can be ead bythe Application laser of another one.

“The OSt has protocol standards that deine how standard data shouldbe formatted. Tasks
like data compresion, decompression eeprom, and decryption are associated with this
layer, Some Presentation layer standards are involved in mule operation 00.

The Session Layer

‘The Sesion aye is responsible fr setting up, managing, and then tearing down sessions
Ieeween Presentation layer ett. This ayer als provides dílog control between
devices, or nodes. I coordinates communication between systems and serves to organizo
their communication by offering tree different modes simple, hal duplex, and full
‘duplex. To sum up, the Sesion layer basicaly keeps different applications dats separate
from other applications dat.

The Transport Layer

‘The Transport ayer segments and rassemble dat ino ada seam. Services located the
‚Transport layer segment and resemble data from upper-ayer applications and wie ino
the same data steam. They provide end tend data transpor services and can sablish à
logica connection besucen the sending host and destination hos an interne or.

‘Some of you are probably famila wth TCP and UDP already. (Bat if you're nor no wor
‘icr-Tiltellyouall about themin Chapter.) ifs, you know that borhwork athe Transport
layerand tht TOP arabe serie and UDPis not. This means that application developers
have more options because they havea choice between the mo protocol when working with
TCPAP protocol

‘Te OSI Reference Mods! m

‘The Transport lye is responsible for providing mechanisms for mulplexing upperayer
applications, establishing sessions and tearing doen viral ccs. als hides deals of ny
cor depender information rom the higher or by providing transparent data tale

“Toto rlablenetworkingcan be uses at th Transportaye. means that
scknowiedgment, sequencing. and fw control wil be und
“The Transport layer ca be connections o connection oriented, However, Cisco is
‘mostly concerned with you understanding the connection orem portion ofthe Transport
layer. The following sections wl provide the skinny on the connection orened (cabe) pro
tocol of the Transport aye.

Flow Control

Data ing is ensured atthe Transport ayer by mantaiing flow control ad b allowing
sen to request rchble data anspor between systems. Flow contol prevents sending hos
‘none side ofthe connection from overflowing he ufr inthe rcivinghest—an event that
‘Sin lin lst dat. Reliable data transport employs a conection oriente communication
sion been ystems and the protools involved ensue that the flowing wl achieved

© Thesogmens delivered are acknowledged hack to he sender upon thei reception,
+ Anysegmens not sckamulslgelareraransmiel,
© Segments are sequenced back nother proper order pon arial their destination

+ A manageable daa flow i msntained in order o avoid congestion overloading, and
‘aca ow

‘The purpose of flow cont sto provide e mean or the receiver o govern
he amount of data sony th sender

Connection-Oriented Communication

In reliable transport operation, a device that wants to transit ets up connection rene
commonicaion with remote device by creating a Session. The transmiting device st eta
The connection oremedsesion witht pee system which called cl supo tree
seayhandabate. Data he transferred when he anses ished, acallterminaton takes
‘lve to ear dow the viral ciu

Figure 19 depicts atypical eliahle sesion taking place Between ending and recivng sys
‘ems: Lookingatit,youcan sce that both host application programs begin by notyin thie
Individual operating systeme tht a connection about to be nie, The ne operating ys
tems communicate by sending message otr th network confining hat the eae
approved and that both sides ar ready for iw tae plac, Ar al ofthis required sync
‘ation takes plas, connection fully etablished and he das wanter begins hi ital
eut setup called overhead)

chap

LT mme Y
‘Sender A De
=.
=

Rp xeon

a
AS

o
AS

EEE TT

(send Senet)

‘While the information s being transfered between hows, the to machines periodically
‘heck in with eachother communicating though thee protocol software o ensure that alls
Boing well and thatthe daı img rev propel
Let me sum up the tps in he connection vesion—the three-way handshake
pcre in Figure 19:
* The ist “connection agreement” segment sa request for synchronization
+The second and chic segments acknowledge the request and establish connection
parameers—th rlesheewoon host, These segment requests the cire?
quencing is synchronized here s weil o that a bidirectional connection s formed
The final segment is als an acknowledgment. It noe the destination hos hat he con
nection agreement hs een acepredand thatthe actual conection has been established
Data transfer can now begin

Sounds prety simple, bu things do’ always flow so smoothly. Sometimes during a
transfer, congestion can occur became high poed computer generating dat tafe lot
faster than the network can handle transfers A bunch of computes simltancously send
ing datagrams through sing gateway or destination can aso botch things up nicely nthe
later cat, a gateway or destination ean become congested eventhough no single source
caused the problem. In citer case, the problem is basally akin toa rca Botleneck—
{oo much tat for to small a capacity I's nor usually one car tha’ the problem; there
tre simply too many carson tha freeway

"Okay, so what happens when a machine esives a Nod of datagrams 00 quickly for itso
proces? estore chem in a memory sation call a fr But his bfering ation can sale

‘Tre OSI Reference Mods! 2

the problem only if the datagrams ar par of small burs: 1 no, andthe datagram deluge
continues a device's memory wil esetuall beexhause, lod capacity will be exceeded,
Andi wil east by dicading any addtional datagrams tha ave

"No huge worries here though Because of he transport function, network food control
systems realy work quite wel Instead of Jumping resources and allowing data ob lost the
rampe can su a "not ead)” indicator tothe sender, or source, ofthe Mood (as shown in
Figure 1.10) This mechanism works kindof ikea stoplight, signaling the sending device to
"op transiting semen afc tots oxerhalmed per. Aer the pr receiver process the
Segments lady ints memory rer it ufr sends out sendy” transpor ind
aoe When the machine wating wo tans the es fis datagrams receives this “go” indie

FIGURE 1.10. Teansmiting segments with flow control

In fondamental, able connection oriented data transe, datagrams are delivered tothe
Aocevig hos in exact she same sequence hey tansmited—ad the transmision ast
{his oder Breach any dat segments are lst, doplicatd, or damaged along the vas,
2 flo wa transit. This problem sslve by having the reciting hos acknowledge tha
that received each and every dts sent

A serios considered comneciarariene if thas the following characte

+ A dial ict is setup (e three-way handshake)
+ Teuses sequencing,

+ Tease acknowledgments

+ tse low control

2 Chapter 1+ Internenworking

en he os o ow contol ae ul, windowing and cngerton

Windowing
‘ely data throughput happens quickly afin. And as you ca imagine it would be
slow ihe transmiting machine had o wat fran acknowledgment afer sending cach sc

But beats theres time sable afer the sender transit the data segment and before
ahs procesing acknowledgments fromthe recvin machine, the sender uses the Break

sam opportunity to rame more daa. The quantity o data spent measured in Byes)
thar the transmining machine is allowed o send without receiving an ocknowledgment for
them scald a window,

ex indo cnn mou sunno eine

So he ie of the window controls how much information is ransferod rom one end to
{he other. While some protocols quantify information by observing the numberof packets,
TRIP measures it by counting the number of byes.

‘As you can sein Figure 1.11, thee ae fo window sier—one set 1 and one ett 3,

FIGURE 1.11. Windowing

2 2

See Von se Rome
Send! AARNE ete +
ir
Send? SRNR cee?
a 043

CES
CS
Sec) ET

See RIT

The OSI Reference Model 2

‘When youve configured a window sz of 1 the sending machine waits for an acknowlale-
ment for cach data sent it ane befor ranumiing another If you've configured win
ow sizeof allowed to transmit three data egrets before an acknowldgment rece

In our simplified example, both the sending and recening machines are workstations lo
eal this nor done in simple numbers bt in he amount of byes ha an Be set

Harcahinghost ais torecaive al he sepmansthatitshould acknowledge. tho
ost improve communion session by Greg to window rs

‘Acknowledgments

Reale data delivery ensures the integrity ofa stream of data sent fom one machine 1 the
‘other though a uy fanctional data link 1 guarantes that he data won't be duplicated or
Jos. This achieved through somthing called posite acnouledement with reranım
son —a technique that regu a reciving machine o communicate withthe Wansmiting
sour by sending an acknowledgment message bak ote sender when it rcevs at. The
‘ender document cach segment send and wits for thisacknowledgment before sending the
ext segment When it sends a segment, the wansmiting machine starts à ner and stan
mis it expires before an acknowledgment is returned fom the receiving end.

In Figure 1.12, the sending machine vansmits segment 1,2, and 3. The ecivin node
acknowledges it as received them by requesting segment 4. When e ese the acknowicdg-
‘ment, the sender then trans egments 4 5, and 6, cent $ doesn't make io the des.
‘nation, the reciting node acknowledges tha even ith request or the segmento be
‘eset, The sending machin wil thn resend the los segment and wait for an acknowled
‘ment, which ft mus cave in order to move ont the transmision of sent 7.

FIGURE 1.12 Tronportlayor isle lon

2. B

E DEE
Sn ——————
Sn
So) ge

Ai
A ne
SiS coment
Se mm
es 1
Se
[| 137

2 chaps

+ ntornonworking

The Network Layer

The Network yor also call layer manage device addresing rc the location of devices
‘nthe network, and determines he Be way o move da, ich means that the Naworklayer
must anspor afi eeween dics than local anschl, Routers (ayer 3 devices) ae
specie atthe Network layer nd provide the outing rios within an nemenwork,
Tehappens ike this Fs, when pack received on outer itera, the destin IP
rs check. Ich packer destin for hat pris router wok up the ds
‘ation network adres in the owing table Once the rose choses an ext inert he packet
‘will seno har mera o be ramadan cn ur on thecal network. the rout oid
ane forthe packs desa network in he outing al, the outer dope the pack
“Two types packets are wed at the Network layer data nd route updates.

Data packs Used to transport user data through the inernerwork. Protocols used to sup
por dat trafic are called outed protocols example of routed protocols ae IP and IN.
Vos sen aboot IP adding in Chapters 2 and 3 and Ir in Chapter 13
Route update packets Used update neighboring routes about he networks connected 10
iTrouters within the interetwork, Protocols that send oute update packers are all outing
protocols examples of some common ons are RIP, RIPv2, EIGRE, and OSPF. Route update
packet are wed to lp build and maintain outing table on ach router

In Figur 113, Ps given you an example of routing table. The routing table usd in a
route includes the allowing information:
Network addresses Proteolspesicncwork drs Aroutermustmaitinaeouingtahe
for individual outing protocols cause each routing poco keeps wack ofa network witha dí
feentaddrosing chem v6, and X, forexampl). Think ofitanastetsignincach ofthe
rene Languages spoken bythe des that lve on a partir sect. So there were Amer
‘cam Spanish and French folks om a wre named Ct, the sgn woul rend Cara.

1 30

Pr
| à

The OSI Reference Model 2

Interface The exit inte
Marc The dance tothe remote network Different routing protools we different ways
computing hi sance. going o over routing protocol in Chapter 6 and 7, bt for
‘ow, know tha some routing protocols namely RIP use something ale à hop coun (he
‘umber of routes a packer psss through en route 10 a remote network), while thes use
and, delay of he ine reve ck count (1/18 of second,

ea packet will tke when destin or a specific network

Andas mentioned en, outers break up broadcast domains, which means tha by
eilt, rondeasts re’ forwarded through a router. Do you remember why this isa go
‘hing? Rowers ao break up colision domains, but you ca also do that using layer 2 (Data
Link ayer switches. Beaune each interface na rte representa separate network, must
asien unique network identification numbers and ech hat o the network connect
10 that outer must use the same network number. Figure 1.14 shows how a router worksin
An imernework

mes © em
enemas NSO

stent ess sons

Fattnene0 Ss So 2»

Here are some points abou routes that you should realy commit o memory
2 Routers by defauk, wll not forward any broadcast or mulas packets,

+ Routes ue the logical aos in a Network layer header to determine he net hop
router to forward the packet to.

+ Routes ca use aces st, rated by an administrator, to contol security onthe types
‘of packets that are allowed to enter or exit an interface

+ Routers can prove layer 2 bridging fonctions if needed and can simaltancously ou
‘theough che Same irc.
+ Layer devices rouersin his cae) provide connections hetween virtual LANs (VLANS),

+ Routes can prove quality of service (QoS) for pif ryps of network atic

‘Switching ond VLANS and ro covered Chapter 8, “LAN Switching and
STP." and Chapto 3, Vital LAN LANG)

a cha

+ ntornonworking

The Data Link Layer

The Dats Link layer provides the physical transmision ofthe data and andes eco
notation, network topology, and How contol. This means that she Data Link ayer
will ensure thar messages ate delivered o the proper device on a LAN using hardware
leven and wil tramlae messages from the Nenwork layer nto bits forthe Physical
Taye to transit

The Data Link ayer format the mesag ino pic, ach cala data rome and ads acıs-
‘emia er containing he hardware destination and rc ados This ade information
Forms a so of capsule hat surounds th original mes in mac the same way hat ins,
natal devices and other oc were tached he amor module of he Apolo projet.
‘Thee various pics o quien were wll only daring ein sags pce Might ad were
stipe off the modal and dscarded when ther designar stage was complete Daa waving
‘Brough menors sine

Figure LS shoves the Data Link ayer with he Ethernet and IEEE specifications. When you
sc it ou, notice that the IEEE 802.2 standard is used in conjunction with and adds fan
‘onal tothe the IEEE standart

FIGURE 1.15 DstaLinklyor

ws m ma

es important for you o understand that routers, which work he Nework ar, don't
creat all about where particular hos located. There only concer about where ne
‘works are located andthe best way to reach them including remote one: Route ate tral
‘obsessive when it comes to network. And for once, this isa good thing Is the Data Link
layer hat responsible or he actual unique identification ofeach device that resides om.
local network,

Tor host o send packs o individual hass on lal network as well a rani packs
Heron rue, the Data Link ayer nos hardware are Each ine packet set ben
router ds famed wih cool information at the Dat Link layer, but ha information
ipod far e eevingroutr and onl he orginal packets complet inc, This fa
ie ol he poke uni fo eachhopuntilthe packers al devolo the coros hing
os. really imporan 0 understand hat the packer sis eer alee along the route
only encaplated wth he ype of entoinformaion equi frito be propery pase en to.
the diferent mali yp.

The OSI Reference Model 3

‘The IEEE Ethernet Data Link layer has two sublayens
Mea Access Control (MAC) 8023. Defineshow packets are placed onthe mei. Conte:
Sion media access "fit coment served” acces where everyone share the same band
via hence the name. Physical addessing i defined here, a wel a logical topologie
‘Whats logical topology? e's the signal path drough a physical topology. Line discipline,
ror noifction (no correction], ordered delivery of frames, and optional low control can
ko be used a this ublyer
Logical Lik Control (LLC) $022. Responsible forüdntiying Network yer protocols and
then encpsuting them, An LLC header tl he Data Link ayer what o do witha packet
once frames recived works like thie A hot will eve a frame and ook in the LLC
cadet ind out where he packets destined say the IP protocol athe Network aye. The
LLC cam alo provide low contol and sequencing of contol bis,

“The switches and bridges talked about near she beginning of che chapter both work atthe
Data Link ayer and filter the nctwork usinghardware (MAC) address. We wil ook a hese
Inthe folowing section.

‘Switches and Bridges at the Data Link Layer

Layer2swiching considered hardware-based bridging house it uses speciale hardware
called an applicaiomspecfic tegrated cca (ASIC)- ASICs ca ron up to gigabit spats
‘with very fw latency as.

Lancy the imo measured rom when a frame enters porto the timos
nt a pare

ries and sites read each frame a it pases through he network. The layer device
then pts the source hardware add in a iter table and keep tack ol which por the frame
was ecivl on. This information (logged in the bride's or site’ filter table) is what helps
‘he machine determine the locaton ofthe specific sending device. Figure 1.16 hon sith
in an imernenwork,

“The ral tte business about location, location location, andthe sameway for oth
layer 2and ayer devices Though both ned te ableto negotiate the network scraca o
remember hey reconcrned wither ferent pars oft Primary aye 3 machines such
se router) ned to locate soci network, heen layer 2 machine (owiches and Brides
‘eco eventual lose specie dev. So, networks at routers sindiidal device are
vo swichesandbrdes. And ruring abs has map" the inercrwork ae for outers a fiber
{ables that “map” individual devices ae for scher and bridges

‘Alter fer ables ui on the er 2 dei, i wi forward eames only to the segment
where the destination hardware adress located I the destination device on the same se:
ment athe fans he layer 2 device wl eck the Frame fom going to any aber ment I
‘he destination ona diferent segment, the frame can be anse ont at segment This
seal transparent bridging.

3 Cum

+ ntornonworking

‘When a sich interface receives frame with dination hardıan address thats found
in he deve’ filter table, wll forward the fame to all connected segment If the unknown.
‘vce that wan ent the mater frame” rp to this foiadin ato, the sich updates
is ter able regarding hat devi’ location. But in he ese the destination addres ofthe
transiting frame ia broadcast adress the sich wl forward al brandt to cry con
ected segment by deu

2222
snag

ac om os one coton conan
‘agua me tes vos soma

All devices that broadcast is forwarded o are considered to be inthe same broadcast
“domain. Thiscan bea problems layer 2 devices propagate layer 2 broadcast storms that choke
Performance, and only way o stop à broadcast storm from propagating through an inter
cor is witha Layer 3 device router

The biggest benefit using switches instead of hubs in your ingemetwork that cach
wich port actual own collision domain. (Converse hub rate one ge clan
Jomain.) Bat een armed witha switch, you sl cn break up broadcast domains. Neither
che nor bridges wil Jo that. They spell simply forward al broadcast ínead.

Another benoit of LAN switching over hub-centeredsmplementtins i that cach device
‘omevery spent liga no switch can ransmitsimuleancousy—atleasy they anas long.
share nl an hot on each por ands hubs plugged nto a switch port. As you might
‘hve guesed, hubs allow only on device per neework segment to communicate aa tine

Binary to Decimal and Hexadecimal Conversion

Before we finish ths chapter and move ro discussing the TCPAP protocol sack and IP address
ing in Chapter 2, really important for yout ely understand the irnos beeen
Binary, decimal, and hexadecimal numbers and how to conver ne format ito the che.

The OSI Reference Model 2

Sowell tar with inary numberig. W's prety simple, ely. The dis usa are mid 10
itera 1 (one) oF 0 (ero) and each dit is calle 1 i shot or binary di. Typical, you
run her or bis tote, wih tos eng refered os amb and a ye, respeto

‘Wha interests us in binary numbering i the vale represented in a decimal format—the
(ypical decimal format being the base 10 number scheme hat we've all sed since kindergar-
ven. Thebinary numbers are placed in a value spot starting athe right and moving, with
ich spo having double the value ofthe previous sp.

