Uploaded by brosiscoservices

Mod 00 Networking & Seven Layer OSI Model

advertisement
Chapter 1
Introduction to Networking
&
7-Layer OSI Network Model
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Agenda
1. What is a computer network?
2. Network Models
-Topology
-P2P network model
-Client-server model
3. Client-Server Applications
4. Network Hardware
5. Open Systems Interconnection OSI Model vs. TCP/IP
Model
6. 7-layer OSI Model
Jackpotting I
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
What is a computer network?
Two or more connected
computers that they can
communicate with each other
(send and receive)
1. The Internet is like a
postal mail system
(sender and receiver
addresses) with routers
connected together
2. IP address
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Components in a Network
• Major components in simple network
1. Client and server computers
2. Network interfaces card (N I C s)
3. Connection medium (wired & wireless)
4. Network Operating System (N O S)
5. Router, switch, modem, access point
6. More….such as?
A Simple Computer Network
A device to connect
outside networks
A simple network
What is the Internet?
Router
Switch
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Models
• Topology—How parts of a whole work together
• Physical topology—Mostly applies to hardware and describes how
computers, other devices, and cables fir together to form the
physical network
• Logical topology—Has to do with software and describes how
access to the network is controlled
• How users and programs initially gain access to the network
• Network operating system (N O S)—Controls access to the entire
network
• Required by client-server models
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Topology
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Peer-to-Peer Network Model (1 of 3)
• Peer-to-peer (P 2 P) network model—The OS of each computer
on the network is responsible for controlling access to its
resources
• No centralized control
• Computers, called nodes or hosts, form a logical group of
computers and users
• May share resources
• May prevent access to resources (Server – Client)
• Each computer user has a Windows local account
• Works only on that one computer
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Peer-to-Peer Network Model (2 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Peer-to-Peer Network Model (3 of 3)
• Advantages
1. Simple configuration
2. Less expensive
-Compared to other network models
• Disadvantages
1. Not scalable
2. Not necessarily secure
3. Not practical for large installations
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Client-Server Network Model (1 of 5)
• Resources are managed by the Network Operating System (NOS)
via a centralized directory database
• Windows domain—A logical group of computers that a Windows
Server can control
• Active Directory (A D)—The centralized directory database that
contains user account information and security for the entire
group of computers
• A user can sign on to the network from any computer on the
network and gain access to the resources that AD allows
• This process is managed by Active Directory Domain Services (A
D D S)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Client-Server Network Model (2 of 5)
• Client
• A computer making a request from another
• Clients don’t share their resources directly with each
other
• Access is controlled by entries in the centralized
domain database
• Client computers access resources on another computer
by way of the servers controlling the domain database
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Client-Server Applications
*The Internet is all about “Request ↔ Respond” cycle
on a Client-Server network model.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Client-Server Network Model (3 of 5)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Client-Server Network Model (4 of 5)
• The NOS (Network Operating System) is responsible for the
following activities:
1. Manages client data, resources
2. Ensures authorized user access
3. Controls user file access
4. Restricts user network access
5. Dictates computer communication rules
6. Supplies application to clients
• Server examples
• Windows Server 2016, Ubuntu Server, or Red Hat Enterprise
Linux
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
NOS (Network Operating System)
Manage traffic in the network
Mail
Server
Database
Server
Web
Server
Client-Server Network Model (5 of 5)
• Servers that have a NOS installed require:
1. More memory, processing, and storage capacity
2. Equipped with special hardware
•Provides network management functions
• Advantages relative to peer-to-peer networks
1. User credential assigned from one central place
2. Multiple shared resource access centrally controlled
3. Central problem monitoring, diagnostics, and correction
capabilities
4. More scalable
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Client-Server Applications
• Network services—The resources a network makes available to its users
• Includes applications and the data provided by these applications
• In client-server applications
• A client computer requests data or a service from a second computer,
