CCNA Semester 1 - Technical Diary

advertisement
na
za
ud
y.
co
m
CCNA Semester 1 - Technical Diary............................................................................. 2
Part 1 [Chapters 1, 2 and 3] ....................................................................................... 2
1. Technical Content .......................................................................................... 2
2. References ...................................................................................................... 4
3. Straightforward and Difficulties .................................................................... 5
4. Strategies ........................................................................................................ 5
5. Reflections ..................................................................................................... 6
Part 2 [Chapters 4, 5 and 6] ....................................................................................... 7
1. Technical Content .......................................................................................... 7
2. References .................................................................................................... 13
3. Straightforward and Difficulties .................................................................. 14
4. Strategies ...................................................................................................... 14
5. Reflections ................................................................................................... 15
Part 3 [Chapters 7, 8 and 9] ..................................................................................... 16
1. Technical Content ........................................................................................ 16
2. References .................................................................................................... 27
3. Straightforward and Difficulties .................................................................. 28
4. Strategies ...................................................................................................... 29
5. Reflections ................................................................................................... 29
Part 4 [Chapters 10 and 11] ..................................................................................... 30
1. Technical Content ........................................................................................ 30
2. References .................................................................................................... 36
3. Straightforward and Difficulties .................................................................. 36
4. Strategies ...................................................................................................... 37
5. Reflections ................................................................................................... 37
Conclusion ............................................................................................................... 38
Technical Diary – Semester 1
Page 1 of 39
Manuel Munoz Soria – 21076464
CCNA Semester 1 - Technical Diary
m
The purpose of this diary is to reflect my learning experiences during the
lectures of the Cisco course, my own personal research about the technical contents of
the curriculum and how I implement what I have learnt in my daily life and job.
Please note that most of the graphics used in the technical diary have been
extracted form the corresponding chapter on the Cisco Online Resource. In the cases
where the graphics has been copied from an external source, I have acknowledged the
owner with a reference.
Part 1 [Chapters 1, 2 and 3]
na
za
ud
y.
co
1. Technical Content
The first chapter was an introduction to the Cisco course in general, where
we discuss what a converged network1 is and how the computers use a set of rules
called protocols2 to communicate to each other. We learnt that, on a packet switched
network, a message is broken into small blocks called packets 3 that are sent
individually to the network, could take different routes to arrive to their destination
and are reassemble to create the original message at the end device. We also learnt
about the main four block of any network architecture, and these are:
-Fault Tolerance4: There must be some kind of hardware or software
implementation that can allow a quick recovery in case of failures. And whenever
possible, there must other redundant links or paths for the network traffic to flow.
-Scalability5: This is the idea of using layers to design the way a network
works, creating the functionality of changing the contents of each layer without
affecting the design of the others, thus making feasible new upgrades or new
technologies implementations.
- Quality of Service6 (QoS): QoS are a set of mechanism that will prioritise the
packets of certain types of communication in order to avoid congestion of the
network, where the volume of packets could be greater than the devices can handle.
- Security: Privacy is a key component of the exchange of data between
devices, where the aim is to secure the data in a way that nobody but the intended
recipient could read it. Security on the network should ensure confidentiality of the
data as well as its availability, and also maintain communication integrity.
We also study on this chapter the main elements that form a network like
Desktop Computers, Servers, Laptops, Switches, Routers, Firewalls and Media. The
route a message takes when it is sent was explained during this chapter, as it goes
from the sender, through the intermediary devices to reach finally the destination
device.
We were shown the different collaboration tools that users use to
communicate to each other in this World where networks have become very important
and critical for many services. These tools are Internet Relay Chat (IRC), Instant
Messaging (IM), Wikis and Weblogs.
In the second chapter we were more in detail about segmentation7, the
process of dividing data into packets and the benefits it has of making the packets
manageable pieces that are easy to send over the network. The drawback of
segmentation is the complexity that is added in order to achieve the process.
We understood the difference between End Devices (generators or recipient of
data) like workstations, printers and VoIP phones, and Intermediary Devices (direct
the path of the data) like hubs, switches or routers. These Intermediary Devices8 are
able to retransmit data signals, maintain information about available pathways that
Technical Diary – Semester 1
Page 2 of 39
Manuel Munoz Soria – 21076464
za
ud
y.
co
m
could be used to send the data, permit or deny the flow of data based on security
settings and also classification of the data according to QoS priorities.
This chapter two present us with the first contact to the OSI Reference Model9,
and I was surprise to learn that protocols actually do not describe how to accomplish a
particular function, instead they only describe what functions are required for a
particular communication rule; then it is up to the manufacture to achieve that goal,
thus making the protocol technology-independent.
We also review the TCP/IP Protocol Model10 and compare it with the OSI
Model. While the OSI is a reference that helps network design and troubleshooting,
the TCP/IP is a protocol model describing the functions that occur at each layer of the
TCP/IP protocol suite. The definitions of these protocols are discussed in public
forums and defined in public documents called Requests for Comments (RFCs).
The following table compares the two Models; notice that the key parallels
between the two are the Transport layer 4 and the Network Layer 3 for the OSI Model
and the Internet Layer 3 in the TCP/IP model.
na
On the TCP/IP Model, the segmentation process occur at the Application
Layer, where data is broken into smaller pieces called TCP Segments, and each
segment is given a header11 with information about the destination end device.
The encapsulation12 process starts taking place at the Transport Layer, where
the TCP segment is send to the Internet Layer. The Internet Layer attaches an IP
header containing source and destination addresses to the TCP Segment, converting it
into an IP Packet13. The resulting IP Packet is then sent to the Network Access Layer
where it is further encapsulated with a frame header and trailer, containing each frame
the source and destination of the physical address of the devices.
During chapter 3 we dig into the Application Layer and learnt that is directly
responsible for accessing the processes that manage and deliver communication
between humans and computers, allowing us to interact with the network in a way
that is meaningful and effective. Within the application layer there are two forms of
processes that provide access to the network: Application14 and services15.
Applications are programs that interact with the users and initiate data transfers.
Technical Diary – Semester 1
Page 3 of 39
Manuel Munoz Soria – 21076464
za
ud
y.
co
m
Services are background programs that provide the connection between the
application layer and lower layers of the networking model.
We understood the concept of Client-Server Model16, where the client device
request data or a service and the server device respond to the request with a service or
stream of data.
We learnt the terminology of e-mail clients called Mail User Agent (MUA),
and the processes of the e-mail servers that are Mail Transfer Agent (MTA) use to
forward e-mail and Mail Delivery Agent (MDA), responsible for delivering the data.17
We have a look at some of the protocols that operates in the application layer, like
File Transfer Protocol (FTP) used to transfer files, Dynamic Host Control Protocol
(DHCP) used to deliver IP addresses to requesting devices and Server Message Block
(SMB) a client/server file sharing protocol.18
FTP required two connections between the client and server devices, one for
commands and replies (TCP port 21) and another for the actual transfer of files (TCP
port 20).
DHCP pose a security risk because any device connected to a network can
received a valid IP address from the server, opening the door to hackers and packets
sniffers that will use this valid IP address to authenticate to the network. The process
starts at the client where it broadcast a DCHP REQUEST packet to any available
DHCP server. The server in return responds with a DHCP OFFER packets to the
client.19
SMB20 establish a long term connection between the client and the server, thus
allowing the client to access resources on the server as if they were on the client host
itself.
The last important thing that we learn in this chapter was Telnet21, an
application layer protocol that provides a method to connect to other devices on the
network. A connection using Telnet is called a Virtual Terminal (VTY); that creates a
session with access to the command line interface (CLI)22 of the device. Common
Telnet client applications are HyperTerminal, Minicom and TeraTerm, that can be
used to connect and manage Cisco switches.
On the practical sessions we made some RJ45 patch leads cables and the
different ways there are to build cables, depending on what devices they are going to
connect: to connect a switch to a computer it will be a twisted pair cable but to
connect a switch to a switch it will have to be a straight though cable.