Table 1. show he decimal values ofeach bi location na nibble and byes. Remember,
nie 4 bits and a bye bi

bbe Vales Be aus

sa EXE

‘Whar his meansischat a one di (1) place in a vl po, hen she nde or bp
takes om hat decimal ale and ads to any acer ale spots hat have 1, And er (0)
‘placed in abit sp, you don't coun that value.

{etme clarify things, ve have 1 placed in each pot of our nibble, we would then add
up 89.692» 1,10 gnc us 3 maximum vale of 15. Another example for ur ible values
‘would be 1010; that means thar dhe E bi andthe 2 it are turned on, which qual decal
value of 10, we have nibble binary value of 0110, then our decimal vale would be 6,
because the 4 and 2 bis are ured on.

Tur the byt vale can add up to a vale that's significa higher than 15. This shows
wre counted ever bia one then the bye binary ale would lack ike this (remember,
bits equal a bye)

ma

‘We would then count up evry bit spor because ach sumed on e would look ik his,

which demonstrates the maximum value of Byte:
128 664432616 6844620 1-255

There are plenty of or decimal values that a Binary number an equal Le’ work

rough a fo examples

10010110
‘Which is ar on? The 128, 16,4 and 2 bits ar on, so we just add them ops 128 + 16 + 4
420180,

1101100
‘Which is are on? The 64, 32, 8, and bis are an, so we just nee to ad them up 64 + 32
28242 108,
01000
‘Which bits ae on? The 128,64 32, and 8 bis are on, o just athe vals up: 128 + 64+
3268 = 282,

3 Chapter 1+ Internenworking

“Table 1.2 isatableyoushould memori before raving the IP setionsin Chapters 2and 3

10000000 ve
1000000 12
11100000 zu
mn ES

Hexadecimal addressing is completely diferen han Binary or decimal ds converted by
reading nibbles, noe By wing ible, wecan convert hese isto hex rey simply. Fst,
vndertand tha the hexadecimal addesng home was only the numbers through. And
sinc the numbers 10,11, 12,andsooncant e sd (because thy are wot numbers he
lees A,B,C, D, Ey and Fate used to represent 10 1,12 13, Hyand 15, respectively

‘oxi shot for hexadecimal, wii numborng sytem hat nos the fm
ice ofthaptaber(Atvough Aw oxend beyond the alas 10 gis

inte doma system. Hoxadecial has tt of 16 digits.

Table 1.3 shows both the binary value and the decimal vale for cach hoxadoimal dit.

TABLE 1.3. octo inary t0Decial Chart

Te OSI Reference Model 2

TABLE 1.3 MoxtoBinory 1 Decimal Char (continuos)

Wexadecinal Vale Bin Vals Decimal Vale
6 ono .
7 om 7
A 1010 0
e on "
5 1100 1%
o non cy

Did you notice hat he fis 10 hexadecimal digits (0-9) re the same vale a the decal
‘sales? I or lok again. This Randy fact makes those values super as to conver
So suppose you have something like ti: Ox6A. (Sometimes Cinco Ike to pu Ox in

ron of characters so you know tha they area hex vale. edoesn'thaveany other special
meaning) Whatare the binary and decimal values? Al you have to remember is that ach
hex characteris one nibble and two hex characters together make 3 byte, To figure out
the binary value, we ned to put the hex characters into two nibbles and chen pat ihem
together into a bye, 6= O110 and A (which is 10 in hex) = 1010, so the complete byte
‘would be 01101010,

“Taconic fom binary ex, just ake the byte and brak ico ies: He what Lean.
Say you have the binary number 01010101. Fis, break i into mibbles—0101 and
‘101th the value ofeach mle heing since he 1 and 4 bits are on. This makes the
ex answer 0455. And in decimal format, the binary number is 01010101, uhichconvrts

toede l6edet=85,

8 cha

+ ntornonworking

Here’ another binary number
Your answer would be 1100 = 12 and 1100-12 (herfore,i’sconvertedto CCin hes). The
decimal convenion answer would he 128+ 64s 8» 4 = 204,

‘One more example then we need to get working on he Physical layer. Suppose you had the
following binary number

1010101

Tnchexansver would be OS,
imal equivale BB+ 32 164+

Ea ‘te sen ab for mor prac viana conversion,

The Physical Layer

nally ariving at the bottom, we thatthe Physical ayer does so hing ends its and
roccivs bits is come ony in values of 1 or Oa Morse code with numerical vcs. The

Physical ayer communicates direct with the various typeof sal communication mei

Dif kinds of media represent these bt vales in diferent ways. Some use audio tones

while thes employ state ranstions—changss in voltae frm high co low and low thigh

Specific protocol tended for ach type of meat describe the proper bit pateo o be
sed; ho data isencoded into ma signal, and the various quals ofthe physical medi
tachment interface,

“The Physical layer species the ctrl, mechanical, procura, and functional require
mens for activating, maintaining and deactivating a physical ink between end systems This
layers also where you deny the mera between the dat erin equpment (DTH) and
the data communication equipment (DCE) (Some old phone company employees sil ell,
CE data irc emminaring equipment.) The DCE is usualy locate ac the service provider,
‘while DE th attach device The services avaiable tothe D TE ar mont often acces
vía a modem or channel serie mia eri unt (CSUIDSU)

The Physi layers connectors and diferent physic ropologics are defined by the OS as
standard, allowing disparate stems to comunicate, The CCNA objectives ar ony iter
‘Sted inthe IEEE theme standards,

Hubs at the Physical Layer

A bises a mulóple-port pete. A repeater cv a digital signal and reampifis of
regenerates that signal and then forwards the digital ira ur al active ports without looking
Arany data An ative hub does the same thing Any digital signal eve rom segment on
hub pois egenrated or ramped and sunsmined ou alporison the hub. This means
less phgge int a hubarein the same cllsion domain aswell as inthe smebroadcast
“domain Figure 1.17 shows à hub in a network,

ince 1011 convento amd ID! converse Sin bexalas.The
y

Eimemet Networking 3

FIGURE 1.17. Atubin anotwork

‘teense panda ma
‘ev she sen

Hibs ike repeaters don't examine any ofthe rfi as enter ad schen transit out
to the other parts ofthe pia medi Every device comic tothe hb or hubs, must sten.
ita device transmits. A physical star nerwork “here the hub sa central dvi and cables
extend in al directions out rom the typeof topology a hub creates. Visually the design
‘eal doc semble star, whereas Ethene networks logical bus topology meaning that
‘he signal has o run tough he nework rom end o nd.

ex ube and ropstr cn be uso enlarge th ars cover by a inge LAN
{gent sthough do not rsomenend a. LAN ches sa alrdbi or

Ethernet Networking

Ethernet contention media aces method ha allows al hosts on a network to har he
ame bandwith of ink, Ethernet I popular beca is cay sclable, meaning hat ts
Comparatively easy to ira new technologies, such as Fast Ethene and Gigabit Ethernet,
Into an exis network infrastructure ls ao reaivey simple to implement in the fie
place, and with i, eoublehootng seasonal steightforward Ethernet uns both Data
Tink and Physical layer specifiaions, and his section of the chapter wl ive you Do he
Data Link layer and Physical layer information you ned to effectively implement, rouble:
shoot, and maitain an Eebemet network.

"themes networking uses Care Sense Mile Aces with Colon Detection (SMAICDI,
“protocol ha eps device share the Rand evenly without having wo devices ana at
¡lez ine onthe network medium. CSM VCD was create 1 overcome the problem of thine
‘alison that sur when pacetaeransmiedsimulancoul rom diferent nds. Anders
mood clin managements cro, ese when nodo transit in a COMAUCD ne
‘work athe other nos en the network reccveandesamin that transmision. Only bridges and
‘outers cancel, prevent a transmision fom propagating throughout he entire work!

2 Chapt

+ ntornonworking

So, how does he

MAICD protocol work? Lets star by aking look at Figure 1.18

FIGURE 1.18 coMaco

ÉELE

PELE!

2225
Esa]

02212206

ate Sere tat Acs Coin sti (SUACO)

‘When a hos was o trans over the network, e fist checks for the presence fa digital

signal onthe wir. fall hear (o other hoi teanaiting), he hos wil hen proceed with

is tranion. Bait doc’ sto there, The tranamiin how constantly monitors the wireto

‘make sure mo other boss begin ransmiing the host detec another sialon the wii

Send cuan extended jam signal that case l nds onthe seno stopsendia ata (ik

Busy sgl The nodes respondo thar am signal by wating while before tempting o ans

mi agai, Backelalgorithne determine when the colliding stations can eras, colision

ee occrsng after 15 tres, tbe nodes aterpting 1 transit wll hen mot. rey clea!
“When acllsion occurs on a Ethernet LAN, he following happen

+ jam signal informs al devices that olson occured.

+ Thecallsion invokes a random backof algrithm.

2 Bach device onthe Ethemet segment stops tansmiting for a short ime ui he

timers expire,
+ Al hosts have equal privity o transit after she vmers have expired.

Eimemet Networking 2

The following ae the tec of having a CSMAICD network sessing hen colons:
+ Delay

+ Low throughput

+ Congestion

Poa raton an 629 torte etna dly hater whan
Sion our Mens colon ocr, ast fl eure waar
ire rend tne ay has na Ate achat ay per

nad a an have tun poy to weet ot

nthe following cons, am going to coser Ethernet detail at both the Data Link ayer
(tayee2} and the Physical layer (er)

Half- and Full-Duplex Ethernet

Hal duplex Ethemetis define in he orignal 802.3 Ethernet Cisco says uses
pie wich a digital signal runing in bo icons on the wie. Certain, he
ations discus the proces of half duplex somewhat diferent, but what Cisco aking,
bout a general seme of what i happening her wth Ethernet

Tako uses the CSMAICD prooca to help prevent collisions and wo perm etransmiting
it colin dos occur a Buin arrache toa switch, mus operat in hal duplex mode
because the end stations must be able to detest colsons. Hall-daplex Etherac—typically
TonascT—is nly about 301040 percent ecient as Cisco ses base a large Le T et
work will usualy only give you 3 to A Mbps, at most.

ut fllauplex Ethernet we two pain of wits instead of one wire ai ike half ple:
“And fll duplex uses a pito poi connection between the rame of the transiting
‘device andthe receiver ofthe receiving device, This means that with fll plex data rane,
you get faster data transfer compared to half duplex. And because the transit data
et on diferent sr of wies than the received data, no collisions wll occur.

The reason you don't neto worry about collisions Because now i ikea rca with
maple anes ead ofthe single lane road provide by half ple. Falluplex Ethernet is
Supposed oof 100 percent efficiency in both diecrions—for example yo can get 20MMbps
‘uth 1OMbps Ethernet running fll plex or 200Mbps for Fast Ethernet, But thi tet
something known san aggregate rate, which ant as "youve supposed to get” 100 pee
‘ent efcieney. No guarames in networking si ie.

Fallduple Ethemet can be used in thee situations

+ Wh conascion foma switch to host
+ With connection from a switch to sich

+ Wisk connection from a host o a host using crossover cable

Fut ups Etmat requis a pont. ein connection when on two nados
So present You can rn fll pl wih fur about any don exe 3 hub.

M Chapter 1 + Imernerworking

Now Fs capable fall ha spec, why woul’ deliver Well when 3 dupe
Farm por is power on, i first connects othe remote end and then netas with he
‘other end ofthe Fae Ethene ink Tis called an auto detect mean. This mechanism
Fit decis on the exchange capability, which means it checks os it an run at 10 oF

100Mbps. the checks ro sce an un fll duplex, anf ican wil un half duplex.

‘orem tht halt duplex Ethernet shares colision domain and provides
Slower five tought than ul duplex theme. which pay us

frat colision doman and. higher electo toughput.

Las remember these import points

+ Thete are no collisions in ull duplex mode

A dedicated switch por required for ach flldoplex node

+ Thehostneworkcardand te switch por must he capable operating in fall plex mode.
Now les tke a lok at how Eiheenet works athe Data Link layer,

Ethernet at the Data Link Layer

bene at the Daa Link layer is responsible for Ethernet addressing, commonly refered o,
ashardwarealdessing or MAC addresing. Ethernet abo responsible for framing packets
recived rom the Network ayer and preparing them for transmision onthe local nework
‘through the Ethernet contention medi acces method,

Ethernet Addressing
Heres where wege into how Ethemet ddresing works. I uses the Meda Access Control
(MAC) address bumedinto eacha every Ethernet network interface ced (NIC) The MAC,
‘orhardwar, adres fa 48-bit (byte) address writen in a hexadecimal format

Figure 1.19 shows the 48-bit MAC addres and how the bin ar divided

FIGURE 1.19 Etes adcressing wing MAC adresses

oo

‘The organizational que identifier (OUI assigned by the IEEE 10 an organization,
es composed of24 bits, or 3 bytes. The oganzaion, in tum, sens a globally administered
«adres (24 bits, or 3 bytes tha unique fupposeiy, again—no guantes) 10 cach and

Sry adapter manufactures. Look closely athe figure, The high-order bits the India!
‘Group (UG) bit. When chas value of, we can assume thar the address isthe MAC address

Eimemet Networking 5

‘of device and may well appar in the source potion ofthe MAC heer, When itis we
an asume tha the adds represents either a broadcast or multicast address in Ethernet or
broadest or factional adds in TR and FDDI (sho realy knows about FDP).

“The next bis th global bit js AL bi also town as U, where U means mir
sa. When sr, this ic represen bal administered adress (bythe IEEE). When the
Iii reprenne and administered addres (sim what DECnet ws do).
The low-order 24 bi of an theme address represen a locally administered or manufacture
signed code. This potion commonly sas with 24 fr he card made and continues in.
(rderunilthre are 24 I forthe a (167772160) cad made. Yu id that many mane:
‘ures se thse same ss hex gs asthe st characters ft ral number on the same an

Ethernet Frames
‘The Data Link yer isresponsble for combining is ino byes and byes into eames. Frames
are eda the Data Link ayer to enapsulae asks handed doven fom the Network ayer
foe transmision on à pe of meda acces

“The function of theme stations 5 0 pas data frames between each othr using group
bis known as a MAC frame format Thi prvideseror detection from acycheredundaney
‘heck (CRC) But remember error detection, nos eror correction. The 802.3 frames
nd Ehemet frame are shown in Figure 1.20

Bae meters atest aoe tein

Eemet

AT

802.3 Ethernet

RE SANS Lu

% cn

+ ntornonworking

Following are the deals ofthe differen lds inthe 802.3 and Ethemet Frame types
Preamble An alternating 1,0 pattern provides a SMH clock at the tart ofeach packet,
‘which allows the reciting devices to lock the incoming bi steam

Start Frame Deimter(SED)/Synch The preambles seven octets and the SED is one cer
{synch}. The SFD is 10101011, where the ast pi of I allows the cher to come into the

heating 1,0 patter somenherein the middle and sil sync up and detect the beginning ol
the dts,

Destination Address (DA) This transmits 48: value using the least
(LSB fist. The DA is used by resving tations to determine wheter an incoming packet
À addrened toa particular node. The destination adres can be an individual adres ora
Broadcast or multicast MAC adds. Remeber that broadcast al (or in Re) and
set all devices ura mulas is sent ony to a similar subset of nodes on à network.
Source Address (SA) The SA iva 48: MAC addres use o demi the transiting
esc andi wes the LSB fist, Broadcast and mas addres formats ar egal wäh
the SA fel,

Length or Type 802 uses Length el, butih Feet fameuses Typ co lente
Nero aye protocol 802.3 cannot deny the pperlaer protocol and must be sed wih
roman LANIPX, for example

Data, Thisisa packet sent down to the Data Link aye from the Network layer The sie can
var from 64 01,500 bytes.

Frame Check Sequence (FCS) FCS isa fed a the end ofthe frame hats set store
the CRG

{Lets pes her fora minute and tk look a some frames caught on our troy eck

network analyze. You canse that the frame low as only thee eld: Destination, Sous,
and Type shown as Protocol Type on this analyzer

Destination: 00:60:f5:00:1f:27
Source: 00:60:f5:00:1f:2¢
Protocol Type: 08-00 1P

“This isan Eher frame, Notice hat the pe ci, o 08:0 moy jus fered o
3504800) in hexanal
The nex ame asthe same fields, soit must bean Ethernet fame too:

Destination: AFEFFIFFIFFSFESFF Externer Brosdcast
Source CES
Protocol Type: 08-00 17

Didyou notice that his frame wasa broadcast? You can el because the destination hardware
address all sin binary oral in hexadecimal

ets takea lock a one more Ethernet frame talk abou ths ext example agin when
eu in Chapter 13, bu pou can e ha the Etc frame the sam Eee I ame

Enemet Networking 2

‘we wewith the IP outed protocol but he rp el hs Ox86dd when wearecaryingI PVG data,
and when we have PA data, we use 0800 in the protocol ed

Destination: IPV6-Nethbor-Oiscovery 00:01:00:05 (35:53:00:01:0:03)
Source: Aopen 3e:7F:dd (0:01:80:30:7F:68)
Type: IN (0.0664)

“This the beauty ofthe Ethernet II frame. Because of the protocol fed, we can sun any
Network Iyer outed protocol and wil ary the data Boone tam ini the Nerwork
layer prono

Ethernet at the Physical Layer

Eonce was fit implemented by group callo DIX (Digital, Incl and Xerox) Theycteted
and plemented theft Ethernet LAN specication, which the IEEE ase to cee he IEEE
102: Committee. This was a 10Mbps nctwork that ran oncoax and hen eventual twisted
pair and be phyial medi.

“The IEEE extended the 802.3 Ca
Eiherne) and 02.3 (Gigabit E
‘over über and co).

Figure 121 shows the IEEE 8023 and original Ethernet Ph eal ayer speciation.

‘hen dcsgnng your LAN, is aly important understand the differnt ype of Eier
set media available you. Sure, would be reat to run Gigabit theme toeachdesktop and
TOGbps beeen switches, and although his might happen one day, justin the cost ofthat
nctwork today woul be prety dci. Bat you mix and match the diferentsypes of Ether
et media method currently avaiable, youcancomeup witha cost fete net out
thar works pret.

site to 000 new commitcs known a 802.34 (Fast
et on category 5) and then nally 802 Sue (10Gbps

FIGURE 1.23 EthomorPyscal ayer specications

The EIATIA (econ Industries Asocation and the newer Tlecommunications Indus
Alliance the standards body tha creates the Physical layer speifkations for Ethernet,
The EIATIA specifies that Ethernet us a registered ick (RJ comector with a4 wiing
sequence on bed used pair (UTP) cabling JAS) However, he industry moving
Coward calling hs js pin modular connector.