called the server
• Protocols
• Methods and rules for communication between networked devices
• Two primary protocols:
1. TCP (Transmission Control Protocol)
2. IP (Internet Protocol)
• T C P/I P suite of protocols is used by OSs for communication on a
network
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Client-Server Applications
• List of several popular client-server applications:
1. Web service
2. Email services
3. F T P service
4. Telnet service (command line on a remote computer)
5. Remote applications (Google Doc)
6. Remote Desktop
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Client-Server Applications
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Hardware
• Local area network (LAN)—Usually contained in a small space
• Such as an office or building
• Switch—Receives incoming data from one of its ports and
redirects it to another port or multiple ports
• Will send the data to its intended destination
• Hubs – function like switch, but dumb
• Star topology—All devices connect to one central device (usually a
switch)
• Network interface card (N I C)—A network port used to attach a
device to a network
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Hardware
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Hardware
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Hardware (4 of 9)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Hardware
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Hardware
• Router—A device that manages traffic between two or more networks
• Can help find the best path for traffic to get from one network to another
• Routers can be used in small home networks to connect the home LAN to the
Internet
• Called a S O H O (small office-home office) network
• Industrial-grade routers can have several network ports, one for each network
it connects to
• Difference between router and switch:
• Router is like a gateway between networks and belongs to two or more local
networks
• Switch belongs only to its local network
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Hardware
Connect to other networks
Switch
Switch
Switch
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Network Hardware
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
The Internet – Networks of Networks
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Open Systems Interconnection Model
(OSI Model)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
The Seven-Layer OSI Model (1 of 3)
• Compare two devices communicating on a network to two people
communicating by way of the U.S. Postal Service
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
The Seven-Layer OSI Model (2 of 3)
• O S I (Open Systems Interconnection) reference model
• A seven-layer model developed to categorize the layers of
communication
• The layers are numbered in order, starting with Layer 1,
the Physical layer at the bottom
• Physical, Data Link, Network, Transport, Session,
Presentation, Application
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
The Seven-Layer OSI Model (3 of 3)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
OSI vs. TCP/IP Model
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 7: Application Layer
• Application layer—Describes the interface between two
applications, on separate computers
• Application layer protocols are used by programs that fall into two
categories:
1. Provide services to a user, such as a browser and Web server
2. Utility programs that provide services to the system, such as
SNMP that monitor and gather information about network
traffic
• Payload—Data that is passed between applications or utility
programs and the O S
*Simple Network Management Protocol (SNMP) is an Internet Standard protocol
for collecting and organizing information about managed devices on networks
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 6: Presentation Layer
• Presentation layer—Responsible for reformatting,
compressing, and/or encrypting data in a way that the
receiving application can read
• Example:
• An email message can be encrypted at the
Presentation layer by the email client or by the OS
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 5: Session Layer
• Session layer—Describes how data between applications is
synched and recovered if messages don’t arrive intact at the
receiving application
• The Application, Presentation, and Session layers are intertwined
• Often difficult to distinguish between them
• Most tasks are performed by the OS when an application makes
an API call to the OS
• Application Programming Interface (API) call is the method an
application uses when it makes a request of the OS
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 4: Transport Layer (1 of 2)
• Transport layer—Responsible for transporting Application
layer payloads from one application to another
• Two main Transport layer protocols are:
1. T C P (Transmission Control Protocol)—Makes a connection with
the end host, checks whether data was received; called a
connection-oriented protocol
2. U D P (User Datagram Protocol)—Does not guarantee delivery by
first connecting and checking whether data is received; called a
connectionless protocol
3.