2. References
1
na
Leslie T. O’Neil (2007) Best Practices for Managing a Converged Network.
http://www.itmanagement.com/features/10-practices-converged-network-082807/
[Accessed: 9 November 2009]
2
Peter Loshin (2003) TCP/IP Clearly Explained. [Online] Available at:
http://books.google.co.uk/books?id=7ppuc1BrLCQC&lpg=PA25&ots=_zTF30VxQQ&dq=protocols%20rules%20
explained&pg=PA25#v=onepage&q=&f=false [Accessed: 9 November 2009]
3
What is a Packet? How stuff works. http://computer.howstuffworks.com/question525.htm [Accessed 9 November
2009]
4
Bran Selic (2004) Fault tolerance techniques for distributed systems
http://www.ibm.com/developerworks/rational/library/114.html[Accessed 9 November 2009]
5
Scalability Overview http://msdn.microsoft.com/en-us/library/aa292203(VS.71).aspx [Accessed 10 November
2009]
6
QoS Concepts http://www.cisco.com/en/US/docs/internetworking/technology/handbook/QoS.html#wp1020563
[Accessed 10 November 2009]
7
Segmentation and Reassembly. http://en.wikipedia.org/wiki/Segmentation_and_Reassembly [Accessed 10
November 2009]
Technical Diary – Semester 1
Page 4 of 39
Manuel Munoz Soria – 21076464
8
co
m
Intermediary Devices and their Role on the Network. http://www.orbit-computer-solutions.com/IntermediaryDevices-and-their-Role-on-the-Network.php [Accessed 10 November 2009]
9
OSI Reference Model Illustrated. http://whatis.techtarget.com/definition/0,,sid9_gci523729,00.html [Accessed 10
November 2009]
10
TCP/IP Model. http://en.wikipedia.org/wiki/TCP/IP_model [Accessed 10 November 2009]
11
IP Header. http://www.tekelec.com/ss7/protocols/ip2.asp [Accessed 10 November 2009]
12
Understanding Data Encapsulation. http://www.tech-faq.com/understanding-data-encapsulation.shtml [Accessed
10 November 2009]
13
IP Packet Structure. http://www.freesoft.org/CIE/Course/Section3/7.htm [Accessed 10 November 2009]
14
Application Software. http://en.wikipedia.org/wiki/Application_software [Accessed 10 November 2009]
15
Network Services. http://en.wikipedia.org/wiki/Network_service [Accessed 20 November 2009]
16
What is Client Server Network Technology? http://compnetworking.about.com/od/basicnetworkingfaqs/a/clientserver.htm [Accessed 10 November 2009]
17
How email works (MTA, MDA, MUA). http://en.kioskea.net/contents/courrier-electronique/fonctionnementmta-mua.php3 [Accessed 10 November 2009]
18
TCP/IP Protocols Reference Page. http://www.protocols.com/pbook/tcpip1.htm [Accessed 11 November 2009]
19
DHCP Process. http://www.inetdaemon.com/tutorials/networking/lan/dhcp/process.shtml[Accessed 11
November 2009]
20
Sever Message Block http://en.wikipedia.org/wiki/Server_Message_Block [Accessed 11 November 2009]
21
The TCP/IP Guide. Telnet Overview.
http://www.tcpipguide.com/free/t_TelnetOverviewHistoryandStandards.htm [Accessed 11 November 2009]
22
Telnet Tools and Settings. http://technet.microsoft.com/en-us/library/cc787407(WS.10).aspx[Accessed 11
November 2009]
na
za
ud
y.
3. Straightforward and Difficulties
The material of Chapter 1 was easy to understand; it mainly covered common
sense approach about the way computers communicate to each others by the use of
protocols. The comparison of two computers communicating and two people talking
to each other help me a lot to visualise in my mind how protocols work on the
computer world, and the set of rules (that we humans call languages) there have to be
in place before any attempt of communication is made between devices. The chapters
that follow were a bit denser but still I manage to understand them. However, I found
a bit hard to memorise and get accustom to the new terminology like Fault Tolerance,
Quality of Service and Converged Network, and had to do some further reading
elsewhere to fully understand these terms.
What I also found difficult is the interface for the CCNA Exploration Network
Fundamentals course online; is confusing and certainly not user friendly. It takes a
while to logon to the NetAcad website, go through the puzzling menus and finally be
able to launch the interactive course. And when it finally launches, the graphs and
pictures that are displayed on the right hand side are not always self explanatory and
sometimes either very simplistic or quite obscure. In addition, the main disadvantage I
found when using the Cisco online course on NetAcad is the timeout session: after a
few minutes on the same slide of the CCNA Exploration you session timeout, and you
are asked to log back in again starting from the beginning, losing track of what you
were doing and wasting precious concentrated time on logging back in again and wait
for the application to launch. I was therefore force to read quickly and finished the
chapter as soon as possible in case my session will expire.
4. Strategies
The timeout of the NetAcad website made me uncomfortable when reading
slides, as I am not entirely sure how long will I have before the session expires.
Another associated problem to this is that I can not really do any serious research
about a particular slide, analyzing its contents on the Internet, because after a few
minutes looking for extra information about the concepts explained on the slide, I
found that my session has expired when I try to continue, making difficult (when you
Technical Diary – Semester 1
Page 5 of 39
Manuel Munoz Soria – 21076464
co
m
log back in again) to find the exact position you were working on (no features for
making bookmarks!).
I sent an e-mail to the Academy Cisco Support, asking them to disable this
setting, to let us know how long the session last or to allow us to customise the
duration of our session. They replied to me saying that this behaviour of the course is
part of their Cookie Policy, and they could not do anything about it to prevent it. I had
the impression that the real functionality of their Cookie Policy was to track how
many hints and forced visited they received on their website in detriment of student
concentration and performance.
After searching for the contents of the course using P2P sharing programs, I
found the whole material and I download it to my computers. I do not believe this is
illegal, because I am a legitimate student of this course and Cisco should have
provided the course off-line anyway (what happens if I do not have an Internet
Connection?).
na
za
ud
y.
5. Reflections
I have the advantage of having a Microsoft Certification obtained last year,
and some of the terminology shown in the course sound familiar to me, making easy
for me to comprehend the whole picture of what we are learning and digest the
terminology of the Cisco material course. However, I obtained my Microsoft
qualification over a extended period of four years, and most of the basics concepts
that I learnt at the beginning are now too far in the distant memory to bring them back
clearly. I hope that, as I go along in the Cisco course, some of the things that I studied
while preparing for the Microsoft exams, will come to the surface of my memory and
help me to facilitate the understanding of the concepts in this Cisco course.
So far the course seems to be pretty intense, full of exercises using Packet
Tracer that we have to do at home. We also have the target of doing a chapter a week,
in other words, one exam per week. This course is going to last two years, and I had
the impression at first (I was wrong) that the material of the Cisco course would be
easy because it will need to be stretch alongside a two years study curriculum, but I
just realised how much there is to learn about Cisco networking. These two years will
be intensive.
Technical Diary – Semester 1
Page 6 of 39
Manuel Munoz Soria – 21076464
Part 2 [Chapters 4, 5 and 6]
na
za
ud
y.
co
m
1. Technical Content
The focus of chapter four was the Transport Layer1, which is responsible for the
overall end-to-end transfer of application data, accepting data from the Application
Layer and preparing it for addressing at the Network Layer. Some of the functions of
the Transport Layer include error handling mechanism to ensure the data is received
correctly, as well as adding a header to indicate what sort of communication is
associated with the data, creating an encapsulated segment2.
The two common protocols of the Transport Layer are TCP and UDP. Chapter for
is dedicated to the study of these protocols, the applications that they support and the
different ways that they both manage communication.
User Datagram Protocol (UDP3) is a connectionless protocol, meaning that it
does not establish a connection before sending the data. UDP is described in RFC
7684 and, because it does not check if the data has arrived correctly to the destination,
it provides a low overhead data delivery. UDP simply reassembles the data in the
order that it was received and then sends it to the application. Some of the
Applications that use UDP are Domain Name System (DNS), Dynamic Host
Configuration Protocol (DHCP), Simple Network Management Protocol (SNMP),
Voice Over IP (VoIP) and Trivial File Transfer Protocol (TFTP)5.
Transport Control Protocol (TCP6) is, on the other hand, a connection-oriented
protocol described in RFC 7937. This protocol provides flow control, order and
reliable delivery, but it incurs in additional overhead to gain all these functions.
Unlike UDP, each of the TCP segment headers contains a sequence number that
allows the Transport Layer to reassemble the segment in the order they were
originally transmitted, thus ensuring the destination device has all the data that was
intended.
TCP has a system called three-way handshake to establish a connection to the
host. This process is composed of six 1-bit values, referred as flags8, within the TCP
segment header, that control the information contained in the segment. These flag
fields are:
URG – Urgent pointer field significant
ACK – Acknowledgement field significant
PSH – Push function
RST – Reset the connection
SYN – Synchronize sequence numbers
FIN – No more data from sender
Depending on the position of the bit on the above fields (it can only be 1 or 0) the
value associated to its position is assigned to the segment.