"Each Ethernet cable spe that i specified by the EIVTIA has inherent atenuation, which it
ind asthe los of signa strength sit travels the length fa cable andismensurein be

2 chap

+ ntornonworking

AB. Th cabling usd in corporate and ome marks is measured in categories. À higher

quai cable will ave a higherrated category and lower attenuation Fe example, category

Si hor than category ocaso category Sabes hve mor wire vis pro and therfore

les esta: Crosstalk isch unvante sia interference rom adjacent pais in he cable
‘ere are the orginal IEE 302. standard

10842 10M, bachand technology up o 185 meten in length. Known as ne and
an support up o 30 workstations on a ingle segment Uses a physical and logical bus with
AUT connectors. The 10 means 10MbpS, Base means baseband technology (which is asimal-,
ingmeihod forcommunicstion om the network), andthe mean almost 200 meter ne?
Faberner cards use BNC (British Naval Connector, Bayonet Neil Concelman, or Bayonet Net
Connector] and T connectors to connect ro a network,

1OBaseS 1OMbps, baseband ecology, up o 500 meer in length. Known as hike

Use à physical and lg us with AU! connectors. Up to 2,500 meters with repeaters and
1.024 asesor sl segment,

10BaseT _ 10Mbps using category 3 UTP wiring. Unlike withthe 10Bas2 and 10BaseS ner
‘work, each device must connect no abo sich, and you can have only on host pers
ment or wir, san RIAS connector (pin modal Connector witha physical star topology
anda local bus.

Each ofthe 802.3 standards defines an Atachmens Unit Interface (AUD, which allows a
‘one bit-atatimetransfr o th Physical layer from the Data Link media aces method. This
Slows the MAC to remain constant bu means the Physical layercan suppor any exsting nd
‘ew tchnologcs, The original AUI interface was a 1%-pin connector, which allowed a trans
her (transmicion) that provided a IS-pintoswisted-pae conversion.

“The thing is, he AU interface cannot support 100MbpsKıhemet because of he high fre
quon involved So 1008 T neded a new mera, and the 802 u specification crested
‘ne called the Media Independent Interace (MIN, which provides 100Mbps throughput. The
Ml uses mb defines 4 bits Gigabit Ethernet ase Gigabit Media dependent ner
face (GMIN and anses 8 bis at à time.

‘02.3 (Fast theme compatible with $023 Eher beau they har the same physical
characters Fast Eihemet and Ethernet se the same mime transmision un (TU) ts
‘the same MAC mechanisms and preserve the frame formar thats sy 1ascT Eiern Bs
ily Fast theme jot based on an extenso tothe IEEE 802.3 specication except htt
‘les sped increase of 10 mes that of LT.

Here are he expanded IEEE Ethernet 802,3 standards
100BaseTX (IEEE 802.58) ELVTÍAcatgory 5,6, or 7 UTP ewo-pirwiring One user per
Segment; up to 100 meters long I uses an RJAS connector with physical str topology and
2 logical bus.
100BascFX (IEEE 802.30) Uses er cabling 62/125 micro multimode fiber. Pin
terpointropoogy up 10412 meters long. I uss an ST or SC connector, which are media
interface connectors

1O000H «CX (IEEE 802.52) Copper wisc pai ll win a balanced coaxial pie
that ean only run upto 25 mein.

Ethernet Cabling

10OOBaseT IEEE 802.336) Category $, our pair UTP wisin upto 100 meters long.
1000BasSX (IEEE 802.3) MMF sing 62.5- and SOsmeroncorezuss an 850 nano meter
laser and ean po upto 220 meters with 62.S.miern, 550 meters with SO-micron.
1000Basc.X (EEE 802.32) Single mode fher hat uses a Pmiren core and 1300 nano
meer er and can go rom 3 lames po 10 klometn.

long-distance cabo tht isnot suscepsble o EMI high speeds,

Ethernet Cabling

Ethene cabling isan important discusion, especially if you are planning on aking the Cisco
‘xa Thee types Eihemer cable are aaa

© Seraighe through cable
+ Crossover cable
+ Rolled cable

‘We wil oo at each in the following sections,

Straight-Through Cable

The straight throug cables sed to connect
+ Host to switch or bu
+ Router oswich o bub
Four wies ar usd in tag through cable connect theme devices. is at simple
orte hipo Figaro 1.2 shows the our wins se in awrughechrngh Etre cable
Note that oly is 1,2, 3,and 6 are wed Jus com to 1,2102, 0 3
ou be up and coworking inno ime, Hower, remember that this would be an xem only
bie and olde work wih oc, Token Ring, ISDN, and o on

FIGURE 1.22 StaightihroughEihemat abe

© Chapter 1+ Internenworking

Crossover Cable

The crossover cable canbe used 0 comes
Sich 0 switch

+ Hubrobub

+ Hos to how

+ Hubo sich

+ Router direct to host

The same four wiesarewsedinhiscable asin the straight through cable just connect di
foro pinstogetber. Figure 123 ho Bow the fries re wsedinacromover Eiheme abe

Notice har instead of connect 110 1,210 2,and soon, here we connect pis 110 Jand
2106 onsach side of the able

ute puse

Rolled Cable

Although rolled cable int used to connect any theme connections together, you an sea
role Eihene abe vo cometa hos 1 a router console serial communication (com) part.

you have a Cisco route or switch you would use this able to connect your PC running
HyperTerminal to he Cinco hardware Eight wires ae used in this cable o comes seri
devices, although ot al ight at used to send infomation, jst si Ethernet neworking
Figure 1.28 shows the eight wires used in slld cable

to Banda

Ethernet Coding

‘These ae probably the easiest cables to make Because you just ut heen of on one side
ofa steaght through cable ror it over and pu i ack on witha new contr, ofcourse)
‘Once you have he cornet able connected rom your tothe Cisco router or switch, you
can stat HyperTerminal o create a console connection ad configure the device. Set the Coe
Figuraion a follows:
1. Open HyperTerminal and ner a name forthe connection, eisirelevne what you name
it but ala just use Co, Then click OK

|

Sa

3. Now set the port sens. The defaut vales (2400}ps and no low contol hardware)
il nor work; you must set port stings a shown in Figure 125.

[Notice thathe Bi rt now so 9600 and the ow controls sto None. Ath point,
ou can ick OK and pres the Enter key and you shoul be connected to your Cinco device
Console port

‘We've takena look atthe various RJAS unshicded wise par (UTP) cables Keeping his
in mind, what cables wed betwen the sis in Figure 1.26?

In order for host Ato ping host B, you needa osoner cable connect the wo switches
together. But what types cabls ae used in the network shown in Figur 1.272

Figure 1.27, there area arc of ale in we. Forth conection betwen the thes,
swedobvious wea crossover cable wesw in Figure 23. The robe se havea cow
Sole connection that se alld cable Pls he connection from the router the sich is
A sait through cable a true fr the host othe switche, Kecp in mind that i we had
seria connection (which wedon') it would ea V.35 hat due 1 connect us toa WAN,

2 Cheptor > Internonworking

FIGURE 1.26 Por singe for a old cable connection

FIGURE 1.27 RUS UTPcabiequestion#?

E57

22322

Data Encapsulation &

Data Encapsulation

When host transmit data aros network to another dei, he dats goss through nap.
ulation: Ki wrapped wich protocol infomation a ach layer ofthe OST modal. Each ayer
commente only with sper layer on the recivig device

To communicate and exchange information, cach layer wes Protocol Data Unis (PDU.
These hold the control infomation aac tothe dts at cach ayer of the mode. Thy are sa
ally attached 1 the header in front ofthe data ik but can alo bei the rar, or cd, of

"ach PDU attaches othe data by encapsulatngit reich ayer af the OSL model, and each
has specific name depending on the information provided in ach ende. This PDU infor
‘maton rad only bythe per layer onthe receiving device. After red,’ sipped of
find the daa is then handel othe next ayer up

gure 1.28 shows the PDUs amd how they atach contra information teach lye. This
‘igure demonstrates how the upperlayer use datas converted for ransmision on the ne
‘work. The data strom the handed down othe Transpo layer, which es up a vial ir
‘tthe eciving device by sending overs synch paket. Next he data steam is ron up
Into smaller pieces, anda Transport layer header (a DU) rat and attached the header
ofthe daa fel now the pee of data called a segment. Each segment sequence so the
ata area cam be pat back together on the receiving side exaedy us it was tensed

Esch segment is then handed wo the Network ayer for seworkadessing and rating
‘heough he internenwork. Loge! address for example I) used to prtcach segmento
‘cote network. The Network layer protocol adds a cool header tthe segment handed
‘down ramche Transport ye, and what we have mo sale packet or datagram, Rem
berthatıhe Transport and Nawork ayers work together ebuild data team on ae
ost, but not par of thse work to plc their PDUs on à cl network segment wich
the only way to ge information 10a router or hos

Ca Tiara]
Ceras T tw |
CO —]

COMET

“Chan

+ ntornonworking

Is the Data Link layer ha responsible for aking packets from the Network layer and
pacing them on che network medium (able or wires). The Data Link aer encapsulates
‘ach packet in frame, andthe rame header cris the hardware address ofthe source and
‘Station hosts. If he destination device ona remote network then the eae sen 0 à
router to he routed throgh an interncework, Once it gts othe destination network, now
Frame sed to get the packer othe destinaron bos

"To pu this frame on encore mus fa be pur mo a digital ina. Sine frame is
really loa rompo I and Om the Physical layer responsible for encoding tes git io
dial signal, which read by devices onthe same local network. The reciting dev al
Synchronize onthe digital signal nd xr (code) {he and 0s rom he digital signal. Auch
point the devises bu th frame, run a CRC, and hen check their amer ains the answer
de frame’ FCS cd. Wit matey, the packet spl fom the Fame and what's ee ofthe
frame isdiscarded. This procs scaled de encapsulation. The packet ishandeto the Newark
lar whee the adres cho IF the are matches the segments pal fom ee packet
and what leo be packet isdiscrded, The segments processed atthe Transport ayer which
roble data seam ad acknowledges tte transition ha trend each pice,
Tether happy hands the data steam to the upper layer aplication

Aa tansmiting device, the data encapsulation method works lik his

2. User information is converted to daa for transmision on the network.

2. Datais convened segments anda reale connection sr up between the transiting
and receiving hos

3. Segments ae converted 0 packets or datagrams, and a logical addres i placed in the
ender each packer an be outed through an internet work

4 Packets or datagrams ae conser frame fo transmision on th local network, Hard
ware (Ethernet) address are un to unique identi henson a Incl network segment

5. Frames are comered to bis, anda digital encoding and cocking scheme swe
{6 To explain tis in more detal sing the ier addressing I use Figure 1.29,

se soca Pen | Dato mm
rant | sc | e rc =

Den
same [Deion sacar] como

Ks

CT

Data Encapsulation —

Remember that a data stream is andl down fom the upper layer tothe Transport ayer
As tecnicos, we wally don’ care who the data steam comes from because that really a
programmes problem Ourjob ito rebuild the dat ream ably and hand tt the upper
layer on the ceiving device.

Before we o further in ou discussion of Figure 1.29, er’ discus por numbers and make
sure we understand them, The Transport layer ne port numbers to dein both the viral
Srcui and the upper lye process, ab you can Se rom Figur 130.

the Transport layer

3 El

Des Vaca ee sr
ole

The Transport ayer takes the daa stream, makes segments ou fit and sables rei
ble session by creating virtual cit I then sequence (hum) each segment and us
äcknowledgmens and flow conto: you're using TCP, the viral rei dein by the
source port number. Remember, he hot jus makes this up starting a port number 1024
(O though 1023 ate reserved or well-known port number), The destination port number
eines th per layer proces (application) char the data scam is handed 1 when the data
‘ream sec echt onthe racing hot

Now tharyou understand por numbers and how they ar wed atthe Transpor lye, e's
80 back to Figure 1.30. Once the Transport ar header information is added othe pice of
ar, it becomes a segment and handed down tthe Network layer alongwith the destina
‘ion IP addess. (The destination IP address was handed down fom the upper ayers tothe
Transpor layer with the data steam, and i was discovered through a name resolution
‚method at he upper ayers probaly DNS)

“The Network layer adds header, and ads the logical addressing IP addese) 10 the
ont of each sent. Once th header added to the segment the PDU iscalled à pack.
‘The pack has a protocol field that describes where the segment came fom ther UDP or
TCP)soitcan hand the segment tothe correc protocol atthe Transport ayer when reaches
the ching host

sch

+ ntornonworking

‘The Network yes response for fining he destination hardware des that dictates
‘whet the packer should be en on che aa network doc his by ing the Address Res
‘lation Protocol (AR) something talk about more in Chapter 2. Pathe Network layer
Tooks attestation IP address and compares that addıesto sown source IP addres and
subnet mask. Hauts otto bea local network request the hardware address of the local
hose is requested via an ARP request I the packet is destined fora remote hos, IP wil oak
forthe IP ads of the default gateway (route) instead,

The packet slong withthe destination hardware adress of ihe the acl hos or debule
stay then handed down tothe Data Link ayer. The Data Link ayer will adda header
to the font of the packet and the ice of data hen becomes a frame. (We ell ea frame
Pause both header and a rie are added t the pack, which makes the data resemble
Bookends or frame ios wl) This is shown in Figure 1.29. The ame use an Ether Type
fe describe which protocol the packet ame from atthe Network layer. Now a ep
redundancy check (CRC) run om the frame, ad the answer tothe CRC placed inthe
Frame Check Sequence fl found in the aie ofthe Fame

The frames now ready to be handed down, oe bata time, th Physical layer, which will
se Bt timing rue to encode the ata in digital signal Every device on th network segment
"il spmehronize with the clock and extract the Ts and Os rom the dial gna and bil
Frame. Arte frame eu, à CRC ru o makes the frame okay eveything en
‘ut to be al god, the boss wl check the destination ares to see the frame or them

al his making your ees cos and your brain rez, don’ fea. lhe gong oer
sch how data i encapulated and routed through an intrnenwork in Chapter 6.

The Cisco Three-Layer Hierarchical Model

Mont of us were exposed Hierarchy cryin ie Anyone with older siblings earned what it
‘was like to be athe bottom of he hieranchy- Regards of where you fist discovered her
archy, today most of us experience itn many spots ou vs ri Perry that lp us
‘understand where things belong, how things together, and what functions go where I
bring order and understandably to otherwise complex modes I you want pay rior
instance, bicrarchy dictates hat you ask your how, not your subordinate. Tha the person
‘whose ole ist gran [or deny) your request. o basica understanding hierarchy helps
scr where we should go to ge what we ned
irarch has many ofthe ame heneit in network design that it docs i cher arcas of

Be. When use properly, e makes networks more predictable helps us define which ares
should perform cin fonctions Likewise, you can use wos such a access iss at certain
level Nicola! network and avid them a others

Ler’ facet Large networks can be extremely complicated, with multiple protocols,
ail configurations, and diverse technologies. Hierarchy helps us summarize a complex
calcio of eta ito an undermandable model. Then, as specie cafigurations are
‘needed the model dis the appropriate manner in whch to apply them.

‘The Cisco ThreeLayer Hierarchical Model #7

The Cisco hierarchical model can help you design implement, and maintain a salable,
reale, cont-fetvehicrarchicaliternctwork, Ciao defines hace layers of hierachy, a
‘shown in Figure 1.31, each ith pei functions

“The following are the three ayers and tei pial actions:
+ Thecor layer backbone
+ The dtebution layer routing
+ The acess ayer switching

sch layer has pci responsibil, Remember, however, ha he thre ayer ar local
andare not necessary physical devices. Consider the OS model, another logical earch. The
‘even yes describe funcions but no sea prtocls righ? Sometimes a protocol maps
to more than one layer ofthe OSI modo and somme multiple protocol communi wäh
gl ayer Inch same way, when we bul physical implementations o hierarchical nt
‘wor, we may Rave many devices a single layer, or me might have a single device prforming.
Tnctons a two layers The defino ofthe pers ls legal oot physical

"Now, les ake a closer ook a each of he ayers.

The Core Layer

“The core er ay th cor of the network At the top ofthe hierarchy, the core yer i
response or ramsportin large amounts of taf bth elabl and quickly. The only purpose
ofthe neos core lye to switch tras fast ax posible. The ral wranspored across

. chaps

+ ntornonworking

hecoreiscommonto major of srs: However, remember that ser datas processed atthe
erh ayer, which forward the requests wth core if need

here ia ur inthe ore very single er an be ft, Therefore, lt tolerance
at ths ayer isan sue The cores ly se large volumes of taf, so speed and latency
are diving concerns here Given the function ofthe cor, we an now consider some design
Species. Let str ith something e dn’ wane o dos
‘+ Donte do anything slow down taf. This includes using aces iss routing between

viral eal area networks (VLAN and implementing pack ein,

+ Don't support workgroup acces er.
+ Avoid expanding the cor (Le, adding routers) when the aterncrwork gros I peror-
ne a Bs hace ths Son, ie it omc cain
[Now thor ate afew things hat we want o do as we design the core
1+ Design the core for high reliability. Consider dat ik technologies that facie Both
spect and redundancy, sich as FDDI, Fast Eshemer with dunn inks or even ATM.
+ Design with sped in mind The core shoul have ver itl ney.
1+ Select outing protocol with lower convrgece times. Fast and edundant data link con
evi is o help your routing tables ar shot!

The Distribution Layer

“The distribution layers sometimes refer a the workgroup layer ands the communica
sion pon between th aces layer and the core. The primary functions of the dsrbution|
layer are o provide routing, filtering, and WAN acces and vo deere how packets can
access the core, if cede The distribution layer must determin he fastest way tha network
sevice requests ar handled for example, how a file requests forwarded to server. Aer
{he distribution layer determines he bt path, forward th gust the cor aer nec
sam The core ayer then quickly transpor the reqs to the conc serie

“The irren ayer the pact implemen polis forthe network. Here yet can eerie
considerable leit in defining network operation. There are several actions tha ena
‘Should done athe iron layer:
+ Routing
+ Implementing tools (uch a acces ist), packs fikering. and gung.
+ Implementing security and nerwork poles, including address translation and firewalls
+ Reibung between outing protocols, ining static rouing
+ Routing henen VLANs and other workgroup support functions
1+ Defnig broadess and malin domains

“Things to avoid atthe disribution ayer ae limited to those functions har exclusively
along to one of he ober layers.