TCP is a connection-oriented protocol, whereas UDP is a connectionless
protocol.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 4: Transport Layer (2 of 2)
• Protocols add their own control information in an area at
the beginning of the payload (called a header)
• The Transport layer header addresses the receiving
application by a number called a port number
• If message is too large, T C P divides it into smaller
messages called segments
• In U D P, the message is called a datagram
• Encapsulation—Process of adding a header to the data
inherited from the layer above
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Encapsulation
Session Layer
Presentation Layer
Application Layer
Network Layer
Physical Layer
Data link Layer
Transport Layer
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 3: Network Layer
• Network layer—Responsible for moving messages from one node to
another until they reach the destination host
• IP adds its own Network layer header to the segment or datagram
• The entire Network layer message is called a packet
• IP address—Assigned to each node on a network
• Network layer uses it to uniquely identify each host
• IP relies on several routing protocols to find the best route for a packet to take
to reach destination
• I C M P and A R P are examples
• Network layer protocol will divide large packets into smaller packets
• Process called fragmentation
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 2: Data Link Layer
1. Layers 2 and 1 are responsible for interfacing with physical
hardware on the local network
• Protocols at these layers are programmed into firmware of a
computer’s N I C and other hardware
2. Type of networking hardware or technology used on a network
determine the Link Layer protocol used
• Ethernet and Wi-Fi are examples
3. The Link layer puts control information in a Link layer header
and at the end of the packet in a trailer
• Entire Link layer is called a frame
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 2: Data Link Layer
• MAC (Media Access Control)
address—Hardware address of
the source and destination N I
Cs
• Also called a physical
address, hardware address,
or Data Link layer address
• Embedded on every network
adapter and are considered
short-range addresses that
can only find nodes on the
local network
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Layer 1: Physical Layer
• Physical layer—Simplest layer and is responsible for
sending bits via a wired or wireless transmission
• Can be transmitted as:
1. Wavelengths in the air
2. Voltage on a copper wire
3. Light (via fiber-optic cabling)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
OSI Model Recap
OSI 7-Layer Model
Application
7
SMTP, FTP, Telnet
Presentation
6
Format Data, Encryption
Session
5
Start & Stop Sessions
Transport
4
TCP, UDP, Port Numbers
Nework
3
IP Address, Routers
Data Link
2
MAC Address, Switches
Physical
1
Cable, Network Interface Card (NIC), Hubs
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Protocol Data Unit or PDU
• Protocol Data Unit (P D U)—The technical name for a group of bits as it moves
from one layer to the next and from one LAN to the next
• Technicians loosely call this group of bits a message or a transmission
• Table 1-1 Names for a P D U or message as it moves from one layer to another
OSI model
PDU Name
Layer 7, Application layer
Layer 6, Presentation layer
Layer 5, Session layer
Payload or data
Layer 4, Transport layer
Segment (T C P) or
datagram (U D P)
Layer 3, Network layer
Packet
Layer 2, Data Link layer
Frame
Layer 1, Physical layer
Bit or transmission
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Summary of How the Layers Work Together
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
TCP (Transmission Control Protocol) (3 of 4)
• T C P uses a three-way handshake to establish a connection
• Three transmission sent before data transmission:
1. Step 1—Request for a connection (S Y N) ←
Knock on the door
2. Step 2—Response to the request (S Y N/A C K) ←
knock
3. Step 3—Connection established (A C K) ←
answer the
Now, we talk
• After the three initial messages, the payload or data is sent
• Sequence numbers will be increased by the number of bits
included in each received segment
-Confirms the correct length of message was received
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
TCP (Transmission Control Protocol) (4 of 4)
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
UDP (User Datagram Protocol) (1 of 2)
• UDP is an unreliable, connectionless protocol:
• No three-way handshake is performed
• Does not guarantee delivery of data
• UDP provides no error checking, sequencing, or flow control
• Makes UDP more efficient than TCP
• Useful for live audio or video transmissions over the Internet
• Also more efficient for carrying messages that fit within one data
packet
• An UDP header contains only four fields: Source port, Destination
port, Length, and Checksum
• Use of Checksum field in UDP is optional in IPv4, but required in
IPv6
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
IP (Internet Protocol)
• IP operates at the Network layer (Layer 3) of the OSI model:
1.
Specifies where data should be delivered
2.
Identifies the data’s source and destination IP addresses
• IP enables TCP/IP to internetwork
• Traverse more than one LAN segment and more than one type
of network through a router
• IP is an unreliable, connectionless protocol
• Means that IP does not guarantee delivery of data and no session is
established before data is transmitted
• IP depends on TCP to ensure messages are put back together in the right
order and to ensure each message reaches the correct application on the
receiving host
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
IP Address
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
• What is GMU IP address?
IP addresses 129.174.182.0 to 129.174.182.255
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
A R P (Address Resolution Protocol) on IPv4
Networks (1 of 4)
• A R P works in conjunction with IPv4 to discover the MAC address
of a host or node on the local network
• And to maintain a database that maps IP addresses to MAC
addresses on the local network
• A R P is a Layer 2 protocol that uses IP in Layer 3
• Operates only within its local network
• A R P relies on broadcasting
• ARP table—The database of IP-to-MAC address mappings
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
ARP (Address Resolution Protocol) on IPv4 Networks (2 of 4)
MAC Address
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Jackpotting II – Taiwan ATM
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Jackpotting III - $$$
© 2019 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Download