Another important thing to consider is the window size9 of the TCP header, which
determines the amount of data the source device can transmit before waiting for an
acknowledgment. The window size is a field part of the TCP header, and is crucial for
the management of data lost and flow control. It can determine the number of bytes
sent before an acknowledgment is expected. Sometimes the TCP window size is
dynamic, and it increase or decrease to optimize the transmission. On efficient
network the window size may be large while on networks with lots of traffic it will
remain small.
Technical Diary – Semester 1
Page 7 of 39
Manuel Munoz Soria – 21076464
The UDP PDU (Protocol Data Unit) is referred sometimes as a datagram10, and it
has 8 bytes of overhead in the encapsulating header; while the IP PDU is known as a
segment and it has 20 of overhead. The following table illustrate the different name
PDU obtains as it climbs the layers of the OSI Layer Model11.
Naming Conventions according to OSI Layer
Protocol Data Unit (PDU)
OSI Layer
Session
Transport
Network
Data Link
Physical
m
Data
Segment / Datagram
Packet
Frame
Bits
na
za
ud
y.
co
During this chapter we leant that, while server processes have static port numbers
assigned to them, clients dynamically use a port number for each of the conversation
that they have. We also review some important terminology like socket12, which is a
combination of the Transport layer port and the Network layer IP addresses assigned
to a unique host, so that a particular process running on this host can be identify. As
an example I could say that if a computer is requesting a web page hosted on a web
server with IP 192.168.0.1 and the dynamic port assigned to the web browser is
49152, the socket for the page would be 192.168.0.1:49152.
We also went into more details in the way computers communicate to each other
by the mean of transmission ports. The Internet Assigned Numbers Authority13
(IANA) is the body responsible for assigning various addressing standards for the
web. They have assign different port number to the communication transmission of
computers, these are:
Well Know Ports14 (from 0 to 1023): They are reserved for services and
applications like HTTP, POP3, SMTP, Telnet, etc
Registered Ports (from 1024 to 49151): They are assigned to specific and
individual applications that a user has decided to install. When these ports are not in
use for a server resource, they may be used dynamically by the client as its source
port.
Dynamic or Private Ports15 (from 49152 to 65535): They are assigned
dynamically to client applications when initiating a connection, and are also known as
Ephemeral Ports.
When a client initiates a transmission with a server, it randomly selects a port
from the dynamic range and uses it as the source port for the conversation. The
destination port is normally a Well-Known or a registered port assigned to a particular
process or service on the server. Once the source and destination ports are clear, the
same pair of ports is used in the header of all datagram used for the transmission.
When data returns to the client from the server, the source and destination port
numbers are reversed.
On Chapter five we run through a deep understanding of the Network Layer
(OSI Layer 3), and learnt that this layer is use to connect processes and devices,
providing encapsulation of data and allowing the contents to be passed within network
with minimal overhead. To accomplish this end-to-end transport, the Network Layer
uses four basic processes16:
1.-Addressing: each device on the network must have a unique IP address, which
is a 32-bit IPv4 address. That makes the identification of the device unique on the
network making the routing communication process possible.
Technical Diary – Semester 1
Page 8 of 39
Manuel Munoz Soria – 21076464
na
za
ud
y.
co
m
2.-Encapsulation: During the encapsulation process the Network Layer 3 adds a
head to the packet it receives from the Transport Layer 4. This header contains the
source and destination addresses that will help route its delivery.
3.-Routing: The process of the IP packet travelling from source to destination is
called routing, and it is done my intermediary devices called ‘routers. Each path that
the packet takes for its destination is called hope, and there are a limited number of
hopes that an IP packet can travel before being discard.
4.-Decapsulation: If the address destination for the packet is correct, the deencapsulation process starts and the Network Layer 3 passes the packet to appropriate
service at the Transport Layer 4.
The most significant protocol of the Network Layer 3 is the IP Protocol. IPv4 is
widely use it, though is slowly been replaced by IPv617. Other protocols of this layer
are Novell Internetwork Packet Exchange (IPX), Apple Talk, etc.
The Internet Protocol provides only the functions necessary to deliver a packet
from source to destination over the network. This protocol is not designed to manage
or track the flow of data, and these functions are performed by other protocols in other
layers. The basic characteristics of the IP protocol are:
1.-Connectionless Service: Unlike TCP, which is a connection-oriented protocol,
IP does not required initial exchange of information to establish a connection before
packets are send, it just send them which greatly reduces the overhead of IP. Packets
may arrive out of sequence to the destination, but it is the job of the upper layers so
solve this problem.
2.-Best Effort Service: IP is referred to as an unreliable protocol, meaning that it
has no capabilities to manage or recover packets that are undelivered or corrupted. As
mentioned before, protocols at other layers will manage the reliability of the transport.
3.-Media Independent: IP operates independently of the media that carries the
data; however there is a maximum size of the PDU that each medium can transport.
This maximum size is called Maximum Transmission Unit18 (MTU), and it is the
mission of the Data Link Layer to passes the correct MTU for the media used to the
Network Layer. The process called fragmentation occurs when a router split up an IP
packet to send from one media with a type to MTU to another media with a smaller
size of MTU.
The IP Header19 of an IP packet contains binary values or fields that help forward
the packet across the network. The most relevant fields are:
1.-IP Destination Address: 32-bit binary value that represent the host address.
2.-Time-to-Live: 8-bit binary value indicates the ‘life’ of the packet. Each time it
passes through a route, the TTL is reduced by one. When the value reaches zero, the
packet is discharged or dropped.
3.-Protocol: 8-bit binary value that represents the type of data a packet is carrying
(01 for ICMP, 06 for TCP, 17 for UDP, etc).
4.-Type-of-Service: 8-bit binary value that determines the priority of each packet.
The Quality-of-Service uses this field to prioritize packets carrying voice data.
5.-Fragment Offset: 13-bit binary value that, together with the MF flag, allow the
receiver device to reconstruct the IP Packet if fragmentation has occurred during the
transmission.
6.-Flag: 3-bit binary value that indicates flags like MF (More Fragment) or DF
(Don’t Fragment), to determines if the packet has been fragmented during
transmission.
7.-Version: Display the IP version number (4 or 6).
8.-Header Length (IHL): Specifies the size of the packet header.
Technical Diary – Semester 1
Page 9 of 39
Manuel Munoz Soria – 21076464
m
9.-Identification: Identify fragments of an original IP packet.
10.-Header Checksum: Use for error checking the packet header.
11.-Options: Provide fields for other services that are rarely used.
co
20
na
za
ud
y.
Large networks are separated into smaller network21 (called subnetworks or subnets)
to make the number of hosts more manageable. Network designers could decide to
group the hosts geographically, by purpose or by ownership. This division of
networks provides the following enhancements:
1.-Improved Performance: by dividing the network into subnets, we can limit
the boundaries of broadcast messages and control the bandwidth that resources utilize.
2.-Increased Security: division of subnets allow the implementation of
intermediate security devices (like routers and firewall) at the perimeter of the
network, prohibiting, monitoring or allowing only trusted data to access the network.
3.-Address Management: to forward packets, hosts only need to know the
address of an intermediary device (caller router or gateway) to which send packets for
all other destination addresses.
IPv4 addresses22 are divided in four groups of eight bits called octets, and its
logical representation is made of two parts, one to identify the network and the second
to identify the host on that network. Routers only need to know the location of the
network to address the packet.
A default gateway23 should be configured on every host to enable
communication with other networks. This default gateway or router uses a series or
protocol to deliver the packet to the correct network. When the packet arrives to the
router, the first thing the router does is to compare its destination address with the
routing table that each router has. If it finds a matching route, it sends the packet to
the next hope. If it finds that the destination address is within its own network, it
delivers the packet to the addresses host. If there is no matching address, the TTL is
no expires and there is no matching host, then the packet is dropped. If the router
finds two or more possible routes, it determines the best one by using looking at the
metric value of every route.
Routing tables24 can be manually entered by an administrator on the device
(static routing) or calculating dynamically by the means of Routing Protocols25. The
protocols are use by router to determine the best path for delivery of the packet to
destination, and the most common are:
1.-Routing Information Protocol (RIP)
2.-Open Shortest Path First (OSPF)
3.-Enanced Interior Gateway Protocol (EIGRP)
The most discussed Chapter 6 is based on Addressing the Network, this is to
say, in dividing network in subnetworks to utilise the IP address and optimize network
Technical Diary – Semester 1
Page 10 of 39
Manuel Munoz Soria – 21076464
za
ud
y.
co
m
traffic. This subnet calculation also determines what portion of an IP Address belongs
to the subnetted network and which one to the host. We were introduced to the
Network Prefix terminology or CRID26 (Classless Interdomain Routing Notation),
when a subnet mask is represented by the number of bits that are on, for example
255.255.255.0 could be represented as /24.