Exam Essentials ®

The Access Layer

The aces layer controls user and workgroup access o inernework resourses. The asses
layers sometimes ele asthe destop layer. The nto sources mos users aed Wi
available locally. The dstabutin ayer handles any trafic for remote series. The follow:
ins are some ofthe functions to be inuded at th ac ayer:
+ Continued (om distribution ayer use of access conta and plies
+ Creation of separate colision domains (segmentation)
+ Workgroup connectivity no the distribution layer
Technologies such as DDR and theme switching ae frequent se
Static ruin (instead of dynamic routing protocol) is cn her as wel,
already noted, hr separate lee ds nor imply re separat routes, There could
fewer or there could he mor, Remember, th à laered approach,

inthe accesar.

Summary

‘Whos! know hs seme lik the chapter hat woulda’ end, ut did—and you made
throught Yare now amed wth son of fundamental information; you're dy o build
‘pont and are well on your way to cerati.

Trane by discussing simple, bac networking and she differences between colin and
‘broadcast domains. also discuss the various devices usd in an nernework,

Ten dscised the OSI made te seven ar model wet cp application developers
design application hat can un on any type of system or network, Fach ayer has special
jobs and ec responsbles witha he model to ensure that solid effective communications
do, in ct, occur. provided you with complete details of each yer and discos how Cico
‘ews the specifcatans ofthe OST model

In addon, cach yer inthe OSI mode species diferent pps of devices 1 describo dif
fort devices ale and connector, se a ich ayer. Remember hat hubs ae Pil ayer
vcs and repeat the digi signal al sens er ih one rom which twas cid,
‘Switches some the nctwork ig kırdware ares and break upon domains Routers
rk up Broadcast dois (and colin doit) and we logica addrsing send packets
through am iremos

as is chapter covered the Cisco three layer hierachica model. I describe in deilshe
bre yes and how each i ase wo help design and implementa iso itemetwork. Weare
‘ow gang to move on o IP addressing in the no chapter

Exam Essentials

Remember he posible causes of LAN traffic congestion, Too many hoss ina broadcast
domain, broadest storm, mltcsing, and low Bandwidth ae al posible causes of LAN
afc congestion.

Cha

+ ntornonworking

Understand the difference been colision domain and a broadcast domain. Colton
domains an Ethernet term usd to describe a network allo of device in which one par
‘ula device ent a packet on a network segment forcing every her device on hat same
sena to pay anenton tot. Ona broadcast domain, a sr of al devices on a network ey
iment car al broadcasts sen on hat mo

Understand de dire beten a hub, a beige, a sich, and a router. Hubs create one ol
Ion domain and one rondes domain. Bridge beak up olson domains bt ct one are
Pnau domain. Thy se hardware asics o ir he network, Sitch ar ely jst
mal por bridges with more intigenc. They break up clio domain but cres on age
Brandes domain by default Swiches uschardwar address 0 fier be network. Rouen break
up bras domains (nd colision domains) and us logia addrsing o fer he network,

Remember the diffense between connosion-aientd and connections network servis.
Connection oriented esces ue acknowledgments and low contol to crete a reliable sesion.
More overhead is wid than in oonestinless network service. Connections serves ae
used send data with no acknowledgments o ow contol. Thisisconsidered unreliable

Remember the OSI ayers. You must remember the seven layers ofthe OSI model and what
Funcion ech ayer provides. The Application, Presentation, and Sion layer are upper yer
and are responsible for communkating fom a user inerlace o an application. Th Transport
layer provides segmentation, sequencing, and viral cc. The Nework Layer provides loge
ial nerwork addresing and coming through an itemerwork, The Data Link layer provides
framingand placngof data on thenetwork medium. Th Physical layer esponsble for aking
ls amd Os and encoding them nt a dipl nal for ramsmison on the network sont
Remember the type of Ethernet cabling and when you would us hem. The therapies of
‘ales ht can be cated om an Ethernet cable are straight through o connect a PC's or
routers Estres interface o à ul or switch, crossover o connect hub to hub, hub ©
Sich, wich to sich, or PC o PC) and rolled for a console connection from a PC toa
router or sich).

Understand how to connect a console cable from a PC 104 comer and start HyperTerminal.
Take rolled cable and connect from the COM port ofthe host othe como port of
router Star HyperTerminal and se the BPS to 9600 and flow conta to None.
Remember the hr layer in the Cisco thr layer moda. The thre layers inthe Cinco
crache model ae the core distribution, and aces layers

Written Lab 1

In his section, you lcompltethe following labsto make sure you've gore information and
sonceps contained within them lly il in

+ Lab 1.4: 051 Questions
+ Lab 1.2: Defining the OSI Layer and Devices

Ween abt 8

+ Lab 13: ensifing Colson and Broadcast Domains
+ Lab 14: Binar Decimal exadcimal Convenios

(Phe answer tot writen bacon be found following theannwerstothereview questions
for this chapter)

Written Lab 1.1: OSI Questions

Answer the following questions about the OSI mode:

1. Which layer chootes and determines the avilabiliy of communicating parses along.
wich he resources necessary toma the connection cooedinats partnering application,
“nd forms consents on procedures for controling data it and or recovery?

2. Which yer is responsible for converting data packers from the Data Link layer ito
letra signals?

2. Atwhichlayer routing implemented enabling connections and path lotion beten
no end sens?

4. Which aer defines how ta à forma, reset, encoded, and converted for se on
the network?

5. Which layers responsible for rating, managing and terminating sessions between
applications?

{6 Which layer ensures the trsworhy transmission of data across a physical ink ads
Primary concerned with physical addresing line discipline, network topology or
hotification, ordered delivery of frame, and flow conta?

7. Which ayeris use for reliable communication beeen end nodes over the network and
provides mechanisms for extablnhing, maintaining and terminating vial eeu

transport alt detection and recovery and cooling the How of information?

‘Which ayer provides logical addressing that routers wil we for path determination?

oe

Which apr pci voltage, wir spend ad pinout ables and moves is tween die?

10. Which layer combines is ino byes and byes into frames, ses MAC addressing, and
provides error detection?

2. Which ar s responsible fr keeping the daa from diferent applications separa on
the network?

12. Which layers represented by frames?

13. Which layer represented by segments?

16. Which layer represented b packets?

15, Which layer is represented by bis?

16. Poe following in order of encapsulation
+ Packets

a + Imernasworking

+ Segments
1. Which ayer segments and reassemble data ino a data stream?

18. Which layer prosidesthephysial transmission ofthe data and handles erornorfcaio,
network topology, and flow conc?

18. Which ayer manages device addresing, racks the location of devices on the network,
and determines the est way to move data?

20, Whats he bt length and expression form ofa MAC adress?

Written Lab 1.2: Defining the OSI Layers and Devices

Flin he blanks withthe appropriate Layer af he OS o ub, sch, or router device

Description Device or OSI Layer

“This device sends and rsche information about he
Neon layer

This ayer restes veal crei ofre tansmiting benne
ns end stations

“This layer ses serve aces pois.
“This device uses hardware address to fer a network
Erne is defined at these ayers

“This ayer supports flow contol and sequencing.

“This device can measure the dance o remote network
Logical addesing i used a this ayer.

Hardware address te defined at his ayer.

This device creates one big olson domain and one large
broadcast domain.

“This device rats many smaller collision domains but the
ctwork is on large broadcast domain

“This device an never un fal apes.

“This device breaks up collision domains and
broadcast domains.

Weentabı 9

Written Lab 1.3: Identifying Collision

and Broadcast Domains

In the following exhib dns the number o colision domains and broadcast domains in
ich specified device, Eich device is represents by ltr

À Hub

8. Bridge
Switch
D. Router

Written Lab 1.4: Binary/Decimal/Hexadecimal Conversion
A. Conver from decimal IP address 10 binary format.
Complete the following tablet expres 192.168.1015 in bi

format.

ne 6 D Pe 4 2 1 Bay

Chapte

+ ntornonworking

{Complete he following table 1 express 172.1620.5 in binary format,

ns ot Binary

Complete the following table o express 1011.12.99 in binary forma.

ms GO HD 16 8 4 2 1 By

Convert he following from binary formar o decimal IP address

Complete be following tabl o expres 11001100.00110011.10101010.01010101 in
‘eval IP addres format

DS 6 HD 16 De

“Complet he following table to express 11000110.11010011.00111001.11010001 in
décimal IP adds format.

MSG M 16 8 4 De

Ween abt 8

‘Complete she following tablet express 10000100.11010010.10111000.10100110 is
decimal Padres foma,

DS 6 5 16 8 4 Dei

‘Conver the following rom binary format to hexadecimal
‘Complete the following table o expres 11011000.00011011.00111101.01110110
in hexadecimal

We Hexadecimal

‘Complete the following tablet express 11001010.11110101, 10000011.
in hexadecimal

mor

DS 6 M 16 8 Hexadecimal

‘Complete the following abeto expres 10000100.11010010.010000110110011
in hexadecimal

DS 6 D 16 8 4 2 1 Hexadecimal

Chapte

+ ntornonworking

Review Questions

“Tho following questions ae designed to test your understanding of hie
chapter materia For more information on how to et edons ques

Fons, lease sao this book's Invoduction.

A ci host has lod cin al fie sgments that hou acknowledge. secan
hc hos doco improve the cable ofthis communication sion?

A Send a difkrene source por umber
B. Restart he viral it
©. Decrease the sequen umber,
Decrease the window i.
[Which elds ar contained wäh an IEEE stem fame ade? (Choo two.)
A. Sours and dsinaien MAC des
8. Sours and destination neowrk aes
©. Sous and dination MAC address and sour and demon network ables
D. Fosa
Which ayer 1 devices canbe sed enlarge the area covered by singe LAN segment?
(Choos wo)
Switch
Nic
Hb
Repeater
RIAS anes

mos»

Sepmenation of daa seam happens at which yr of he OSI mode
A Physical

B. Des ik

©. Network

D. Transport

[Which ofthe flowing scribe outer anton? (Coot four)
A Packer witching

B. Colon prevention

©, Pack filtering

D. Broad domain enlargement

E. Imceraork communication

Broads forwarding

G. Pak cken

Review Questions 9

Routes ops ely _ LAN sits per at per the habs operate a er _
‘Word pri peat atiyer

a7
8 52 Lame
3.217
0.2807

hen das nest which the oct order
A Data, rams paket, seen, bic
18. Segment ata, packs fame bi
©. Data segment, packt, ame, bic
D. Dat, seen, rams pues, bie
‘Why dos ar communication id we he aed OS ference model? Choose mo]

A. Iedividesthe network communication proses sale and simplrcomponens, ths
sing componen esloment de and touting

1% Irenbls equipment rom dient render we the ame con compan, ts
‘ving research and depen funda

1. Iesuports ee evolution of mule compet standards and thus provides business
‘opportnites or euipment manufactures.

D: trencouragsindstry standardization by defining what funcions our a each yer af
she mode

ponds Fame by hh hangs in funny non eun
‘ha ate wo purposes for segmentación witha bridge?

A. Toad mor evade domains

©. To cet more colon domain

Todd mor bandwidth for ur

D. Toll more bossa for es

‘Which ofthe following are unique characteris of hale Féhemet when compared.
Faldas Etter? (Choate two.)

A Halslpl Benet operates ina shared alison domain

8. Halduplex cet operates ina pet ellison domain.

(©. Haltlupls herr hs higher cine throughput,

1. Haletuplex arms has lower sie though

E Halduplex Bent operates ina pete broadest domain.

Chapte

+ ntornonworking

‘You want vo implement network meio hat i not see EM. Which pe of
ling soni you we?

A. Thcknetcone

8 Thinnet osx

©. Category S UTP able

D. Fiteropiceble

Anne, sequencing and low contol at characters of which OS ayer?
A Layer?

B Layer
©. Layer
Do Layer?

Which of he flowing ae ype of ow contol? (Chose al ha pp)
A fin

B. Curthough

©. Windowing

D. Congestion avoidance

VIAN:

Which ofthe flowing types of connections can well duplex (Choose three.)
A Hubo bu
E. Switch o ich
Hat ose
D Swich hb
Switch hos

ati the purpose of fw contol?

A. Tornar that data cesan ian acknowledgments nt resied

B. To ressemble segmensin he cers rer a the destination device

©. Toprovdea meat forth einer gover the amount of data set by the sender

D. To regulate tbe size of cach segment

Which hee temes are tro about he operation of fall plex hem newark?
“There are no colon in duplex mode.

A dia switch por required or ech fal dul ode.

tt hub por ar configured for fal dupl mode.

{na las virent host ntc card mus check for he vail ofthe
coo media before rang

E The hosted urdand he th por muse he cale of operaigin fal lps mode

sor»



».

Review Questions ©

‘What type of RJAS UTP cae asd between sich

A. Sigo

8. Gromnercabe

©. Gromoner wih a CSUDSU

1. Gromener wih rater in betwee he two anche

How does ost oman Ethernet LAN ka when rat fer colon has cure?

(Choose)

AL In a CSMAVCD clin domain, multiple tations ca sscesflly trans data
seuhancousy

8. Ina CSMACD collision domain, ations mue wait uni themed inna in ne before

©. Youcan improve the CSMAVCD network by adding more hubs

D. Aer a collision, the station tha detected the collision has fs peony to rend the
dos dt.

|. Ara colision, al sans run random taco ori Whe he backoff delay
ein has expe, all tion hase equal pinky 0 wane as

Aer alain, alain involv rin neni cho ago andhen sho
‘ze with cache pie to tasting dats

‘What ype of RJAS UTP cable do you we 0 connect a PCs COM port toa router or ich
console port

AL Seaighe though
8. Coonorer sable

©. Crowoner wih a CSUDSU
D. Rod

You have the following binary number
jonom

‘What are ie decimal and beraecinal equivale?

@ chap

+ ntornonworking

Answers to Review Questions

1. D-Ansehinghst can conta theese by ing ow contro (TCP ass Windwing by
cia) By decesingthe window sob cine hoscanslow dwn he rain hos
{othe echo docs at ace bien.

2 A.D. An Ethernet frame has source and destination MAC addeses an Ete Type eld
teeny the Norwork ayer proc, the data, and the CS il thar Bolte answer
tothe ORC,

3. CD. Not hat ou rely want to enlarge a single lin domain, bt hub (pat
‘spate il pod his fr you

4D. The Transport ayer sches are da seams fom th upper layers and breaks hes up
ino smaller pisces ale pres

5. AGE, G Router provide packet switching, ack fering Inernnvork communication,
and pathos

6B Routers operate at yer 3: LAN switches operate at yer 2. theme hubs operate at layer
1: Word posing aplication communica tthe Appian lye ire do wot
‘operate at yer 730 theater would he ae

7. Che emsplaton metho dt, spent pact, rams bi

A.D. The main advantage of Layer mods that ican allow aplication developers o
‘hange apt of program njustone ayer fh ayer models specications. Advantages
‘tuning he Opec mode ise, ur ae not mid o, he allowing e vies he
‘cower conmnancaon process na sale and amper components, thas siding comp
en development, dsg, and woublshooting it allows mulupl endor dvelopnent
through standardisation of neu components encourages induysandaration by
ii what functions accra cach ayer ofthe mod allows ao peso network
hardware and sofware to commana and prvens changes none ye om ating
‘ther layers dna ot hamper develope

8. B,C. Mies beak up clio domain, which allow more bandwith for ues

10. A.D. Unite fl duplex hal dues bee opera shared olson domain anita
‘Tower cane hour han fall apes,

1. D. crops ale prods a more secure, og distance ae hats not seee o EMI
inerte at igh co.

12. C. Arable Transp layer connection ue acknowladgnent o mas sr all ais tan
mid apd end by. À fable connection find by vi cc tat uses
[sknowledgments, soquencin and flow contd wich ae character the Tramport
Inger ayer

12. À G D. Thecommon ypesof ow onl ar buin windowing and congestion vidas,

Answers to Review Questions #1

BC. Has cannot un lle Eier, Fl dupes muse be wed om pint opie
am encens capable lamina pes Switches and can a all
{plex benwsen cachar, ur à hab san ner un fll du,

15. C. Flow cont allows che reciving esco contol the transmier so the vin dvi
er es or one
16. A,B,E.Ful-dplex means ou are using both wire pes simultaneously end ad eve

at. Vos must ave dead switch po foreach nde, which means You wll no have
alls: Both the host network card and the wich pore mus e cube and eco Woe in.

AS
12, Bo omnes evo switchs tg, you would wea RHS UTP crossover ae

18. B,E Once ransmiting stations on an Ethernet scgmen har a lin, they snd an
‘iene jm signal to case that lation recoge the con. Ar lamina
“Sompletecach sender waits redteminel amount of ine, pls a random tine. Aer both
timers expire they ae fc oran, bu they must make Sur themed is cer before
{ramamiting and tha hy al Boe qual priori

19, D-Tocomectioa router or switch console port, you woul use an RIAS UTP ell cable,

20. You muse able take anny number and comer ito bth devia and hexadecimal
To cometo deal jus al pth Io sing hi vals The vales that re uned o with
han numberof LION ae 128 32 160 422 1 18, To ge he hotadecimal
qual unto bres higher ii into ible), 101 and OLLL. By a
Eng up chs values you gt 1 and, heal, 1 By so the ar OB.

2 chap

+ ntornonworking

Answers to Written Lab 1

4. The Application ers responsible fr finding the network resources broadcast from a

server and adding flow contol and eror contro the application developer choos)
“The Physical ayer takes frames from the Dats Link layer and encodes the sand Os nto
a digital signal for wansmision on the network medium.

»

“The Network layer provides outing through an intemerwork and local addressing,
The Presentation taper makes aretha data sina readable format for the Application aer.
“The Session layer ses up, maintains, and rrmiaaessesions between applications.

eens

DUsat the Data Link layer are cali frames. Assoon au ses ramen question you
Know the answer

“The Transport ayer uses vital ici to create arabe connection between wo hosts.

»

“The Network layer provides cal addrssin, epica IP adireting and routing.

9. The Physical layers responsible for he elestrcal and mechanical connections
between devices,

10. The Data Link ayers responsible or he fami of data paces.
11, The Session yor rats sessions between different hos applications

12. The Data Link layer frames packets recive from the Network lay.

18. The Transport aye segments use data

18. The Nerwock layer rue packs ut sans handed down from he Transport ayer
15. The Physical layer is responsible for transporting I and Os ina digital signal

16. Segments packen fam bis

17. Teanspon

18 Data Link

18. Nawork

20. 48 bts (6 bytes) expressed a hexadecimal number

Answers to Wien Lab 12 ©

Answer to Written Lab 1.2

Description Device or OSI Layer
“This device ends and receive information aboutthe Router

Network lager,

“This ayer crates aval rnit before ransmiing, Transport

Icon tc end tations
“This ayer ones service aces pots Data Link (LLC sublyer)
This device wes hardware address filter a network, Bride or switch

Eton i defined at thes ayer Data Link and Physical
“This ayer supports flow contol and sequencing. Transport

“This device can messur he distance emote network, Router

Logica adesing is used at his yer. Network

Hardware address are defined at this ayer. Data Link (MAC sablayer)

“This device rates one big olson domain and one large Hub
Brandt domain

‘This device creates many smaller collision domsins utthe Switch o bridge
network isl on lange broadcast domain.