One of the first things that we learnt was the three different ways that hosts
communicate to each other on a network27:
1.-Unicast: send a packet from one host to an individual host.
2.-Broadcast: send a packet to all the hosts on the network. Routers do not forward
broadcast, and they form the boundary for what is called a broadcast domain. Many
network protocols such as Dynamic Host Control Configuration (DHCP) and Address
Resolution Protocol (ARP) use broadcasts to function.
3.-Multicast: send the packet to a selected group of host on the network
We have a look at the different types of IP addresses, like the one assigned to the
host, the broadcast address (were all bits of the host portion are turn on or set to 1),
the loopback address28, which is 127.0.0.1 and is used to test the TCP/IP Protocol
stack on the computer.
The link-local addresses or AISP (Automatically Assigned IP Addresses)29 are on
the range 168.254.0.0 to 169.254.255.255, and they are assigned by the Operating
System to the host when there is no IP configuration available, e.g. when a DHCP
cannot be contacted.
There are three ranges of called Private Addresses30 that routers will not forward
to other network and are therefore design to be used locally:
Class A: From 10.0.0.0 to 10.255.255.255
Class B: From 172.16.0.0 to 172.31.255.255
Class C: From 192.168.0.0 to 192.168.255.255
The rest are experimental addresses, and within this range we have the Multicast
Addresses from 224.0.0 to 239.255.255.255, used for multicast groups on a local
network. Packets to these destinations are always transmitted with a TTL value of 1;
this is why routes connected to the local network will never forward them. A special
address could be the 224.0.1.1, reserved for Network Time Protocol (NTP) to
synchronise the time-of-day clocks of the network devices.
One bit can only be either turn on or off, thus representing the value of 1 or 0.
Focusing on subnetting now, we learnt how to covert to binary the decimal
representation of an IP address, and that one byte contains 8 bits, and each one of then
is been assigned a numeric value and also an added value which is the sum of the bits
that are turn on (set to 1). This table illustrate the bit positions and values of one byte:
na
Bit Order
Numeric Value
Added Value
8
128
128
7
64
192
6
32
224
5
16
240
4
8
248
3
4
252
2
2
254
1
1
255
There are also a number of rules31 at the time of addressing a host, and these rules are
dependable of the Class of IP Address32 that we want to use, Class A, B or C. For
example, one of the rules said that for a Class A IP address the first bit must be turn
off, and this is why a Class A IP address can’t have a higher value than 127. The
following table represents the IPv4 rules:
Technical Diary – Semester 1
Page 11 of 39
Manuel Munoz Soria – 21076464
B
Rules
- A rule state that none of the bits can’t either
be all turn off (= to 0) or all turn on (= to 1)
- 1st bit must be off (higher order bit)
- 127 network is used for loopback only
- 1st bit must be on and second bit off
C
- 1st two bit must be on and third must be off
A
Maximum Value on octects
000 0000 = 0 (network address)
1111 1111 = 255 (broadcast address)
0000 0001 = 1 is the lowest value
0111 1111 = 127 is the highest value
1000 0000 = 128 is the lowest value
1011 1111 = 191 is the highest value
1100 0000 = 192 is the lowest value
1101 1111 = 223 is the highest value
Valid Range
1 to 126.0.0.0
128 to 191.0.0.0
192 to 223.0.0.0
m
Class
---
Binary33 is a numeric system based in the radix of 2, and to start calculating
subnets34 we need to be aware of the table of power of 2, which I have represented on
the right hand side up to the value of 12.
For the maximum number of subnets:
(2 (number of bits that are turn on)) – 2
No of bits
1
2
4
8
16
32
64
128
256
512
1024
2048
4096
8192
16382
32768
co
To calculate the number of subnets and host per
subnets we use the following formulas:
Power of 2
20
21
22
23
24
25
26
27
28
29
210
211
212
212
213
214
ud
y.
For the maximum number of hosts per subnet:
(2 (number of remaining bits, the ones that are off)) – 2
na
za
The above formulas are known as part of the ‘subnet zero concept35’, and are
almost obsolete.36 The Cisco formulas are the same but without dividing by 2.
The multiplier is the number of bits that are off on the octet that we are
subnetting, and knowing the value of the multiplier will help you to determine at what
rate the subnets are increasing.
The allocation of IP addresses on the network should be designed carefully
and be well planned and documented in order to prevent duplication and provide the
best possible implementation. One useful tool in the addressing plan in the creation of
a network diagram37, as well as a list of the division and assignments of available
subnets, making sure that the sizes will cope with the demands.
During this long chapter 6, we went into details of Internet Assigned Numbers
Authority (IANA), the organisation that manages the IP addresses of the whole
Internet, and that in the mid-1990s delegated part of the remaining IPv4 addresses to
companies called Regional Internet Registries38 (RIRs), who manage the IP addresses
for specific areas of the globe.
However, most organisations obtain their IP addresses from ISP companies
(Internet Service Providers), together with other services like web hosting, DNS39, email, etc. ISPs are structured hierarchically40, depending of close their connection is
to the backbone of the Internet, they can be divided in Tier1 (large international
companies directly connected to the Internet backbone) Tier 2 (obtain their
connection from Tier 1 and provide Internet generally to business customers) and
Technical Diary – Semester 1
Page 12 of 39
Manuel Munoz Soria – 21076464
m
finally Tier 3, who purchase the service from Tier 2 ISP and deliver the connectivity
to home users or customer with little or no computer expertise.
IPv641 was created in the early 1990s by the Internet Engineering Task Force
(IETF) and was meant to provide more scalability and expansion of the addressing
capabilities, eventually replacing IPv442. Some of the relevant features of IPv6 are:
128-bit hierarchical addressing, unlike Ipv4 which is 32-bit
Integrated security like authentication and privacy
Flow labelling capability as QoS mechanisms
Header format simplification to improve packet handling
2. References
1
na
za
ud
y.
co
Transport Layer: Information from Answers.com http://www.answers.com/topic/transport-layer [Accessed 27
December 2009]
2
Understanding Data Encapsulation. http://www.topbits.com/understanding-data-encapsulation.html [Accessed 27
December 2009]
3
User Datagram Protocol – Wikipedia http://en.wikipedia.org/wiki/User_Datagram_Protocol [Accessed 27
December 2009]
4
RFC 768 User Datagram Protocol. http://www.faqs.org/rfcs/rfc768.html [Accessed 27 December 2009]
5
The TCP/IP Guide – UDP Common Applications and Server Port Assignments
http://www.tcpipguide.com/free/t_UDPCommonApplicationsandServerPortAssignments-3.htm [Accessed 27
December 2009]
6
Transmission Control Protocol http://en.wikipedia.org/wiki/Transmission_Control_Protocol [Accessed 27
December 2009]
7
RFC 793 Transmission Control Protocol http://www.faqs.org/rfcs/rfc793.html [Accessed 27 December 2009]
8
TCP Analysis Flag Options. http://www.firewall.cx/tcp-analysis-section-4.php [Accessed 27 December 2009]
9
TCP Window Size Adjustment and Flow Control
http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm [Accessed 27 December
2009]
10
Frames, Packets and PDU’s
http://www.inetdaemon.com/tutorials/basic_concepts/communication/frames_packets_n_pdus.shtml [Accessed 27
December 2009]
11
OSI Protocol Stack Description http://www.interfacebus.com/Design_OSI_Stack.html [Accessed 27 December
2009]
12
Internet Socket http://en.wikipedia.org/wiki/Internet_socket [Accessed 29 December 2009]
13
IANA – Internet Assigned Numbers Authority http://www.iana.org/ [Accessed 29 December 2009]
14
Well Known IP Ports http://www.networksorcery.com/enp/protocol/ip/ports00000.htm [Accessed 29 December
2009]
15
List of TCP and UDP port numbers http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
[Accessed 29 December 2009]
16
The TCP/IP Guide Network Layer (Layer 3) http://www.tcpipguide.com/free/t_NetworkLayerLayer3.htm
[Accessed 29 December 2009]
17
Differences IPv4 Vs IPv6 http://www.techsutram.com/2009/03/differences-ipv4-vs-ipv6.html [Accessed 29
December 2009]
18
What is maximum transmission unit?