“This device can never run fal duplex Hub
This device breaks up collision domains and broadcast Router
domain.

Answers to Written Lab 1.3

4. Hubs One colision domain, one broadcast domain
2. Bridge Two colision domains, ne broadcast domain
3. Such: Four colision domains, one broadcast domain
44 Router: Tre colision domain, thee broadcast domains

Chapter 1+ Internenworking

Answers to Written Lab 1.4

4. Convert rom décimal IP address to binary format
Complete he following table o express 192.168.1018 in binary format,

Decimal 128 68 32 16 8 inary
12 11 0 0 0 © © © 1000
168 1 0 1 0 4 0 0 0 1010
10 oo 0 1 0 1 0 one
15 oo DU 4 nn own

Complete he following table 1 express 172.1620.5 in binary format

Desimal 8 68 32 16 8 inary
vr DD 4 0 01 0 0 1m
16 0 0 0 1 6 © 0 © oma
20 9 0 0 1 0 1 0 0 oo
ss © 0 1 12 Ot o

Complete the following table o expres 1011.12.99 in binary forma.

Decimal 182 Binary
10 0 0 0 0 1 0 1 0 oo
" 0 0 0 6 1 0 1 1 oo
2 0 0 6 6 1 1 0 0 oo
» De a Er er ee re

2. Convert he following rom Binary format to decimal IP ars

Complete the following able 10 esprss11001100.00110011.10101010.01010101 in
mal IP adds format,

Binary Ws 6 5 016 8 4 2 1 Dial
om 1 1 0 0 1 1 0 0 26
oon 0 0 1 1 6 0 1 1 s
wom 1 0 1 0 1 0 1 0 m

own 0 1 0 1 © 1 0 à ss

‘Answers to Wien Lab 14 &

‘Complete he following tablet express 11000110.11010011.00111001.11010001 in.
decimal Padres foma,

Binary Bs oF 8 4 2 Dial
DOTE Bar ar a Be Br
mon nn
mo 0 0 1 1 1 0 0 1 #
MONOGO! 1 1 0 1 0 0 0 1 2

‘Complete he following table to express 10000100. 10100 10.101 1000101001 10 in
decimal Paes forma,

inary US Gt 3 16 8 4 2 1 Decimal
0090100 1 0 0 a
now 1 1 0 1 0 0 1 0 20
won 1 0 1 1 1 0 0 0 14
won tt 0 0 1 1 0 16

‘Conver the following rom binary formas to hexadecimal

Complete the following abe expres 11011000.00011011.00111101.
hexadecima

11011058

Binary MSG BD 16 8 4 2 1 Meadecimal
on 1 1 0 1 1 0 0 0 os
on 00 von m
OO
om O.

‘Complete he following abeto expres 11001010.11110101.10000011.11101011 io
hexadccima.

Binary DS O6 5 16 8 4 2 1 Hexadecimal
ee 1 0 0 1 0 1 0 €
mor D D 1 1 0 1 0 1 6
Te 0 0 o 118

moon 1 1 1 0 1 0 1 1 6

Chapte

+ ntornonworking

Complete the following table o expres 10000100.11010010.01000011.10110011 in
hexadecimal

Binary Rs 6h HD 16 8 4 2 1 Hexadecimal
1009010 1 0 D 0 0 1 0 0 s
now 1 1 0 1 0 vom
ooo 0 1 0 0 0 rs
on 0 rm

Introduction to TCP/IP

THE CCNA EXAM TOPICS COVERED IN THIS
CHAPTER INCLUDE THE FOLLOWING:

X Describe how a network works
+ Describe the purpose and basic operation of the
protocols in the OSI and TCP models
+ Identity and correct common network problems at layers
1,2,3 and 7 using a layered model approsch

~ Implomentan IP addressing scheme andIP Service
network requirements in a modiumsize Enterprise
office network

+ Describe the operation and benefits of using private and
publie addressing

The Transmission Control rotocolintemet Protocol CHAR)
4 suitewascrentely the Department of Defense (Dab) o ensure
as and preserve data integrity, as well a maintain communications
inthe event of catastrophic war. So e follows thats designed and implemented correa
TRIP nerwork can be a ral dependable and relier one In this chapter, coer the pro
tocols of TCP, ad throughout this book, oul learn how to create a marslous TCDA
tk using Co route, of cure,

bin by taking ook athe DoD version of TCM and then compare this sesion
and its protocols with he OS reference model disused in Chapter 1 Internetworking.”

‘Onct you understand the protocols wed atthe varios levels ofthe DoD model, cover
IP addesing and the diffrent class of addresses wed in networks oda

Subrting willbe covered in hopter 3, “IP Subneing Variable Length
‘Subset Mask (SNL and TroubashoctingTCPIP

Las, because broadcast address reo important understanding IP addresing as wel
as subneting, and VLSM, an understanding ofthe various favors of broadcast address
‘cal I Anh wth the various types of broadcast addresses that you just must know

Internet Protocol version 6 wil not he cused inthis chapter, his chapter il focos
solely on IP IP6 wll be covered ia Chapter 13, "IP Version 6 (HP Ako, when discus
ing meme Protocol Version 4, youl writen as jus LP, nor spall IP.

pod For uptoahe-inute updates for choto, lose seo wen late. con

TCP/IP and the DoD Model

“The DoD models basicly a condensed version of the OSI model i's composed of four,
instead of even, yess

+ Proces/Appliction layer
+ Hoste Host ayer

+ Imerne layer

2 Neework Acces layer

CPAP and iba DoD Model @

Figure2 shows comparion ofthe DoD model andthe OS reference model Asyoncansn,
hno are similar in cncep, ur ech has front numberof ayers with ie mms

Figure 2

Te DeD and OS! models

Wen he dilorentpotoolsinthoIP tek ore iscsi, helayers ofthe OS
an DoD model ar trehangetl, In other word, the Inomet ayer ana

"Network yo esco a amo tig ndo no lotto Hort yer and he
Transpo er

Avast array ol protocols combine at he DoD models Prces/ApplicarionLoyer o imc.
rte the varios actives and duties spanning the focus of he OS corresponding top three
layers (Applicaton, Prestation, ad Session). Well be looking sh at those protools in
thenexe arto hischaptr The Proce Application ayer define protocol for modes mode.
pplication communication and alo contol user interface specifications

"The Host Host aer parallel the function ofthe OST Transport ayer, defining pro
tocol fr sing up the lee! of transmision service or applications aces sus such as
‘renting rable n-to-end communication and ensuring the ero re delivery of dat,
Hands packer sequencing and maintains data ive

The Internet opor coresponds tothe OSTs Network laser designating the protocols eating
tothe logical tramo of packets over the etre network. takes care the addraung of
‘oss by ving ther an IP Internet Protocol) adds, a it hands the owing of packets
among mull networks

tthe bottom of the DoD model, he Network Acces liner monitors the data exchange
envcen che host and the network The equivalen of he Data Link and Physical ayers ofthe
OSI mode he Network Acces layer overses hardware ring and define protocol for
the physical transmision of dt

® Chapter 2 + Invoduction to FCPI

oncep and hs

m + TT

Layer Protocols

cally sin neo

CPAP and he DoD Model 71

Telnet

Teint ish chameleon o prtocols—is speci is terminal emulation allows a use on a
emote int machine, called the Telnet cen 0 ac the resources of another machine, he
Tel server. Tene achieve this by pling fs one on the Tene server and making the cent
‘machine appearasthoughi wera terminal iy atache tothe local nework, This projet
‘actualy software image viral terminal that an interact wth the chon remote os,

“These emulated terminals ae ofthe textmode type and can execute refined procedures
sucha displaying menus that give users the opportunity to choose options and aces the
Spplctionson the dupal server: User begin Tenetsenionby rumningahe Telnet cent oft
are and then logging into the Telnet server

File Transfer Protocol (FTP)

{ile Transfer Protocol (FTP) isthe protocol that actualy kts transfer files, and it cn
sh thi between any tuo machines using But FTP ise js protocol i abo à

program. Operating sa protocol, FTP is sed by applications. Asa program ts employed
by werstoperlom il task by hand. FTP alo allows for aceso both directores and es
and can accompli eran types of directory operations such as wean int diferent
ones FTP cams up with Telnet transparent lg you into the FTP server and hen provides
forthe trame of ile

Accesing hos though FTP is only the es sep, though. Uses must shen be subjected o
an autentico login thats probably scurd with passwords and ermames implemented by
Systemalminsrators to eset ace. You can gt around thi somewhat by adopt thease
‘ame anonymss hoch what youl gan acces to willbe mid,

ven when employed by ane manual a a program, FTP uncions ar limited so ing
and manipulating decors, typing fie contents, and copying Fes between has. It cane
sure remote isa programe

Trivial File Transfer Protocol (TFTP)

“Trivial File Transfer Protocol (TFTP isthe sripped-down stock version of FTP uri he
protocol of choise f you know exactly what you want and wher to find pins ey
Lo se anis fast toa I does’ give youth abundance of functions hat FTP docs though
TFTP has no diector-browsing ais it can do nothing ur send and ceive fs. Ths
compact le protocol also skimp inthe data department, sending much smaller Mocks of
ata han FTP, and there's no authentication as with FTP, sos ioscur, Few sis support
cause ofthe inherent security rs,

Network File System (NFS)

Neon Fle Sytem (NES) ia jewel ofa protocol piling in ile sharing. allons evo dif
ferent types fe system wo interoperate works like the Suppose the NFS server sofware
Gs rumingon an NT server andthe NES cin software is ruming ona Unix hos. NES allows
lora portion of he RAM onthe NT server to transparently store Unis ic, which can, turn,
locus by Unis wets. Ese though the NT ie system and Unix filesystem ae unke they

fave diferent cae sensitivity, lename lengths, ccuriy, and o on bo Unix users and NT

‘we can ass ha am fe wit heir nam lester ia thir normal way

Chapter 2+ Invoduction to TCPAP

E

‘When Should You Use FTP?

World Scenario

“mots your San francisco oe ends a SOME fl malade thm right away. What do
you do? Most email servers would eject the emo Beaune they haves limits, Even
er’ no sie mit onthe Sarva, tl would ake a while te son ths big fet SF. FTP

you ned give someone aro fi or you need to gta age ao ram somone, FTP à à
‘oe cole. Smaller les ess han MB) can jst o set va oat if you have th Den
DS ora ab modem. However, most dont alow fies large than MB te oiled,
so FTPÍs an option you shoud consi you rein need of soning and rang arg ios
{Wino isthe dye?) Touso FTP you vélo ost up an FTP cover on the rte 0 that

Bride, FTP tester then mal, whichis another reason tous FP for soning or reciving
largo ts. din because tues TCP and connection aient ho session ds, FTP
‘an somtimes star up whorl, Try that wth your ema lant!

‘Simple Mail Transfer Protocol (SMTP)

Simple Mal Transfer Protocol SMTP), answering our ubiquitous alto ema se a spooked,
‘queued, method of mail delivery. Once a mesuge has ee ento a destination, the message
space a device usa a dik, The serersofare att desination pots a ih ou
lat checking he qucu for msgs, When detects therm, process to dle hem t their
esinaio. SMTP is used to send mals POPS is used o suche mal

Line Printer Daemon (LPD)

“The Line Printer Daemon (LD) protocols designed for printer sharing. The LP, long with
the Line Prater (LPR) program, allows prin jobs tobe pole nd sent the networks
ins using TCP

X Window

Designed for len/server operations, X Window dins a protocol for writing cnuserer
applications based om raphial ser interface (GUI) The ida io alow a program, ld
len, o run on one computer and have it display things through window server on
Another computer.

‘Simple Network Management Protocol (SNMP)

Simple Nenoork Management Protocol (SNMP) collet and manipulates valuable network
information. gathers daa by pling the devices onthe network from à management station
at fixed or random inercal, requin them to discos certain information. When ali well

‘TePIP ande DoD Model 7

SNMP cies something calle a lie report delimiting the operational tits of
Heath network This protocol can also stand at a watchdog oer the network, quick not
ing manage fan sudden vum of event These network watchdogs are call agents and
‘when aberrations occur, gent send an ake called aa o he management sation

Domain Name Service (DNS)

Doman Name Service (DNS) resolves hostamesspecifcly, Internet names, such as
wen. routers in. con, You don'thave wo vse DNS; yow can just ype inthe IP address ofany
eve you want to communicate with. An IP address denies hots ona network and the
Internet a wel, However, DNS was designed o make our Ines car. Think about this
‘What would happen if you wanted to move your web page toa diferent service provider?
‘The IP address would change and no one would know what the nw one war. DNS allows
you to ea domain name to spci an IP address, You an change he IP address soften
35 you want and no one wil know the difference
DNS lud to role a fly qualified domain name (FQDN}—for example mor lame
«como todd, Tame,com. An FQDN aherrchy hac cal laste ye bse on
domain denier
Ifyou want wo resolve th name ad, you eher must type inthe FQDN of todd. ame
‘com orhave device such sa Por router add the sufi or ou, For example, ana Cico
outer, youcan ws th command ip don in name Tama con append each request wich
the lamaecon domain. I you don’ do hat, pou have 1 pen the FQDN to get DNS 10
resolve the ame

A e

SIONS configuration tal.

Dynamic Host Configuration Protocol (DHCP)/Bootstrap
Protocol (Boot)

Dynamic Host Configuration Protocol (DHCP) assign IP addresses o hosts
administration and works wellin sual to even very ge network environ
hardware can be wed a a DHCP serve, including a Cisco router

DDH fes fom Boo in hat BootP signe an IP addres o host but the hosts hard
are address must he ented manual in aBoosP table. Youcanthinkof DHCP asa dynamic
oot? Bur remember that Boo is alo used to end an operating sytem hat host an oot
rom, DHCP cant do that

But ther isa tof information a DHCP seer can proide to a host when the hos s
rues an IP addres fromthe DHCP serve, Her ist of he information a DHCP server
an prod

“address

Subnet mask

ows easier
A ype of

"Chapter 2+ Introduction to TCPA

+ Domain name
+ Default gateway (routes)
+ DNS

+ WINS information

ADCP server can give seven more information than his, bu the tems inthe ist arte
Alien ha send out a DHCP Discover mesage in order to recive an I address sends out
“broadcast both yer 2 and layer 3. The layer 2 broads all sn he, which looks ike
(hic FEFFAEERFEIP. The ayer 3 broadcast 258.255.255.255, which means almenos
andallhoss DHCP sconecionls, which means it uses User Datagram Protocol (UDP) athe
‘Transport apr, ako know athe Hoo Host ayer which wel ak abot net.
Tease you dont biere, here's an example of output fom my tra Ethereal analyze

Etreret HL, Sres 192.168.0.3 (00:08:60:99:43:5e), st: Broadcast
Ena

Internet Protocol, Sre: 0.0.0.0 (0.0.0.0), Dt: 255.255.25.2550
(285.255.255.255)

The Data Link ad Network layers are both sending out “al hands”
He my IP addes!™

‘Brondcat amas val be iscussed in more deta atthe end of
th chapter

The Host-to-Host Layer Protocols

“The main purpose ofthe Hosto-Hot apr sto shield he upper ayer applications rom the

compleidesofthe network. This yes say tte upper lye, “Js give me your data ste

‘with any instructions, and Fl begin the process of getting your information ready o send
The following sections describe two protocols at thi yer

rondes saying,

+ Transmision Control Protocol (TCP)
+ User Datagram Protocol (UDP)

An addon, wel look a some ofthe key ho
por numbers

member, thsi silconsderodLaor 4 ond Cisco reat kes he way
layer à con une sinon gens, sequonsing, and low control,

host protocol concepts, as well she

TOPIP and he DoD Model

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP)akes ag los information from an application and
‘breaks theming segments Iemumbers and sequen: cachsepment thatthe destins TCP
stack an put the segments ack into the orer the aplication intended. ltr these seems are
Sent, TCP (onthe transiting host wats fr an acknowledgment ofthe reeving ends TCP
‘tual ira sesion tant those hat aren't acknowl

Before a ransminig host tarts to send segments down he moda, the sender's TCP stack
contact the destinaron” TCP stack to etabih a connection. Wha erento isknown as
‘sta ia. This typeof communication i called conneciow oriented Daring thi ital
Iandshake,the wo TOP hıyers abo aprc on che amount of information har goingtobesent
before the repens TCP sende hack an acknowledgment. Wh eveything agreed upon in
‘Advance, the pth paved for reliable communication to Lake place.

TOPisa ul duplex connection rind, ela, andaccurat protocol, bu tibia
‘hese terms and conditions, nation to error checking no sal task TCP à ver compl
«ated and not surpris items ofnemwark overhead. And et neo are
‘much more reliable than those of yor his added eliabliy is often unnecessary.

TOP Segment Format
Since the upper ayers js send a data steam tothe protools in the Transport layers dem
‘onstrate how TCP segmento a data stream and prepares it forthe Interne layer. When the
Intern layer ecives the data steam routes the segment packen through am interact
work. The segments are handed othe reeiving host Howto Hox layer protocol, hich
huis the data steam to hand to the upper layer applications or protocol

Figure 2.3 shows the TCP segment format The igure shows the diferen ld within the

FIGURE 2.3. Torsagmentlormet

% Chapter 2+ Invoduction to TCPA

‘The TCP headers 20 yes long or up 1024 bytes with options. You ned to understand
what cach lin he TCP segon

Source port The port number ofthe appliation on he hos sning the daa. (Port numbers
be explained ite ater in tis ston)

Destination port The por numberof he application requested on the destination hos.

Sequence number A number use by TCP hat puts the data hack in the correct order or
retansmis missing or damaged daa, a proses called sequencing

Acknowlagment number The TCP ote thats expected net

Header length The numberof 32-biwordsin the TCP header. This indicate where the data
Bin. The TCP header even one neludng options an integral numberof 32 bis in gh

Reserved. Always seo ero,

Code bits Control functions used ost up and erminte assi
Window The window sac he senders willing to accept, in cts.

Checksum Thecyeeredundancy check (CRC), because TCP dosnt trust the lower layers
and checks everything. The CRC checks the header nd data cs.

Urgent _ A valid fell oly th Urgent pointer the code bi is. so, thi vale indicates
‘he ft from the current sequence number, in octen, wher the st agent of non urgen
data Begins.

Options May be Dora multiple of 32 bis if any. What his means that no pans ave
tebe present option sizeof). However, if any options re used that do not case the option
Fedo toral multiple of 32 is, padding o Os must be sed to make sure the data begins on
32-bit boundary

Data, Handed down tothe TCP protocol atthe Transport aer, which include the upper
layer headers

Lets take a look ata TCP segment copied from a network analyzer:

Tor = Transport Control Protocol
Destination Port: 23
Sequence Number: 1456359907

ek Number: 122056456
Orts: 5
Goce: 201000
‘ck fs valid
Push Request
window exo

reeks: visas

‘TePIP and he DoD Model 77

Urgent Pointer: 0
No TCP Options

We5.r.5.4.5.:5 76.419 5121035120105 11
Bos.umm

Frane Check Sequence: Oxd00000f

Did you notice hat eveything talked about iii the segment? As you can ce fom
‘he number cds in the header, TCP creates lot of overhead. Application devopen may
opt for efficiency over eal to save overhead so User Datagram Protocol was ls
{ined athe Transport layer a an akematie,

User Datagram Protocol (UDP)

you wert compare User Datagram Protocol (UDP) with TC, the former is basicly the
scdleddowa economy model that's sometimes refered toa thin protocol, Like a hin per
Son ana park bench, tin protocol docs ake up a lor from in his case, much band
‘width on a ne

‘UDP docs’ oler al the hella whistles of TCP her, but does do a fabulous job of
ransporting information that docs require reliable delvry—andit does o using fr fewer
eto eure, (UDP is covered thoroughly in Request for Comments 768.)

‘The Regus for Commonts (RFC) frm a series of notes, stars 1960,
out th trnet (origina o ARPA, To nots discuss man epee of
amputrcommunieaton ty fous on networking pote procedure,

gras and concepts but so incio meting ns opa, ná som

“Therearesome suationsin which it woul definitely be wise for deelopersto pt for UD
rather than TCP. Remember the watchdog SNMP up there a the Pros Application layer
SNMP monitors he network, sending intermittent messages anda fy steady low of tats
“updates and alerts expecially when runing on large network The cost in verheadt.tab-
[ih maitin, and cose a TCP connection for each one af tote litle messages would reduce
‘what would bean oterwis heath, efficient nerwork to a damamed-up bog in no tie
‘Another creumanc calling for UDP over TCP is when ely sales handed the
roces /Appkicaon ayer. Network Fle System (NFS) halls is own reliability sus, making
theme of TCP bath impractical and redundant. Ba linares up o hc aplication deve
per o decide whether o une UDP or TCP, not th we who warts to tante dat aser
"DP does no sequence the segments and docs nor care in which order the segmens are
atthe destination, But aftr that, UDP send the segments off and fort about the, I
docs fallow through, checkup on them, or even alor oran acknowledgment of safe
aeval—complte abandonment, Because of this és refered to as an unrchabie protocol.
This docs not mean that UDP infec only ha it doesn't handle nas of relly.

78 Chapter 2 + Invoduction to CPP.

Further, UDP docs’ tete a virtual crt, or doc it contact the destination before
livering information to. Because ofthis, i also considered a comectiontes protocol
Since UDP asumesthat the aplicacion il weit own sy method doce any
“This gives an application developer choice when running the Internet Protocol stack: TCP
for relly or UDP for faster tasters.

Soil youre wing Voice over IP {VoIP}, for example, you realy dont want to use UDP,
cause the segments are out oforder (very common in IP networks), they jus be pase
uptothenext OSI (DoD) layer in whatever order theyre rescived, resin in some seriously
{bled data. On the other hand, TCP sequences the segmento they get put Back together.
inexact the ight oder something UDP jus cae do,

UDP Segment Format

Figure 2. clearly illustrates UDP's markedly low overhead as compared to TCP' hungry
sage Look at he igure caray an you se that UDP don ue windowing or provide
for acknowledgments inthe UDP header?

FIGURE 2.4 UDP segment

les importan for you to understand what sch field inthe UDP segment i
Source port Port number ofthe application onthe host sending the data
Destination port Port numberof the application requested onthe dsiation host
Length Length of UDP header and UDP data

(Checksum Checksum of both the UDP header and UDP data eds

Data. Upperlayer data

DR, lke TCP, doesn't test he lower ayers and uns its own CRC. Remember that he
Frame Check Sequence (FCS) isthe ld tha houses the CRC, which is why you can sc he
FGS informacion.

The following shows a UDP segment caught on a network analyze:

OP User Datagram Protocol

Source Port: 1085
Destination Port: 516
Length: a

veces: vane

CPAP ande DoD Model

Lenses 00 OL 58 96 00.01 00 00:09 00 00 12 0000 00
€C.22..C..€ 2e 03 00 43 02 1e 32 Da 00 0a 00 80 43 00 80
Frame Check Sequence: oxtoo00000
[otc ear low overhead Try o find the sequence number, ack number, and window size
in the UDP segment. You can't Because they just ae there!

Key Concepts of Host-to-Host Protocols

Since you ve se bath a conse oriented (TCP and connections (UDP) proto li acon,
‘would be god to summa ce evo here, Table 2.1 highlights some of he ey concepts that
‘you should keep in mind reading the two protocol, You shold memoria hs able

TABLE 2.1. KoyFostures of TOP and LO

Sequence Unsoquences

Rotable Unrate
Aenowtedgmerts No eeknowledgmant
Windowing Now contar No windowing or flow contol

A telephone analogy could relly help you understand how TCP works. Most o us know
thar before you speak to someone ona phone, you must fist establish connection with that
‘other person—wehrevr thy are, This ike a ial isu with the TCP protocol you
‘were giving someone important information during your convertion, you might say, "You
Know?” or ak, “Did you get that Saying something like his alo ikea TCP acknowl
diment=it designed to et you verification, From time fo time (especial on cel phones,
people also ash, "Are you sl here?” They end thee conversion, with a “Goodbye of
Some kind, puting closue onthe phone al TCP also performs these types of futons.

Alternate, using UDP slike sending a postcard. Todo that, you don need ta contac he
ter ary fs. You simply write your message, address the postcard, and mail This
Snalogos to UDP'sconnecionles orientation, Sine the message onthe postcard i probably
mota matter fife or death, ou dont eed an acknowlgment of recip, Silay, UDP
‘doesnot involve acknowlolgments,

ets aka look a another fi
intl to cach protocol, Figure 2.

„one that incides TCP, UDP and che applications aso

Chapter 2 + invoduction to TCPAP

Port Numbers

‘TCP and UDP must use port member to communicate vih the upper layers caus they're
what hep track diferen conversations croming the network simultaneous Originating
Source port numbers are dynamical signed bythe source host and will equal some number
‘ating 1024 1023 and below ae deiod in RFC 3232 (or just sccm, Sana. or), which
ice what ae called wellknown port numbers

Vital cuits tha don’ us an application witha well-known port number ae assigned
por numbers randomly from a sec ange instead. These port numbers identify the source
And destination aplication or proves in he TCP segment.

igure 2.5 illustrates how both TCP and UDP us por numbers.

FIGURE 2.5 Portrumbors or TC

hoc
E

nso
La

“The diferent por numbers tha canbe used ae explain next

+ Numbers below 1024areconsdced wellknown poet numbersand ae define ia RFC 3232.

+ Numbers 1024and above are wed bythe uperlayerstoset up sion with other hots
and by TCP to use a sour ad destin addresses nthe TCP set

An he following sections, we'll tke a Took at an analyzer output showing TCP sesion.

TOP Session: Source Port
“The folowing listing shows a TCP sesion capture with OmmiPek analyzer software:

Tor - Transport Control Protocol
Source fort: 5973
Destination Port: 23
Sequence Number: 14569907
offset: s
Reserved: 00000
Gee: 1000
‘ck fs valía
Push Request
indo emo

CPAP and he DoD Mode M

Urgent Pointer: 0
No TEP Options
CP Data Ares

150505005 76 40 19 35 1120 19 35 11 20 1995 11
2b 19.35 6. 11 2619
Frame Check Sequence: Oxteoo000

Notice thatthe source host makes up the source port, which in hi cases 5973, The des“
‘ination por is 23, whichis wet tll the rcivinghow the purpose of the intended conne.
{ion (Telnet

By looking at this session, you can see hat the sours host makes up the sous por by
sing numbers rom 1024t0 68535. But why dos Ihe source make up por number? To di
fereiat eeween sessions with different hosts mn rend. How would a server know where
information coming ram Wi di’ havea dierent number from a cng hos TCP nd
the upper layers dont use hardware and logica addresses to understand the sending host's
dress Data Link ad Network ayer protocols do, Instead, hey use port numbers. And
‘sca tosmagin the csv host pet horonghly conte ae ons anche same
‘source port number o to FTD!

TOP Session: Destination Port
You sometimes lok at an analyze and sce that only the source part above 1024 and he
destin por isa well-known pot, shown in dh following ee

TCP = Transport Control Protocol
Destination Fort: 60 orld Wide Heb HTTP
Sequence Number: 9356570

Ack Naber o
offset 7
Reserve 000000
ee 00010
‘Synch Sequence
Winden: 192
Urgent Pointer: 0
TCP options:
Option Type: 2 Maximum Segment Size
Lengths
ms 536

(option Type: 1 No Operation
Option Type: 1 No Operation
Option Type: 4

@ Chapter 2 + Invoduction to FCPI

Length: 2
Opt Value:
Frane Check Sequence: 0443697363,
And sure enough, the source ports over 1024, but the destination port 80, or HTTP serve
‘The server, os ecg hos, il hang he desa pot it eds o.
inthe preceding race, “syn” packet ento dh destination device, The sy sequences
‘what's tlg the remote destination device that it want to create semi.

‘TCP Session: Syn Packet Acknowledgment
"The nox ace shows an acknolgment o the sn packets

TOP - Transport Control Protocol

Source Port: 80 Marla Wide Web HTTP
Destination Port: 1244
Sequence Number: 2873580788
ot. 6
ace: 010010
‘ek fs varia
Synch Sequence
window A
reckon: oras
Urgent Pointer: 0
TEP Options:
Option Type: 2 Mavinun Segment Size
Lengths a
ws 1460

No tore HTTP Data
Frame Check Sequence: Ox66203152

[Notice the Ack #5 vai which means thatthe source port was accepted andthe device
apres create a via ict withthe orinar hos.

‘Ana here again, you can se that he response rom the seve shows the source is 80 and
‘th destination ithe 1144 sen from the originan how als well,

Table 2.2 gives you als ofthe ypkal applications usd in he TCPAP uit, her well
‘known port numbers, andthe Transport layer protocols wed by ach application pres.
TES importan tha you study and memoria this able

"Notice that DNS was oth TCP and UDP. Whether it ops for ne or the other depends on
what is tying to do Even though not the only application that cn use both provoca,
ifs cran one that you should remember in your stds.

CPAP and the DoD Model

TABLE 2.2 KoyProtocas That Uso TCP and UDP,

sueo Ten
HP ao onsss
Fea,

ons

res au

net maks TCP obs sequencing acknowledgments and low onto!
(windowing UDP dos not have relly

The Internet Layer Protocols

In the DoD model there are ewo main reasons for the Internet ars existence outing and
providing single network interface tothe upper layers.

‘None of theater upper or lower ayer protocol have ny functions relato routing —
hat complexandimportane ask belongs ently wth Interner ayer. he Interne ye see
‘ond dy isto provide a single network interface to the upperlayer protocol, Without this
layer, aplication programmers would aed to write “hook” ino everyone ofthe aplica
tions fo each different Nerwork Aces protocol This would nor ony bea pain in the eck,
brit would ead o different versions ofeach application one for Ethernet, another one lor
“Token Ring andso o. To prevent his IP provides onesingle network intra fr th upper
Laye protocols That accomplished, is then he job of IP and the various Nework Aces
protocol to ge along and work together

"A nerwork roads don lead o Rome they lead IP. And ale oherprsocos at his
layer, as wel a al those a the upper layers us Never forget ha. A pas through he
‘DoD model go though IP. The allowing sections describe he protocol at the Internet aer
+ Inert Protocol I)

+ torne Control Message Protocol (CMP
+ Address Resolution Protocol (ARP)
+ Reverse Addres Resolution Protocol (RARE)

+ Proxy ARP

M Chapter 2+ Introduction to TCPA

Internet Protocol (IP)
Inter Protocol IP) sera de temer aer The her protocol found hee merely exist.
support. hold the big ctureand could be sido "call" neha aware of al bene
‘connect networks. cando hi bosse athe machines onthe nrworkhave ofre og
ic des called an Padres, which il cover more thoroughly later in his chap.

Plo a each packs addres. Then using routing table decides where a packt is
o be sent next, choosngthe bes path. The protocol ofthe Network Access ayer atthe bot
tom ofthe DoD made don’ postes IPs elghtencd scope ofthe entire novo they deal
‘nly with physica ins oca networks

"eii devices on networks regirs answering these wo questions: Which networks
icon? And what 1D on that network? Theft answer isthe far adres or logico
“des he correct rec) The second answer se hardware adress he ort malo
Al hosts on a network havea logical ID al a WP adress, This the software, o local,
ares and contains valuable encoded information, greatly simplping the complex task of
routing (Ps discussed in REC 791.)

TP receives segments fom the Host-ro Host ayer and fragmens them into datagrams
{packets it necessary IP then reassemble datagrams Back into sent om the recesing
de, Each atagram sasigned he IP adress of the sender and ofthe recipient, Each router
layer à device) that receive a datagram makes routing decisions based on the packet’ des
‘ination IP addrs

gure 2.6 shows an Peat. This il give you an ide of wha the I protocol has o o
‘cough very ie ur datas sent rom he upper layers ad sto be sento a emote network,

FIGURE 2.6 ¡Phesder

CPAP ande DoD Model &

‘The following fils make up the IP header:
Version IPverion number,
Mende length Header length (HLEN) in 32-ie words

Priority and Type of Service Type of Service show the datagramshould be handle. The
is 3 bits are the pra bits

“Total eg Length ofthe packt including header and daa
entation Unique I packe vale
Flags Species wheter fragmentation should occur.

Fragment ff, Provides fragmentation and ressemble packet iso lars to patina
frame. al allows different maximum transmision units (MTUS) on the Interne

Time 0 Live The time ve st int packet hen itis originally generated Hit dos’
sett where rats to go before the TTL expirs boom i's gone, Thi topa IP packets
‘rom continously ring the nework looking fora home.

Protocol Port ofupper layer protocol (FCP sport or UDP is por 17 [ex]. Alo supports
[Network layer protools ike ARD and ICMP. Can be called Type eld in some analyzes
‘Weil talk about thi el in mor dealin a mine.

Header chem Cy redundancy check (CRC) on header on
Source IP address 32. IP addres of sending sation,
Destination IP address 32-bit IP addres of the station this packet destine for
Options Used for nework testing, debugging, security, and mor,
Data After the IP option feld willbe he upper ayer data,

Here's snapshot ofan IP packet caught ona nenwork analyzer (notice that al he header
information discussed previously appears ere:

19 Header = Internet Protocol Datagran

Version 4
Header Length: 5
Type of Service: 00
Total Length: 287
Laer er: zas

Frageentation Flags: 3010 Do Not Fragment
Fragment Offset: 0

Time To Lives 60

xP Type: 0106 To?

Chapter 2 «Introduction to TCPA

No Internet Datagran Options

The Type Bet typically Protocol el, but his analyer ses san IP Type id
is importa I the header didn't cary he protocol information for he ext layer, IP woul
Know what to do with he data urid in he packt, The preceding example tls Po hand
the segment 1 TCP.

Figure 2.7 demonstrates how the Network layer sees the proocos a the Transport ayer
‘when needs to hand a packet to the upper layer protocol

FIGURE 2.7 The Potoca field in an!Phonder

In this example, the Protocol field rel Io send the daa to the TCP port 6 0" UDP
poet 17 (bth hex addresses) But will oly he UDP or TCP if the daa i par of à data
‘tram headed for an uppe-lyer sevice or pplication, could just as casi be destined for
Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), or some
‘other ype of Network layer protocol

Table 2.3isalisto some other popular prrocols that can be specified in the Protocol id.

Protocol Protocol Number
io 7
{Pin ornato! a
tone °
igre e
ser »
ms a
one o

Layer2 tunnel ap) ns

TOPIP ande DoD Model @

ex. ‘You co nd completo it of prota Fl numbers mean. org/
Peraleda

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) works atthe Network layer ands wed by IP for
‘many diferen serves. ICMP isa management protocol and messaging service provider for
ID menage are crio as IP datagram. REC 1256 an annex to ICMP, which fords
hosts extended eapabiiyin discovering routes 0 gateways

CMP packets have the following characteristics
2 They can provide hosts with information abour network problem
+ They ate enapsubted within IP datagrams.

“The following are sme common events and messages that ICMP relates:
Destination Uneeachable 1a router cart send an IP datagram any further i uss CMP
o send a message hack 10 he sender, asin it ofthe situation, For example take Took at
Figure 2.8, which shows tha interface EO ofthe Lab B router is down

OL Bs sou. Hest Aig commence os Va pes?

wa us
a)
—— |

‘When Host A sends a packet destined for Host B the Lab B router will end an ICMP dest:
ration unreachable menge back to the sending device (Host A in this camp).

Buffer Full IF router memory bffr for ring incoming datagrams fall it will we
ICMP to send out his message unl the congestion bats.

Hops Each IP datagram alloted certain number of route, called hops to pss through I
‘treachesis imi of ops before arivinga is desinain, the as eater to rece tha datagram

Chapter 2+ InvoductiontoTCPA

tesi: The escuioner outer then wes ICMPro sendan obinary mess fomi the send
ing machi ofthe demo oft datagram.

Ping. Packet Internet Groper (Ping) us CMP eco reques and reply messages check he
physical and logic connectivity of machines on an intemetwork

‘Traceroute Using CMP me ut, Traceroute wud to discover the path pckertakesas
ic traverse an intererwork,

Bot Ping and Tacarout ls just allo Trac: Mierosoft Windows usos
tracert allow you very addres configurations n your ntrntwork.