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213605,00.html# [Accessed 29 December 2010]
19
IP Header http://www.tekelec.com/ss7/protocols/ip2.asp [Accessed 29 December 2009]
20
IP Header Diagram. [http://labspace.open.ac.uk/file.php/4918/ipheader.gif]
21
What is a subnetwork or subnetting?
https://support.comodo.com/index.php?_m=knowledgebase&_a=viewarticle&kbarticleid=432 [Accessed 29
December 2009]
22
How Stuff Works – What is an IP Address? http://www.howstuffworks.com/question549.htm [Accessed 29
December 2009]
23
What is the default gateway http://kb.iu.edu/data/ajfx.html [Accessed 29 December 2009]
24
Routing tables http://compnetworking.about.com/od/hardwarenetworkgear/f/routing_table.htm [Accessed 29
December 2009]
25
Routing Protocols http://www.skullbox.net/routing.php [Accessed 29 December 2009]
26
CIDR Notation http://compnetworking.about.com/od/workingwithipaddresses/a/cidr_notation.htm [Accessed 30
December 2009]
27
What is unicast, broadcast and multicast? http://www.networkguruz.com/networking-basics/what-is-unicastbroadcast-and-multicast/ [Accessed 30 December 2009]
28
Loopback http://en.wikipedia.org/wiki/Loopback [Accessed 30 December 2009]
Technical Diary – Semester 1
Page 13 of 39
Manuel Munoz Soria – 21076464
29
co
m
How is my IP address assigned? Leo Notenboom http://ask-leo.com/how_is_my_ip_address_assigned.html
[Accessed 30 December 2009]
30
Private Network http://en.wikipedia.org/wiki/Private_network [Accessed 30 December 2009]
31
IP Addresses Rules http://www.noc.ucf.edu/IPAddressRules.htm [Accessed 30 December 2009]
32
IP Addressing, subnet mask, wildcard mask http://www.rhyshaden.com/ipadd.htm [Accessed 30 December
2009]
33
Binary Numbers http://php.about.com/od/programingglossary/qt/binary.htm [Accessed 30 December 2009]
34
Get a Clue: Calculating Subnet Masks http://www.networkclue.com/routing/tcpip/calculating-masks.aspx
[Accessed 30 December 2009]
35
Subnet Zero and the All-Ones Subnet
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080093f18.shtml [Accessed 30
December 2009]
36
Subnet Zero Concept http://www.subnettingquestions.com/subnetzero/ [Accessed 30 December 2009]
37
Network Diagram http://en.wikipedia.org/wiki/Network_diagram [Accessed 30 December 2009]
38
History of RIRs http://www.nro.net/archive/news/rir-history.swf [Accessed 30 December 2009]
39
The TCP/IP Guide – DNS Hierarchical Authority
http://www.tcpipguide.com/free/t_DNSHierarchicalAuthorityStructureandtheDistributed.htm [Accessed 30
December 2009]
40
HowStuffWorks – The Internet Network Hierarchy http://www.howstuffworks.com/internet-infrastructure1.htm
[Accessed 30 December 2009]
41
IPv6 http://en.wikipedia.org/wiki/IPv6 [Accessed 30 December 2009]
42
IPv4 vs IPv6 – Guides & Tutorials http://forums.techarena.in/guides-tutorials/1064417.htm [Accessed 30
December 2009]
za
ud
y.
3. Straightforward and Difficulties
I strongly believe that there has not been a part of this section of the diary that
I would consider easy or straightforward, maybe I would say there were difficult parts
and less difficult parts. Among these less difficult parts were the materials of the first
two chapters, where we study the Transport and Network layer. The instructor
presented the subjects of each chapter really well and the routine and organisation of
the classes took place when we most needed, which is great. The presentations that
the teacher was showing and explained to us really help me digest the terminology
and the concepts of this part of the diary.
Without any doubt, chapter 6 was a challenge to all of us. It is so far the
hardest material of all that we have to assimilate, full of complexity, with numbers,
calculations and mathematical thoughts that for a moment made me believe I was
doing a course related to stock exchange rates, where we have to calculate the exact
number for every specific environment that is in need of IP subnetting. Luckily for us,
the concepts of chapter 6 were covered during a period of two weeks, which gave us
the crucial extra time to truly understand this important aspect of network and IP
addressing.
na
4. Strategies
Using the off line Cisco content that I had on my computer, I started to copy
and paste some of the text I needed for extra reading into a document, creating a draft
text of the online course. I structured this document on chapters as it was on the
online material and then printed each chapter so that I could read it on my spare time.
I learn better when I have papers at hand; the online course is not good enough on its
own to pass this Cisco course and that is why I created this extra printed help. A few
days after starting that, I saw online the book for this course, and I thought about
buying it, but changed my mind and continue with the process of resuming the online
content into a draft document. Then, from this draft document, I extracted the ideas
and materials to start doing this Technical Diary.
The Foundation Degree sometimes requires us to be at TVU on Saturdays for
specific lectures timetabled on weekends, but I have realised that the Saturday we do
Technical Diary – Semester 1
Page 14 of 39
Manuel Munoz Soria – 21076464
not need to go to TVU does not mean that we have the day free. I am working now
every single Saturday, either at TVU if there is a lesson, or at home catching with the
TVU Problem Solving Module or preparing myself for the next Cisco lesson taken
place on Wednesday. All Saturday mornings are dedicated to my studies. This is a
must if I really want to obtain the CCNA certification and a degree.
na
za
ud
y.
co
m
5. Reflections
It is indeed very frustrating to discover the poor layout of Cisco at the time of
designing the content of this particular Network Fundamental course. The first five
chapters were perfect, in the sense that they build into one another, going through the
OSI Model layer as we study one specific layer per week. However, I believe the
Network Layer should have been divided into two chapters, one for the functions of
the layer itself and another one to study the IP Header only. And so the same for
Chapter 6, it should have been divided in two separate chapters, one to understand the
different types of IP addresses and the other to deal with subnetting only.
The workload of the course that we have to do has increased dramatically
during Chapter 6, and I have to thank all the support given by the teacher and the
practical that we do with the Cisco Technician every Wednesday. Their tips and
approaches really help me to get the grips of subnetting, performing network
calculations in a matter of minutes, though the learning road to get that knowledge has
not been easy.
Technical Diary – Semester 1
Page 15 of 39
Manuel Munoz Soria – 21076464
Part 3 [Chapters 7, 8 and 9]
za
ud
y.
co
m
1. Technical Content
For Chapter 7 we scrutinise the Data Link Layer, layer number 21 in the OSI
model. So far we have seen that the Application layer 1 provides the interface for the
user, the Transport layer 4 is responsible for managing communications between
processes, while Network layer 3 organise the data so that it can travel across
networks. It is the role of the Data Link layer 2 to prepare the Network layer 3 packets
for transmission, provide error detection and control access to the physical media.
Data Link layer 2 processes2 occur both in hardware and software, and to support
this variety of network functions, the Data Link is divided in two sublayers3, one
focusing in software and the other one in hardware. These two sublayers are:
-Logical Link Control4 (LLC) identifies which Network layer 3 protocol, such as
IP or IPX, is being used for the frame.
-Media Access Control5 (MAC) provides addressing and delimits the data
according to the physical signalling requirement of the medium and the type of
protocol in use. This addressing technique is implemented by the means of a MAC
address, a 48-bit hexadecimal number assigned to every Physical Layer 1 device.
na
Data Link layer 2 uses two basic methods for controlling the access 6 to the media,
these are:
-Controlled, also known as schedule or deterministic, where each device has its own
time to use the medium. This provides well-ordered access to the media, but is
inefficient because a device has to wait for its turn before it can be use the medium.
-Contention-based, where all devices compete for the use of the media. To detect if
another device is transmitting and prevent chaos, this method uses a Carrier Sense
Multiple Access7 (CSMA) process that helps avoid collisions. This signal carrier
method is usually implemented with either of these two methods for detecting
collisions:
-CSMA/CD (Collision Detection); the device monitors the media and transmit when
there is not data signal presence, indicating that the media is free. If another device
transmits at the same time, all devices will stop their transmission and will try them
later. Traditional Ethernet uses this method.
Technical Diary – Semester 1
Page 16 of 39
Manuel Munoz Soria – 21076464
-CSMA/CA (Collision Avoidance); the device examines the media for the presence of
a signal first, and if the media is free it sends a notification to transmit. This method is
used by wireless networking 802.11.
co
m
The topology of a network8 is the arrangements of devices and the connections
between them. We have to distinguish between physical topology, the actual physical
connections between devices, and logical topology, the way the networks transfer the
information between nodes. The logical topology9 is independent of the physical
network layout, and the most commonly used topologies are:
1. Point-to-point topology, where the media interconnects just two nodes and they do
not have to share the media. The data can flow in one direction only, half-duplex, or
in full-duplex mode if the transfer occurs simultaneously on each direction.