“The following data is rom a network analyzer caching an ICMP echo request

Fags: 00
status x00

Packet Length: 78

Timestamp: 14:04:25. 967000 12/20/03

Destination: 00:20:24:6:0F:a8
Source: 00:80:¢7:38:40:36
Ether-Types 08-00 IP

1 Header ~ Internet Protocol Qutagran

Version: 4
Header Length: 5
Type of Service: 2000
Total Length: 60
dent fier sens

Fragmentation Flags: 2000
Fragment offset 0

Tine To Live E

1 Type: owt 108

Header Checksum: 040

Dest. IP Address: 100.100.100.1

a Internet Datagran Options

1019 = Internet Control Messages Protocol

TOW Types 8 Echo Request
Cr
Identifier: 040300,

Sequence Number: 4352

‘TePIP ande DoD Model ®

ahcdefghisklmop 61 6263 64 65 66 67 68 69 62 6 6 64
farstumabedefgnt 71 72 73 74 75 76 77 61 02 63 64 65 66
Frame Check Sequenc

Notice anythingunus
ne (Network layer tl uses IP odo the Ping ques? The Type Bed inthe
(0x01, which species hate data were car ing owned by he ICMP protocol. Remember
jus aval oad ed o Rome, all segments or ata at go through IT

Be ‘The Ping program uses slpabetin the et orton of ho cht ak ju
{eyo 18 bys by tut une ocur you are pinging rom »
Windows de nich tnt he pa top athe tr Won ote

Include XV or and man stata aga Gee!

lt you remember reading about the Data Link ayer andthe diferent frame spin Chapter I,
sou hold able 1 look athe preceding trace and tell what pe of Eee ame his The
only fire destination hardware ales source hardware ares, and Ether Type The only
Frame hat ss an Ether ype fil cali an Ethene rum

Bur before we geinto the ARP protocal let's ke ame lok a ICMPin ation. Figure 29
shows an intemerwork (thas router, sosa interetwork, ight

E. so

+. sm
a E.

Es Bl u

m

FIGURE 2

¡CP nacion

a

® Chapter 2+ invoductiontoTCPAP

Server (10.12.2 telat to 10.1.1.5 fom a DOS prompt. What do you think eevee! wil
recive sa respon? Since Seve! wll send the Tens data othe default ova, which is
the outer the outer wil drop the packet because here aa network 10.11. nthe routing,
table Because ofthis, Server wil ceive destination uneeachable bac rom ICMP.

Address Resolution Protocol (ARP)

dress Resolution Protocol (ARP) finds the hardware address of host fom a own IP
address Her’ how it works: When IP has à datagram 0 send, it must inform a Network
en protocol, echas Ethernet or Token Ring the destinations hardware addrewon the
local network (e has already ben informed by upper layer protocols ofthe destination’ IP
“des AP docs’ ind the destination host's hardware des in the ARP cache, uses
[ARP to find this information,

As is detctive, ARP interrogates the local network sending ou broadcast asking the
machine withthe spied IP address to reply with its hardware address. So hasicly, ARP
traste the software (IP) address ino a hardware address —for example the destination
machines Ethene board address and from it, dedaes is whereabouts onthe LAN by
Broadcasting for thi ad res. igure 210 shows how an ARP looks to 3 local network

ex AR? rectas adress tothe (MAC) aden.

FIGURE 2.10 Local ARP brosdost

A —

"he following ace shows an ARPheoadcat—notic ar he destncion hardware address
is unknown and is al in ex (al sin Diary) —and sa hardware adress broads:

Pays: oo
status oo

CPAP and iba DoD Mode m

Packet Length: 64
Timestamp 09:17:29, 574000 12/06/03

Destination: FFIFFIFFIFFIFFIFF Ethernet Broadcast
source 0:40:24:48:60:05

Protocol Type: 0.006 IP AR?

ARP = Address Resolution Protocol

andar: 1 ethernet (100)

Protocol owosto 1P

Harenare Address Length: 6

Protocol Address Length: 4

Operation: 1 ABP Request

Sender Hardnare Address: 00:10:24:46:60:45,

Sender Internet Adress: 172,16.10.3

Target Haronare Adéress: 00:00:00:00:00:00 (Sgnored)
Target Internet Adéress: 172.16.10.10

Extra bytes (adding):

Où où où où où
Fran Check Sequence: 0:10000000

Reverse Address Resolution Protocol (RARP)
‘When an IP machine happens tobe a dskless machine, i has no way finally knowing its
AP addres. But docs now in MAC addres. Reverse Address Resolution Protocol (RARP)
scones the enti ofthe IP addres or ess machines by sending out a packt hat
includes ts MAC address and roques or he IP address aigned to that MAC addres. A
designated machine, called a RARP srr, responds with the answer and the entity ess is
‘over, AARP sss th infomation does know about the machine’ MAC adds eam ts
AP address and complete he machines ID porta

Figure 211 shows des workstation asking for its I addres with a RARP broads,

oo ARP rectos Erno MAC) drones to Pade

Proxy Address Resolution Protocol (Proxy ARP)

(On antwork, your hosts can ave more then one faul gateway configured. Thnk about
this. What deba gateway (route) happens o go down? The hor won jus star
sending another outer automaticly youve goto configure that host But Proxy ARP
San actual lp machines on aauhne reach emote subnets without configuring rowing oF
tren dean gateway.

® Chapter 2+ Invoduction to FCPI

FIGURE 2.11 ARP broadcast example

=

L_. aaa] —)

a |

bre

One advantage of using Proxy ARP sha can be added ro singe router on a network
vito disturbing the outing tables fall he the routers ha ve hore too. Bur thet’ 8
serios downside to sing Proxy ARP. Using Proxy ARP wil definitely increase the amount of
trafic on your network segment, and hosts wll have à larger ARP able han usual in order
to handk all the In MA Cadres mappings. And Proxy ARP is configured on all Cisco
routers by default you should dale it you dan’ think you're going to we

‘One as thought on Proxy ARP: Proxy ARP se ally a separate protocol. Irsa service
run by rosters on behalf her devices rally PC) that are separated rom thi query to
nother device bya route, although they tisk they share the sat with he remote device

moons you hav o buy two or more of your Cisco doves), ut well

SG Ayo cn ori ue isos Hot Standby Route Protec! SAP inst,

IP Addressing

One ofthe most important tops in any discusion of TCP is IP addrsing An P address
isa numeric denier assigned to cach machine on an IP network It dsgnars the spite
nation of a device an the network

"ARID address ia sofware aes, not a hardware address—the te is hand oded om
network nera card (NIC) and se fr finding hosts on lca nawork. IPaddresing
‘eas designed to allow hot om one network to communicae with a hos on a deen nt
‘work regards ofthe type of LANG the hosts re partit in.

IP Addessing 8

Before wes it the more comparant of adress, you celo understand some
‘ofthe bc, Fi Fi ging 0 explain som ofthe fundamental of IP addrsing and its tr
‘ogy. Then youl am about he rach IP addrvung scheme and rat IP adden

IP Terminology

‘Throughout his chape youl ean several important terms ia to your understanding of
the lneret Proto Here aa few o gst you started

Bit A biis one dg, cher à 1 or 30.

Byte A Bite 7 or bi depending on whether parity is we. Fr the est ofthis chapter,
aways assume a byte is Bis.

‘Octet An ott, made up of Biss just an ordinary $ bi binary number. In dis chaps,
the terms Byte and ote are completely interchangeable

[Network address This isthe designation sed in outing to send packets toa remote et
work or example, 10.000, 17216.00, and 192. 168.100

Broadcast address The adress used by applications and hosts to send information to ll
modes om a network is called the Broadcast address, Examples include 285.255.255.25
‘hich is allnetworks, all modes; 172.16.255.2, which al subnets and host on net
‘work 172.16.0.0; and 10.255255255, which brondeasts o allsubeets and hosts on
‘network 10.004,

The Hierarchical IP Addressing Scheme

fed 10 as octets o byte, ach containing 1 bye (8 i). You can depict an
twinge of three methods

+ Dowed-decinal asin 172.16.30.56

2 Binary, a in 10101100.00010000.0001
© Hexadscimal asin ACIOJESS

lts examples tay represent the same IP adden Hexadecimal iu wed as often a
oed decimalor Binary when IP addressing is discussed, bt you sil might find am IP address
"ore in hexadecimal in some programs. The Windows Registry a god example fa pro
ram that stores machin IP addres in hes.

“The 32-bit IP address ica structured or hierarchical address, opposed oat or noi
crarchical address. Although either ty of addresing scheme could have Ben se ira
Cha addressing was hosen for good reason. The advantage ofthis scheme that can
handle age number of addresses namely 4.3 Bin (a 32-bi addres space with uo pos
sil values foreach postion—ether Dor live you 2" or 4294,967,296), The dida.
{age ofthe Ht addressing scheme, andthe son 0% no we for Paddreting, lates 0
outing N every address were unique, al routes onthe Internet would need store the

00111000

% Chapter 2+ Introduction to TCPA

address of each and every machine onthe laremer This woud make efcien routing impos
Sible even only a faction of the possible addresses were sed.

The wlio to thi problem to use a vo o thee level hirarchical ad rening scheme
hats structured by network and host or by network, subnet, and hos,

Thistwo-or three-level scheme i comparable oa telephone number. The ist section, the
area code, designates very large aca, The second section, he prefs, arrow the scope to,
‘Toc calingatea- The final segment, the customer number, avomsin on the specific connec
tion Paddrewes use the same typeof layerd tatu, Rather han all 52 bis eig tened
2352 unique identifier, asín la addressing, à par ofthe address is designed a he network
Address and ih other paris designar as her the subnet and hos or js th ode address

In the following actions, Fm pinto discs IP network addressing andthe diferent
dase of addres we can use to addres our networks,

Network Addressing

‘The network address which con also he called he network number) uniguey identifies each
near, Every machine onthe same network shares that neowork address as par of is IP
ren inthe I address 172163056, for example, 17.16 the network addres

The nue address is signed to, and uniquely iden, cach machine on a network. This
par of he address mus be unique bcaus denies particule machine an individual
Ss opposed to a network, which sa group. This number can lo be fer 0 a a host
des. In he sample I addrs 17216-3086, he 306 the node address

The designers of he tert desided create cles of works Based on network sis For
‘he small numberof networks powesing à very lage number u odes, they ete the ake
(Cass A nord. At the ther extreme the Clase C nto, which seve forthe num
‘ous nctwork with small number of noes. The clas disinion for networks Been very
Tange and very sal pliably called the Clas menor

Subviding an IP address no a nework and node addres determined by th lass des
ignationofone's network, Figure 2.1 summariechechree clans fn aut
plain in much eater detal throughout his chapter.

FIGURE 2.12 Summary ofthe tv classes o notons

ELLA!

cee

IP addressing — #

To ensure fine routing, Internet designers defined a mandate forthe leading bis ec
sion ofthe ares for cach different nctwork cas For example, sine à router Know that
3 Class A nctwork address always tar with 0, the outer might he abet speeds packet
on is way afer reading only the ist hit of ts address This is where the address schemes
fine the difference been a Cas Ay a Class By and a Clas C address In ihe next sec
‘ions, discuss the dflerences between these three clases, followed by a discussion ofthe
‘lass D and Class E addresses (Clases A,B, and Cate he only ranges tha reused o
adres hots in our networks).

Network Address Range: Class A|
The designers ofthe IP address scheme sid hat the Fit it ofthe fst byte in a Clas A net
work adres mus always he of, or. Th means a Clas A address must be Ben 0 ad
127 int ise byte, inclusive

(Consider the tolowing network adres

i werurnthe other 7 bit af and hen sun them al on, wel find the Clas A range oct
work address:

oun = 227

So, Cas A network is defined in the Fist ote between and 127, and tc be ls
ormor. (Yes now 0 and 127 are at valid ina Cass A network Milk about reserved
addresses ina minute)

Network Address Range
In a Clas B network, he RFCs sat tha the fs bi of he ist bye mus always be sumed

on bu the second bie must always be tured off M you turn the other 6 isl off and them
An, you wll ind the range fora Class B nework

10000000 = 228
o = 391

Asyoucanses,

Clas neos dei when the fs yt configured fom 1281 191.

Network Address Range: Class C
For Clas C networks, the RFCs define the fist 2 bits of the ist ott a always tured on,
‘bur he thie bi can never be on. Following the same proces as the previous clases, conver.
rom binary to decimal to find the range. Her’ the range or a Cos C networks

11000000 = 192
ronan = 223

Sa you se an IP address that starts at 192 and goes to 223, youl know it isa Class ©
1 ad,

Chapter 2 + Invoduction to TCPAP

Network Address Ranges: Classes D and E
‘The addessheeween 22410255 are eserved for Cas D and E networks Cas D (224-239)
is usa for mulas addresses and Class E (240-255) fr semi purposes but not ng,
ine these type of address inthis hook (and you doa’ need to know tho).

Network Addresses: Special Purpose

Some IP address are reserved for special purpose, so network administrators cant ever

asien these addresses to nodes. Table24 Iss the members oft exclusive te club andthe
reasons why theyre included ii

TABLE 2.4. ReconedlP Across

Network adress orale Interpreted o mean “Wis nemork ora
Network daros of ate Interpreted to mean “all network”
Network 127003 Reserve loopback st. Osigntes he ac!

‘ode and allows hat pode to send aten pacto
‘sat without genaretingnatwork eae

Nodo adress of aos Irsrpretd to mean “natwork cross” or any hos
‘onspectad nework

Nodo address ga ta Interprete to mean “al ne" on ha species
‘network for ample, 1282.25 258 means“

odos” on network 1282 (Ci 8 sro).
nto Paros set tas Used by Caco outra to designate the tl!
Ente Padres set tal (some as Brondest1o all nodes onthe currant newer:
Er Sometimes cad an “als broadest or Ama

Class A Addresses
ln à Cass A network adress, he fis bytes assigned to the network adds and the three
remaining byes are used forthe node addresses The Class A forma as allows

network ode.nade.nade

For example in the IP address 49.22.102.70, the 49 is the network des and 22.102.705
the node adress. Every machine on this particular network would have the distin
work addres of #8

IP Addvessing 7

Clas A neo addresses are 1 bye long, with the fis bit ofthat byte reserved nd the
7 remaining bs avaabe fr manipulation (adresing) Asa result, the maximum number
‘of Class À networks that can be ccs is 12. Why? Beaune ech of he 7 bi position can.
beeithera00ra 1, hus 2, 0F 18.

“To complete maces farther, the network address ofl 010000 0000 reserved to des
‘gnatethe default route (ee Table 24 in the previous section). Additional, the address 127,
‘which seserved for diagnostics, cane he used either, which means that you can real ony
se the numbers to 1261 designate Cas Aneework address. This means the acta num-
cr f usable Cass A network address i 128 minus 2, 0 126.

Ea Tr as 12700. kon ann ond

Each Clas A address has 3 byes 24-bit poston) forthe node address of machine This
means there are 2 or 16777.216-—unique combinations and, therefore, rscily hat
‘many posible unigue node addresses for ech lass A network. Because node addeses with
‘he me partes of all Os and al Ts are reserved the actual maximum sable numberof nodes
for à Clase A network is 2° minas 2, which equals 16,777,218 Either way, that's à huge
amount of hoss on esco wpment

Class A Valid Host IDs
Here's an example of how 1 figure ou the valid host Ds ina Clas A network address
+All host bits off the network address: 10.0.0,

+All host bits on is the broadcast addres: 10.255.255.25,

‘The vad hosts athe numbers in been the network addres andthe broadcast addr
10.00. through 10.255.255.258, Notice ha Os and 255 an be valid hosr1Ds Al you need
Lo remember when tying find valid host address is ha he host hit canal Be sum
‘ff oral be on a ee same vine

Class B Addresses

In a Class network address the fist 2 pts ar assigned 1 the network address andthe
remaining 2 bytes are ud foe node address The formar ss follow:

netnark.netnork.node.nose

For example, in the IP addres 172.16.30.86 the network address is 172.16 and th node
ales 3056,

With network les being 2 byes (8 Bis cach), here would he 2% unique combinations
Buche Irne designers did that al Css network are should sare withthe inary
ii then D. This eves 4 bi postions to manipule therefore 16,38 hat 2) nique
(Cas Bnenwork address

À Class B addres ses 2 bytes for node address. This is 2 minus the two reserved pa
‘een (llOkand all 1, fora ttl of 65,534 possible node addres for each Clas network

% Chapter 2 + Invoduction to FCPI

Glass B Valid Host IDs
Heres an example of how to
Al hos bits tum off is the network address: 172.160.

2 Al hos bits tamed onthe broadcast address 172.16.25525,

“The valid hosts woul! he the numbers in between the network address andthe broadcast
address 172.160. through 172.16285.254,

he valid hows in à Cas B network

Class C Addresses

“The first 3 bytes ofa Class C network adress are dedicated to the network portion ofthe
dees with only I measly byte remaining forthe node address. Heros the format

Using the example IP address 192,168,100, 102, the network aes 192.168.100 and
‘the node adress 102.

In a Class C network address the fs hee hit postions are always the binary 110. The
<alclation sas follows: 3 pres, 24 is, minus 3 reserved postions laves 21 postions
Hence, ther are 2, 07 2,097,182, possible Class C networks

ach unique Class C network has 1 byte use for node address. This leads to 2101256,
mins the to reserved patterns of al Os and al Is fora tota of 25 node addresses or eck
Chi Caetwork

Class C Valid Host IDs
Heres an example of howto find vai hos ID in a Class C neo:
Al hos bits tamed off is the network ID; 192.168.1000,
+ Allhos bits tamed ons the broadcast address 192.168.100.255,

“The valid hows woul! be the numbers in between the network address andthe broadcast
address 192.168.1001 though 192.168.100.254.

Private IP Addresses

‘The people who crested the [Paddresng chem locreated wha we cil prit Padres.
‘These adress canbe sed ona private network, hu by re or rouble through the nee
Ths is designed for he purpose of creating a measure o wll needed security, but i also con
‘sence saves alle IP ads spac.

every hostom every network had o have eal rouble IP addresses, we would have run
‘ut of IP address to hand ut year ago. But by using private IP addres, SP, corpora:
‘ons and home users only nes a relative oy group of bona fie IP address to connect
‘cirnctworks tothe Item, This is economical cause they can use private IPaddreses on
‘heir inside networks and ge longs inc

To accomplish this sh the ISP and the orportion—the end user, no mater who they
rence somthing aod Network Ades Translation (NAT which basicly aes

IP addessing 9

a private IP address and converts for use on the Internet, (NAT score in Chapter 1
"Reework Address Translain.") Many people can use the same real Paddres to transe
‘outonto the Internet. Ding things thin way saves megane of aes space—good for al!

Use?

hat area re question: Should you ue Class A, ls, or oven Class private adress
ing when ating up your network? Let tke Acme Corporation n Fat an example. icon.
‘Banyismoring imo new tung and endsawhole nov network at a vat sis. ihn
A doportment, with about 70 usar ach. You cou probaly queue eno or wo Clas
adresses o ur, ormaybe you could usa à Cas B, or oven alas A st or un.