2. Multi-access topology occurs when the media is shared. Every device sees all the
information travelling on the media, but the contents of the frames are processes only
by the nodes to which it is addressed.
3. Ring topology is when each node receives a frame in turn; if the frame is not
addressed to the node, it passes it to the next node. The method of transmission is
called Token passing and allows the ring topology to control the media.
ud
y.
During this chapter we also study the three basic parts that form the frame of a
given protocol running on the Data Link Layer. The three main parts of a frame are:
10
na
za
1. Header. It contains the source and destination address fields, as well as other fields
that include the priority, quality of service and the type of upper layer service
containing in the frame.
2. Data contains the user data to be transmitted.
3. Trailer. It contains a field called Frame Check Sequence11 (FCS) that determines if
the frame has arrived without errors. Note that FCS only provides error detection, and
no correction. The way the Frame Check Sequence detects and error is by looking at
the value of the Cyclic Redundant Check12 (CRC), created by the transmitting node to
summaries the contents of the frame.
The last thing that we look up during this chapter was the different protocols running
on the OSI Data Link Layer 2 that are covered in the CCNA course. Some of these
protocols13 are Ethernet, Point-to-Point Protocol (PPTP), Frame Relay, Asynchronous
Transfer Mode (ATM), etc.
Ethernet is the most widely use LAN technology, and if fact the Ethernet protocol is a
family of networking technologies defined in the IEEE 802.2 and 802.3 standards14. It
provides unacknowledged connectionless service over a shared media using
CSMA/CD as the media access control.
Other common protocol is the Point-to-Point, mainly used for connecting WANs,
defined by RFCs (Request for Comments).
Technical Diary – Semester 1
Page 17 of 39
Manuel Munoz Soria – 21076464
na
za
ud
y.
co
m
The Wireless Protocol, defined in 802.11, has additional controls to challenge the
environment of wireless where the transmission takes place.
The following pictures are frame structures samples of both the Ethernet Protocol and
Point-to-Point Protocol, so we can see the differences in the structure. Both frames
follow the standard of Header-Data-Trailer, but with variations.
Technical Diary – Semester 1
Page 18 of 39
Manuel Munoz Soria – 21076464
ud
y.
co
m
Chapter 8 landed on the OSI Physical Layer 1, the bottom layer, whose
function if to control how the data in placed on the media and then transmitted as
signals. It also has the responsibility of retrieving these signals from the media and
passes them to the Data Link Layer 2 as a complete frame. This diagram represents
clearly the flow of packets through the OSI Layer Model:
na
za
What the media carries is only signals, and there are three basics forms of network
media where the bits are represented:
-Copper Cable; signal the bits as patterns of electrical pulses.
-Fiber; signal the bits as patterns of lights.
-Wireless; signal the bits as patterns of radio transmission.
The Physical Layer Standards are implemented in hardware, developed by
engineers in the form of circuits, media and connectors. While the standards of upper
layers are implemented in software and defined by the Internet Engineering Task
Force15 (IETF) in RFCs, the technologies use in the Physical Layer are defined by
organisations such as the International Organisation for Standardisation (ISO) or the
Institute of Electrical and Electronics Engineers (IEEE).
The three fundamental functions of the Physical Layer16 are the physical
components, the data encoding and the signalling. In this chapter we study each
section in detail.
1. Physical Components. First of all we have to understand that different media
transfer the bits at different speeds, and that this transfer of data can be measured in
three ways:
-Bandwidth17; the amount of information that flows from one place to another in a
given amount of time. Bandwidth is normally measured in megabits per second
(Mbps)
-Throughput18; this is the transfer of bits across the media over a given period of time,
and usually id does not match the bandwidth specified by the media. Throughput can
be affected by external factors like the amount of traffic on the network, the type of
this traffic and the number of devices sharing the media. In a multi-access topology,
nodes are competing for the media, and therefore the available throughput of each
node decreases as the usage of the media increases. In addition, on network with
multiple segments, the throughput cannot be faster than the slowest link. Even if all
Technical Diary – Semester 1
Page 19 of 39
Manuel Munoz Soria – 21076464
the other links have high bandwidth, it only takes one segment with a slow path to
create a bottleneck to the throughput of the entire network.
-Goodput19; this is the amount of usable data transferred to the network user, and is
calculated by subtracting form the throughput the traffic overhead for establishing
sessions, acknowledgements and encapsulation.
The different types of media transmission that we can find are as follows:
za
ud
y.
co
m
-Copper Media; data is transmitted as electrical pulses, and the timing and voltage of
these signals are prone to interferences or ‘noise’ from outside the cables. Radios
waves and electromagnetic devices can create Electromagnetic interferences (EMI)
that can distort and corrupt the data signals. Different types of copper cables use
shielding or twisting the internal pair of wires to minimize signal degradation. 20
At the time of designing a network infrastructure, it is crucial to avoid known sources
or EMI and use cabling techniques that provide proper handling and termination of
the cables.
Unshielded Twisted Pair21 (UTP) cables are generally composed of 6 internal
cooper cables, organised in pair that have been twisted to keep the wires as close to
each other as possible, thus cancelling the signals caused by electromagnetic
interference of external sources. This cancellation provide by the twist also helps
avoid and effect called Crosstalk, where the interferences are generated by the
magnetic field around the adjacent pairs of wires in the cable.
IEEE rates the UTP cabling according to its performance22, creating categories
based on the ability of the cable to carry higher bandwidth rates. For example
Category 5 (Cat5) is used commonly in 100BASE-TX installations, while Enhanced
Category 5 (Cat5e) or Category 6 (Cat6) are for 1000BASE-TX installation where
data transmitted over the media can reach 1Gigabyte of bandwidth.
A derivation cable of UTP standard is called STP (Shielded Twisted Pair)
where the wires are wrapped in a metallic braid or foil. STP provides better noise
protection than UTP cabling, but it also has a higher price. The new 10 GB standard
for Ethernet has a provision of using STP cabling.
Coaxial cable is another type of cooper media, used mainly for high radio
frequency signals like cable television. In the past coaxial cables was used in Ethernet
installations, but today UTP offers lower cost and higher bandwidth than its
predecessor.
STP CABLE
na
UTP CABLE
COAXIAL
23
The ISO 887724 specified RJ-45 connector to be used for a range of Physical Layer
specifications, one of which is Ethernet. Another specification, EAIA-TIA 568
describes the colour codes for Ethernet straight-through and crossover cables.
Technical Diary – Semester 1
Page 20 of 39
Manuel Munoz Soria – 21076464
The picture on the left hand side shows the two
different ends standard for a RJ45 Ethernet cable.
It is essential to ensure all cooper media terminations
are of high quality perform and tested to ensure
optimum performance.
m
25
na
za
ud
y.
co
-Wireless Media26; it carries the electromagnetic signal at radio and microwave
frequencies over the air. Wireless communications are therefore highly susceptible to
electromagnetic interferences, buildings, walls and also certain materials like steel
that reflect the waves. The benefits of wireless are the mobility of host that the
coverage provides and the cost saving at the time of deploying installations in difficult
locations were the use of wiring will be expensive.
A major issue with wireless communications is security27, because virtually
anybody can access the media as it travels through the air, capturing the waves and
decoding them. It is the job of the network administrators to monitor and encrypt the
data as it is transmitted, protecting the Wireless LANs from unauthorised access.
The IEEE created four common data communications standards for wireless,
and these are:
-Standard IEEE 802.1128; this is the wireless LAN that uses a contention or nondeterministic system with a Carrier Sense Multiple Access/Collision Avoidance
(CSMA/CA). This standard has develop on others that may not be compatible to each
other, these others29 are:
802.11a; operates at 5GHz frequency and provides up to 54Mbs bandwidth.
Because it operates at higher frequencies, this standard has a small coverage area and
is less effective at penetrating building structures. Devices operating at this standard
are not compatible with the devices of standards 802.11b and 802.11g.
802.11b; operates at 2.4 GHz and offers up to 11 Mbps bandwidth. It provides
a longer coverage area and is better at penetrating building than 802.11a is.
802.11g; operates at the same frequency that 802.11b (2.4 GHz) but offers 54
Mbps of bandwidth instead, the same figure that 802.11a offers.
802.11n; this standard is currently in draft, and the proposed frequency for it
will be 2.4GHz or 5 GHz, with data rates of 100 Mbps to 210 Mbps and a coverage
range of up to 70 meters.
-Standard IEEE 802.1530; this is the standard Wireless Personal Area Network
(WPAN), commonly known as ‘bluetooth’. It uses a device pairing process to
communicate from a distance up to 10 meters.
-Standard IEEE 802.16; is known as WiMAX (Worldwide Interoperability for
Microwave Access), and uses a point-to-multipoint topology to provide wireless
broadband access.
-Global System for Mobile Communications (GSM); implements the Layer 2 General
Packet Radio Service (GPRS) protocol that provides communication over mobile
telephony networks. Other protocols, including GPRS, also enable satellite
communications between earth stations and satellite links.
Technical Diary – Semester 1
Page 21 of 39
Manuel Munoz Soria – 21076464
na
za
ud
y.
co
m
-Fiber Media31; they are capable of very large data bandwidth, and they uses either
glass or plastic fibers to transfer light impulses where the bits are encoded. Because
they are not electrical conductors, this media is immune to electromagnetic
interference and can operate at much greater distances than cooper media without the
need for signal regeneration.
Optical Fiber is generally used as a backbone cabling for high-speed-transfer.
It is more expensive than cooper media and the light pulses are generated either by
lasers or light emitting diodes (LEDs). Electronic semi-conductor devices called
photodiodes32 detect the light pulses and convert them to voltages that can then be
reconstructed into data frames. Fiber optic cables can be classified in two types33:
a. Single Mode is when the cable carries a single ray of light. This type of unidirectional cable can transmit optical pulses for very long distances, but because light
can only travel in one direction over the optical fiber, two fibers are required on the
cable to support full duplex operation.
b. Multimode is when the LED emitter enter the fiber at different angles, this cause
the pulses becoming blurred at the receiving end, creating an effect known as modal
dispersion, which limits the length of multimode fiber segments.
The termination of the fiber cable requires special training and equipment. The three
common errors of fiber optic34 cable termination are:
-Misalignment, when the fibers are not aligned with each other when joined.
-End gap, when the media do not completely touch at the splice or connection.
-End finish, when the media terminations are dirty or not well polished.
It is therefore highly recommended to use an Optical Time Domain Reflectometer35
(OTDR) to inject a pulse of light into the cable and test the media. The OTDR can
also calculate the approximate distance at which these faults are detected along the
length of the cable.
The following pictures represent some common Fiber Media Connectors. Note that
LC stands for Lucent Connector.
Technical Diary – Semester 1
Page 22 of 39
Manuel Munoz Soria – 21076464
m
za
ud
y.
co
2. Data Encoding. Encoding is the method of converting a stream of bits into a
predictable pattern, distinguishing data bits from control or error detections bits, so
that can the stream of bits ca be recognised by both the sender and the receiver.
Coding groups36 is the method of using a number of bits to represent a data
value, indicating for instance the start or end of a frame, or representing the data value
0011 as the code group 10101. This method helps detect error more efficiently,
especially as data transmission rates speed increases, and although the use of coding
groups introduces overhead in the form of extra bits to be transmitted, they improve
the reliability of the communication. This is particularly true for higher speed
transmissions.
Some of the advantages of using code groups are:
Reduction of bit level error37; the transmission needs to be synchronise from sender to
receiver, in order to sample the signal into the media. Transmission of groups of data
bits allows of minor error in synchronisation, ensuring that the sequence of bits will
be interpreted correctly at the other end.
Limitation of the energy transmitted; group coding balance the process of transmitting
1s and 0s, preventing the media of overheating is lots of 1s are sent.
Distinction between data bits and control bits; the code groups have three types of
symbols that represent the bits: data, control and invalid symbols.
Better media error detection; this is achieved by using the invalid symbols. If received
the Physical Layer can determine that an error has occur during transmission.
na
3. Signalling. This is the method of representing the values ‘1’ or ‘0’ on the media,
this representation is achieved by changing one or more of the Amplitude, Frequency
or Phase of the signal. For the transmission to work there needs to be some sort of
clock between sender and receiver to maintain synchronisation. There should be as
well a signalling method agreed to be used between the ends, so that the signal can be
detected and decoded properly. Two common signalling methods are:
NRZ Signalling 38(Non Return to Zero); a low voltage on the signal represents a 0,
and a high voltage value represent a 1. This method is only suited for slow data links,
because NRZ signalling uses bandwidth inefficiently and is susceptible to
electromagnetic interference.
Manchester Encoding39; this signalling method represent the values as voltage
transition, from low to high represents the value of 1 and from high to low is 0.
Manchester Encoding is the signalling method used in 10BaseT, running at 10 Mbps.
In Chapter 9 we study Ethernet, the predominant LAN technology in the world.
The success of Ethernet is because of its simplicity and ease of maintenance, the
Technical Diary – Semester 1
Page 23 of 39
Manuel Munoz Soria – 21076464
m
ability to incorporate new technologies, its reliability and the low cost of installations
and upgrades.
It operates at the lower two layers of the OSI Model, performing a key role in
the communication that takes place between devices. For Ethernet, the IEEE 802.2
standard40 describes the Logical Link Control (LLC) sublayer functions, while the
802.3 standard describes the Media Access Control (MAC) sublayer and the Physical
Layer functions.
ud
y.
co
The Ethernet MAC sublayer has two primary functions: Data Encapsulation (provides
addressing and error detection) and Media Access Control (control the placement of
frames on the media).
The logical topology of Ethernet is multi-access bus, in which all the devices
in the network share the media, thus receiving each one of them all the frames
transmitted by the others. The examination of MAC address is use to determine if the
node needs to process the receiving frame. Ethernet uses the method Carrier Sense
Multiple Access with Collision Detection (CSMA/CD) to define how devices can
access the media.
na
za
- Encapsulating the Packet. There are two styles of Ethernet frames, the original IEEE
802.3 and the revised IEEE 802.3 that includes the addition of a Start Frame Delimiter
(SFD) field. The original Ethernet frame has a minimum frame size41 of 64 bytes and
a maximum of 1518 bytes. The IEEE 802.3ac standard, release in 1998, extended the
maximum frame size to 1522 bytes to accommodate emerging technologies like
Virtual Local Area Network (VLANs). If the size of the transmitted frame is less than
the minimum or greater than the maximum, the frame is dropped and collisions are
likely to occur.
The following image displays the fields of an Ethernet frame:
-Preamble and Start Frame Delimiter Fields; used for synchronization between the
sending and receiving devices.
-Destination MAC Address Field; contains the MAC address of the intended
recipient.
-Source MAC Address Field; contains the MAC address of the original sender.
-Length/Type Field; defines the exact length of the frame’s data field, ensuring that
the message is received properly. When a node received a frame, it examines the
length-type frame field and if the value is equal to or greater than 0x6000
hexadecimal or 1536 decimal, then the contents of the data field are decoded
according to the protocol indicated.
Technical Diary – Semester 1
Page 24 of 39
Manuel Munoz Soria – 21076464
-Data and Pad Fields; between 46 and 1500 bytes, it contains the data encapsulated
from a higher layer.
-Frame Check Sequence Field; is used to detect errors in the frame by using a Cyclic
Redundancy Check (CRC) generated by the receiver.
co
m
-Ethernet MAC address. It is a 48-bit binary value expressed as 12 digits
hexadecimal, and is added as part of the Layer 2 PDU. It is burn into the ROM of the
device and therefore cannot be changed. IEEE assign to each vendor of devices a 3byte code called the Organisationally Unique Identifier (OUI), and each device must
use that vendor assigned OUI42 as their first 3 bytes. In addition, all MAC addresses
with the same OUI must be assigned a unique value in the last 3 bytes, representing
the vendor serial number.
ud
y.
A representation of the Hexadecimal
Number values is displayed on the table
on the left hand side.
Hexadecimal is technically represented in
text with the value preceded by ‘0x’.
Therefore to represent the hexadecimal
value of 73, we will write 0x73.
Hexadecimal is used to represent MAC
Addresses and IP Version 6 addresses.
na
za
-Current Ethernet. In the old days the central point of a network segment was a hub,
and the risk of collisions increased as the number of device connected. With the
introduction of switches the number of collisions is greatly reduced. Switches can
control the flow of data by isolating each port and sending a frame only to its proper
destination, instead of sending the frame to all the ports like hubs do. This and the
introduction of full duplex communications, where the media transfer both
transmitted and received signals at the same time, has enable the development of
1Gbps Ethernet and beyond.