To rue of thumb in the consulting world i, when you're sting up a cxportenenwark—
regardes of how mal ie-youshould us Class A network ares brea gives YOU
tro mos xt nd growah options For example, fyouuredthe 10.00 0networkadeross
wit 2 mask, then you'd Mave 6553 newer, each with 254 Posts Lots of oom fr
‘ronan with that network!

‘uttyouresetingupahomenctwor vo doper à us C sderessbacsucitisth cast
{or people understand and cola Using the deta Cass mask gives you ono network
it 288 hosts pln fora home network,

{Wan he Acme Corporation, anio 1.1, wa 24 mask the xiethe subnet foreach part.
‘ment mates this easy to design, instal and trouble!

The reserved private addresses are Hdi Table 2.5

TABLE 2.5 RorewodIP Adirees Spa

Adérens Cie Reserved Adare Space|
a 100.00 os 10255255255
co 1721600 ough 17231256258

cise 19216800 twough 192.168.255.288

ae ‘You mustkno our privat adders pel

9 Chapter 2+ Introduction to TCPIP

Broadcast Addresses

Most people ws the term broadest sa nori term, ad mos ofthe ins we understand wha
‘they mean Buc or alas For example, you might sy, "The hos broadcasted hrough a outer
toa DHCP serve" bt, wel ts prety uy that this would eer eal happen What you
probably mean—asing the comet cha fargon—is “The host roasted for an Paes,
[router then onwandedhisaca unis packer tthe DHCP server.” Oh andremmber that with
INA rondes ae pet importa, Da with IVG there re ay roads un RON
her someting to gt you exited bout when you get Chapter 13

‘Okay, Pee rte o broadcast address throughout Chapters and 2, and even showed
ou some example. But ell havent one imo the different terms and wes sscite ith
‘hom yt, and Ws abou time did So ere ae the four diferent brondent (generic tem
Fada) types chat 1 ket define or you

Layer 2 broadcast. These ae set tall nodos on a LAN.
Broadcasts (aye 3). These ar sent all odes onthe network

Unicast These are sent 10 single destination ho

Mulicast The ae packets sent fom single source and transmit to many devices om
ern networks,

Fis understand that layer 2 broadcast ae also known as hardware broadcast—hey
‘only go out ona LAN, and they done go past the LAN boundary route) The typical hand
‘wate addres i 6 bytes (4 bis) and looks something ike 043.241.1242 The broadcast
‘would be all I in Binary, which would be al si hexadecimal a in FER FE FRE

“Then there's the pai old broadcast address at ayer 3. Broadeast meses ate mean o
reachallhostson a broadcastdomain,Thesaethe network broder that ave allons
fon, Here's an example that you're lady familiar with: The network adres of 172.1609
1255255.0 would haves broadcast addres of 172.16,255.255—allhow bison Broads
an aho be “all actworks and ll hosts” as indicated by 255.255.255.255. À good example
of broadcast message an Address Resolution Protocol (ARF) regt. When host has
packet, i knows the logical adress (IP) ofthe destination. To get he packer tothe destina

th host nest forward the packt 10. default gateway if he destination resides on à
¿lero IP network. Ihe destination som the local network, the source wl forward he
pack dire tothe destination. Because the source dacs ave the MAC adress to which
Fences to forward he fame tsends ut a broadcast something that ever dvi nh local
broadcast domain wil ten 0. This broadcast says, in essence “If you ate the owner of I
address 192.168.23, please forward your MAC address me," with the source giving the
Sppropeae information

"Kunst dient because isa broadcast packet ha goes rom 255.255.255.255 roan
cual destination IP addres—in other word Ws dred toa soci host. A DHCP cent
‘eauett ia good example of how a unica works, Here's an examples Your host on a LAN
sends out an FEFEFFPF-FE.FF layer 2 broadcast nd 285.255.258.255 layer 3 destination
Broadcast looking fora DHCP server onthe LAN. The outer wl se that thin is a broadest

Summary 10

‘meant foe the DHCP server because thas a destination port number of 67 (Boot server and
‘wllforvardthe request to che IP addres ofthe DHCP server on another LAN, So, basil,
if your DHCP server IP addres i 17216101, your host jus send out 255.255.255.255
DHCP client broadcast quest andthe outer changes that broadcast othe pei destin
tion addres of 172.1601 (im order for the router to provide this ev, you nnd to con.
Figure the interfaces with the Ip helper- address command hs not a desu vice)

Nas ia diferent Beas entire. A fi lance appears to hea hybrid of unicast,
and broadcast communication, but that ve quite the case. Multicast does allow point
‘molpoint communication, which à similar to broadcasts, butt happens ina different man
‘et. The esx of mucha it enables mukiple iets eine mesages without
odin he micsages to ll hos on a broadest mai.

las works by sending messages or data mas group address Rowers then
forward copies (unlike broadcast, which are or forwarded) ofthe packet ou every nerace
‘hatha hos subscribed that group addres. This where mulic dies rom broadest
messages —wih mulas communication, copies of packets in thor, are sent only 1 su
‘eri hass. When {say in theory, this means hat the hosts wl ec, for example, mul-
cs packet destined for 224.00 (his an EIGRP packet and oly a router runing the
EIGRP proocol will ead these) All hosts on ch broadcast LAN (Eihemet is a broadcast
moltes LAN technology) wil ik ap the frame, ead the destination address, and imme-
at card he frame, als they rein the mulica group. Ths aves PC processing aot
LAN bandwidth, Maliasing cn cause severe LAN congestion, in some instances, if not,
implemented cael

"There ae several diferent groups tha users or applications can subscribe to. The rang: of
must addresses ars with 24.0.0. and ges through 239.255.285.255. As youcanser,
{his ange of addrone alls within IP Clan D address space based on cama! IP waigament

Summary

you madeit his far and understod everything the inte through, you should be proud
‘of yourself. We ally covered lot of ground it this chapter, bur understand tha the inor-
‘maton inthis chapters Key to cin able navigate through the rs of his book, Anderen
fou dido ge compet understanding he fist time around, don re. cal woulda
ur ou 1o read hs chapter more than once, There is il a ot of ground to cover so make
sre you've goitalldown, and get ready formore, What were doings bulding foundation,
And you want a tong foundation, ight?

‘After youleamed abou the DoD model, the ayers, and associated protocol, you kam
about theo so-mportnt IP addressing. eue din detail the difference betwen exch class
fof address and how o ind a nework ares broadest addres and aid hos ange, which
Serial information ro understand before going on to Chapter 3.

Since you've already come tir here no resonto top now and waste all hose hei
arcs anne neurons. So dont stop—go through the writen ab and review questions tthe
‘ud of his chapter and make sure you understand cach answer explanation, The hai et

ye Chapter 2 « Invoduction to CPP.

Exam Essentials

Remember the Proces/ Application layer protocols. Telnet isa termina emulation program
hat allows yout log int a remo host and run programs ik Transfer Protocol (FTP) isa
‘connestionorened service that allows yout rater fix. evil FIP (TFTP) ia conne
ones ile tansfer program. Simple Mail Transfer Protea SMTP is send mal program.
Remember the Host. Hos layer protools. Transmision Control Protocol (FCP) is
connection oriente protocol hat provides reale network service by sing acknowl
‘ments and low control. User Datagram Protocol (UDP) sa connctionles protocol ha pro
‘ies low overhead and is consider unable

Remember the Internet layer protocols. Inmet Protocol (IP) isa connections protocol
that provides network addres and rooting through an internetwork, Adres Resolution Pro.
tocol (AREY nds a hardware adres fom a known Padres Reverse ARP (RARE) Binds
an Padres fom a known hardware addres. net Control Message Protocol (CMP)
provides dagnonics and destination unreachable messages.

Remember the Clas A range. The Prange for Clas A nework 1-126. This provides 8
bis ofnenwork addrsing and 24 bits of hos addressing by deal

Remember the Class B ange. The IP rang for a Clas B network is 128-191, Clas
addressng provides 16 bis of network addesing and 16 bis of host addrsin by default.
Remember the Class Crange. The I ange for a Clas C network is 192-223. Css C
dressing provides 24 bits of network addesing and 8 bits of host addesing by default

Remember the Private IPranges Clas À private address ange i 10.0.0. through
10255.255255.

Class private address range 172.16.4.0theough 17231255255.
‘Class private adress range is 192.168.0.0 rough 192.168255.28.

Written Lab 2

Answer the following questions about TCPAP:
Whats tb Class C address angen decimal and in inary?

‘What layer ofthe DoD models equivalent to che Transport layer ofthe OSI mode?

What isthe valid range ofa Clas Aneework addres?

What the 127.00.1 adress wd for?

How do you find the network address fom à listed IP aes?

How do you find the broadcast addes from a ste IP address?

What i the Class A priate IP address space?

Nowe eee

Wettentab2 10.

8 Whatisthe Clas B private IP address space?
9. Whatisthe Class € private IP address space?
10. What ae al he available characters that you ca us in hexadecimal addresing?

(Theanswers to Weiten Lab 2 an be found following the answers tothe review questions
for this chapter)

106 Chapter 2+ Invoduction to TCPA

Review Questions

pon ‘The folowing gustons ar sine 1 tot your understanding of shop.

‘otis book's modo

1. ae he decimal and hexadecimal equivale fhe inary number 100111012
(Choose wo)
Bus
œus
D. 09
E 000
F ous

2. Which of he allowing llows a te to respond o an ARP qu hat is intend fora

©. Proxy ARP
Divers ARP (ARP)
E. Address Rain Proto (ARP)
2. You want to implement a mechanism that automates he IP configuration, incading IP

les suet mask deauegateway, and DNS informaron Which protocol wil ouate
to acomplia thi?

A sr

8. SNMP.

4 Whar protocols edo find he hardware are of oa dc
A RARP
8. ARP
ow
Doce

Review Questions 106

‘Which of he following are ayer the TP mode? (Chose tre)
A Appin

8. Soon

©. Transport

D. nene

ES Dita Link

Physical

‘Which clas of IP ads provides a masimum of only 258 how addres per network ID?
A Gas A

8. aus

©. ac

D. Gad

Gime

‘Which of he fllowing dete the DHCP Discover message? (Choose ru)
A. leurs FRFFRFRFR asa layer 2 broadest
8. tease UDP asthe Transport ayer protocol

©. tease TEP the Transport ayer pete

D. lados nor we a ayer 2 destination aes.
‘Which aye protocols wed for a Tele connection?
aw

LE

©. romp

0. ur

rey

‘Which statements ae te eating ICMP packs (Choose o.)
AL They acknowledge ep ofa TCP sen.

8. They para datagram deliver.

©. They an provide hot with information abou neck problems,
D. Theyre encapsulated within IP daagrams.

ES They are encapsulated within UDP daran.

Which ofthe flowing services se TCP? (Choose tre)

8. sum

©. SNMP

DFP

= urm

er

Review Questions

18. Ify use cher Tels or FT, which he highest ayer you ae ing to men ata?
A. Applicaton
8. remain
©. Seon
D. Transport

w

15. The DoD model (socalled th TCPAP sac) has fear Which cr ofthe DoD model

Gs quivaln tothe Network lye ofthe OSL mode?
A. Apr

B. Hosteoitst

©. Inerer

D Network Aco

16. Which to ofthe oli ar pate IP adden?

A 12004
8 166.172:19.39
©. 172201436

D 23319030
1.168.203

12. What ayer in the TCPAP sack segle othe Teanior lye fhe OSI model?
À Appa
8. Hoscsosios
©. Inset
D Network Aces

18. Which semen are tue pring ICMP pack (Chone no)
AL ICMP guarras datagram dvr
1. CMP cam provide hosts with information about ntwork problems,
©. ICMP isencapslated within IP datagrams
D. ICMPiscsprlae within UDP daagram

19. What isthe adres range ola Ca B network ads in bie?
À beeen
Bi Grues
por
D. M0sraxx

‘Which ob following protocol uses both TCP and UD
are
8 sum
©. Ten
D. DNS

8 Chapter 2+ InvoductiontoTCPA

Answers to Review Questions

1. B,D. Touma binge numbering decimal, you jus have to adhe vals of each bit hat
ia The vales of 10011101 ae 128, 16,8, and 1.128 16 48 4 2157 Henade
imal ea bas-16 number sytem. The vai of hexadecimal 60, 12 3,4 54657, 9, A,
CD, Es 16 characters toa rom which to cate al he pubs pu Ica nd. o.
11001 in nay à, chen the hetadcinal garen 9. Sine we hen have 101, which
is 131m tony the hexadecimal answer D and the comple heredad aan 0x9).
Even hough brasero words Chapter ya god review ca ee

2. C.Proxy ARP con lp machines on a subnet each emos subnet without configuring route
Bora dak power

3. C.Dynamic Hos Configuration Protocol (DH i esd to provide IP information o Bots
on yor network DHCP est provide le information, but the met common IP sles,
Sahne mas, dll gateway and DNS nformaton.

42 1 Are Resolution Protocol (ARP) ie o find the hardware ade roma known
ade

5. A,C,D. This ses ike rd queso at fine becas it doc’ make ese The led
ans ae ro the OS mel ad the question asked about the TCP protocol stack (Da
mode Hower, e's jest ok for what wong. Fst the Sesion aye is tin the TCP
IPod acter athe Data Link snd Phy cl ers Ts eases withthe Transpo ayer
(Hove Hoe in the DoD model) terne ayer (Network yer inthe OSD, and Application
layer (AppcatonProces inthe DoD)

6 CA Clas Caeework ales has oly 8 is for fining hosts 2-2 284,

7. Au A in that sends ou a DHCP Dicorer message in order nsc an IP aes
senti oe Feos abot layer 2 and ayer 3. The aye 2 broads nal sin he, oe
FEERERFEFREF Thelayer3 broadcast is258 285.288 25, hich means al ross and
{A hor, DHCP conection which means it uns Use Datagram Prwcol (UDP) tthe
‘Tramp layer, lo called the Host Hor layer,

Although Tact does use TCP an IP (TCPAP the question specifiy aks about yer,
and IP works a layer 3 Tle es TCP a yer

9 CD, intere Control Message Protocol ICMP) is wd to sendero meses through the
ook, but they donor wa lone Every sen or ICMP payload mus capte
within an IP daa (or packed,

10. BD, SMTP, FTP, and HP TCP
Mm. AGE ExplationDHCP, SNMP and TFTP se UDP. SATE, FTP, and HTT use TCP.

12. CD, Tels ile Transfer roocal (FE) and Teil ET (TET) are al Appian lye
protocol Pisa Network ayer protocol. Transmision Contes Protocol TCM a Transport
layer proto

Answers 10 Review Questions 10

18. C. it ou shouldhnow ed that only TOP and UDP work tthe Transport aes, ao
you have a S050 shot, Howe, se the header has sequencing ant, ad wi
‘ow number, the annee ca nly Be TCP.

18. A.Both FTP and Tenet us TCP at he Transport layers however, hey bth are Applicaton
{ayer protec othe Applicaton layer the os anowe fort quen

15. C.The four yes fthe DoD moda ate Applicaton oes Host Host, ret and Net
Work Aces The nen ye equal tbe Network ayer fhe OST moda,

16. CE. Clas A pena aes ang 10... hrough 10258.255.255. Class peña
‘sees ange 172.160. hough 17231255255, and Clee priate ars range
192.1680 rau 192.168.258.255

2 B.Th four ayers the TCP stack (lso called the DoD ode ate Application Process,
Horn, noc and Network Acc. The Howto Hos layer equal fo te
‘Transpo layer ofthe OS moda

18. B,C. ICMP etd for diagnos and dewiaton uneechabe messages ICMP is nca

land win IP damas and became sc or none wil onde ho wh
information about work problems.

18. C.The range of Class nor ddr 124-191. Tit makes our inary ange
Tox

20. D.DNS wes TCP or one exchanges tween ever and UDP when cet sein o
‘vce same to an Pad

10 Chapter 2 Introduction to TCPAP

Answers to Written Lab 2

1192-223, Hose
4 Loopback or dignos

Turn al host bio,

6. Turn al hos itso

2 10.00.0 though 10255255255
172.1600 through 17231285288
9. 192.168.0 through 192.168.255.255
10. 0-9 and A, B,C, Dy Eyand F

Subnetting, Variable
Length Subnet
Masks (VLSMs), and
Troubleshooting
TCP/IP

‘THE CCNA EXAM TOPICS COVERED IN THIS
CHAPTER INCLUDE THE FOLLOWING:

Describa how a network works

+ Interpret network

X Implementan IP addressing scheme andIP Services to meet
network requirements in a medium-size Enterprise branch
‘office network

+ Describe the operation and benefits of using private and
public IP addressing

+ Imploment static and dynamic addressing services for
hosts in a LAN environment

+ Coleulate and apply an addrossing schome including
VLSM IP addressing design 10 a network

+ Determine the appropriate classless addressing scheme
using VLSM and summarization to satisfy addressing
requirements in a LANWAN environment

+ Idantiy and correct common problems associated with
IP addressing and host configurations

Thicker wl pick wp ih where wef nthe chat
We vilct oe dex lastre
as ‘Well star th subi an IP network Ya’ ging
have to el apt pours, raw bring estime and pace in onder alt 50
Be pai. Do whatever thes to gt hi sl ied Th chapter tly por
pari the man impor chapter ts hook fr you o undenund

"toro core sine fom the ve Doping. non he night ound werd
wo yous but thik youl bemuch betr off you ca ty to og coc you've lame
‘Sour being breeding is chape sosa i you've ben oa Mion lat

‘ter our dion of IP Subetng, Fm going tel you labo Variable Length
Subnet Mask (VISMs), as well show you how to design and implement a nework

‘Once you have mastered VLSM design and implementa, show you how o
summarize aa Boundaries. Wel go ito hi Arche in Chapter 7, “Enhanced [GR
TEIGRP) and Open Shores Paik rs OSPF,” wheel demons summing wing
GRP and OSPF routine protocole

Trap pibe cape D om over IP adds oubleshoting nda ou though the
stop Ge ommend when bebo an IP nor

So gt ochedyou' aout og for qui arde! Ti chap willy lp you under
stand I reste and enwerking odor get ducoungedo ge up. you sick wih
T promise ta one ay youl ok Bacon hi sed ont ely lados decided hang
omo of those hing hae fer you understand yl wonder why you once thot
iss hard Ready? Lets got

eon For uptothe-minute updates for thi chopte, please ses mun lamte.con

Subnetting Basics

In Chaper2, you amet how to define rd find he vad hos ranges wein a Clas A, Clas B,
and Cas Cetwock address by turing the st is alfa then all on. THs very good,
Bu ho the cath: You were dining only one network What happens pou want to ake
nene addres and eaters from i? You would haveto do some called sb
ing. esse tars what allows your tk one larger network and nek no bunch of
‘ale networks,
Tags