Ethernet uses Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) to detect and handle collisions. With this method, all devices have to
listen before transmitting. It may occur that the distance between devices is such that
both will start to transmit unaware of each other transmission. The amount of time it
takes to the signal to propagate across the media is called latency.
When a collision is detected, the devices involved in the collision send a jamming
signal43 to notify the others, so that they will invoke a back off algorithm. The jam
signal is 32-bit length, and this back off algorithm causes the devices to stop
transmitting for a random amount of time, to allow the collision signal to subside.
After this random back off time expires, the devices go into the ‘listening before
transmitting’ mode.
Technical Diary – Semester 1
Page 25 of 39
Manuel Munoz Soria – 21076464
co
m
In Ethernet with speed of 10 Mbps, the sending device transmits 64 bits of timing
synchronisation knows as Preamble, meaning that each receiving device will use 8
bytes of this timing information to synchronise with the circuit. Ethernet
implementations with 100 Mbps throughput or more re synchronous and do not need
the timing information, but for compatibility reasons. The Preamble and Start Frame
Delimiter (SFD) are still present on the frames.
Slot time is an important parameter to determine how many devices can share a
network on half-duplex Ethernet. The slot time for a 1000 Mbps Ethernet is 4096 bit
times or 512 octets; this slot time ensures that is a collision is going to occurs, it will
be detected within the first 4096 bits (512 for a 100 Mbps Ethernet) of the frame
transmission.
Interframe Spacing. Once a frame has been sent, the devices are required to wait a
minimum of 96 bit (9.6 microseconds) before transmitting again. This interframe
space reduces as the Ethernet speed increases, a for a 1 Gbps Ethernet is 0.096
microseconds.
na
za
ud
y.
-Types of Ethernet44t. 10 Mbps Ethernet or 10BASE-T is generally no longer used for
LAN installations. The most popular are the 100 Mbps (Fast Ethernet) and the 1000
Mbps (Gigabit Ethernet). The 10 Gbps Ethernet is not fully implemented in small
networks.
100 Mbps – Fast Ethernet; if it uses Cat5e or Cat6 cooper media is known as
100BASE-TX, and if it used fiber media is known as 100BASE-FX. Because of the
higher frequency signals used in Fast Ethernet, the transmission are more susceptible
to noise, and therefore two separate encoding are used by 100 Mbps Ethernet to
enhance the signal.
1000 Mbps – Gigabit Ethernet; due to its speed, on this Ethernet timing is critical,
and its performance depends on how fast devices can detect voltages levels and how
reliable the signal is. The types of Gigabits Ethernet are based on the media used.
1000BASE-T Ethernet provides full-duplex transmission using Cat5e or later media.
It uses an encoding scheme called 4D-PAM5 that enables the transmission of the
signal over the 4 pair of wires simultaneously. This allows the transmission and
reception of data in both directions and at the same time. 1000BASE-T uses many
voltage levels, nine on idle periods and up to 17 when transmitting, this makes the
transmission more susceptible to noise due to cable and termination problems.
1000BASE-SX and 1000BASE-LX Ethernet used Fiber optics cables, providing noise
immunity, small physical size and increased unrepeated distances. The transmission
code is based on the 8B/10B encoding scheme and the principal differences between
SX and LX fiber versions are the media, connectors and wavelength of the signal.
-Switches and Hubs45. Hubs do not perform any type of traffic filtering and some of
the issues of having a hub based network are scalability, latency (each other had to
wait for an opportunity to transmit in order to avoid collisions), network failure (if a
device creates detrimental traffic, the communication for all devices will be affected)
and collisions
Switches, on the other hand, allow the segmentation of the LAN into separate
collisions domains. They improve the throughput of a network because each node has
a full media bandwidth available for itself; they provide a collision-free environment
and full-duplex operation. Before switches existed, Ethernet was half-duplex only.
Selecting Forwarding is the process by which switches forward individuals
frames from a receiving port to another port where the destination devices is
Technical Diary – Semester 1
Page 26 of 39
Manuel Munoz Soria – 21076464
co
m
connected. This is achieved by the means of a MAC tables that the switches
maintains. The switch will look in this MAC table for the MAC address
corresponding to the destination MAC address of the packet it needs to forward. To
accomplish their purposes, switches use five basic operations:
-Learning; the MAC address is populated as the activity in the switch increase and
frames are travelling in and out.
-Aging; the entries in the MAC address have got a timestamp when they are created,
and old entries are removed accordingly.
-Flooding; if the switch doesn’t know what port to send the frames, it sends it to all
ports except the one that sends it.
-Selective Forwarding; this is the process of sending a frame to a port where the
switch knows the destination host resides.
-Filtering; switches will drop frames based on filters like frames with bad CRC,
corrupted or blocked by security settings.
ud
y.
-ARP Process46. Address Resolution Protocol is responsible of maintaining ARP
tables, where MAC addresses are mapped to IPv4 addresses, and are use by the Data
Link Layer and the Network Layer to determine the destination of the frame.
ARP tables are maintaining dynamically and are populated either by
monitoring the traffic that occur on the local network segment or by devices that
request an ARP request by broadcast. The entries on the ARP tables are also
timestamp, like in the MAC tables, and they are deleted if they are no in used for a
while. Static ARP entries do not expire and must be deleted manually.
If a node sends an ARP request47 looking to map a MAC address to an IPv4
address outside its network, the router uses a process called Proxy ARP, acting as the
original sender of the request and, in a way, faking the identity of the original sender.
By default, Cisco routers have Proxy ARP enable on all LAN interfaces.
ARP spoofing and ARP poisoning and techniques used by intruders to inject
wrong MAC addresses to a network, generating fakes ARP requests. To increase the
security, manually configured static ARP can be used as well as restricting the
network access by MAC filtering to only the devices listed on the ARP tables.
za
2. References
1
Data Link Layer Definition http://www.linfo.org/data_link_layer.html [Accessed 4 February 2010]
CCNA Study Notes – Data Link Layer http://www.defoenet.com/ccna/osi_l2.html [Accessed 4 February 2010]
3
The TCP/IP Guide – Data Link Layer http://www.tcpipguide.com/free/t_DataLinkLayerLayer2.htm [Accessed 4
February 2010]
4
IEEE 802.3 Logical Link Control http://www.erg.abdn.ac.uk/users/gorry/eg3567/lan-pages/llc.html [Accessed 4
February 2010]
5
Media Access Control – Wikipedia http://en.wikipedia.org/wiki/Media_Access_Control [Accessed 4 February
2010]
6
Data Link Layer and IEEE http://www.comptechdoc.org/independent/networking/guide/netieee.html [Accessed 4
February 2010]
7
Carrier Sense Multiple Access http://www.linktionary.com/c/csma.html [Accessed 4 February 2010]
8
Network Topologies Examples http://compnetworking.about.com/od/networkdesign/a/topologies.htm [Accessed
4 February 2010]
9
Webopedia: Network Topologies http://www.webopedia.com/quick_ref/topologies.asp [Accessed 4 February
2010]
10
Picture from the Internet http://3.bp.blogspot.com/_hUhsuAxPSU/Rm0lCiElztI/AAAAAAAAAAs/LSo9S1Jiqos/ [Accessed 5 February 2010]
11
Ethernet – The Wireshark Wiki http://wiki.wireshark.org/Ethernet [Accessed 5 February 2010]
12
Cyclic Redundancy Check http://en.wikipedia.org/wiki/Cyclic_redundancy_check [Accessed 5 February 2010]
13
OSI Layer 2 Protocols http://netcert.tripod.com/ccna/internetworking/layer2.html [Accessed 5 February 2010]
14
IEEE 802.3 Ethernet Working Group http://www.ieee802.org/3/ [Accessed 6 February 2010]
na
2
Technical Diary – Semester 1
Page 27 of 39
Manuel Munoz Soria – 21076464
15
na
za
ud
y.
co
m
Internet Engineering Task Force http://en.wikipedia.org/wiki/Internet_Engineering_Task_Force [Accessed 8
February 2010]
16
OSI Model Physical Layer One
http://compnetworking.about.com/od/basicnetworkingconcepts/l/blbasics_osi1.htm [Accessed 8 February 2010]
17
Bandwidth Explained http://www.christianwebmaker.com/articles/bandwidth.html [Accessed 8 February 2010]
18
Bandwidth, Throughput and Goodput
http://www.callcentermagazine.com/shared/forum/showTopics.jhtml?sid=8&fid=701042 [Accessed 8 February
2010]
19
Goodput Facts http://www.absoluteastronomy.com/topics/Goodput [Accessed 8 February 2010]
20
AP Dubey. Networking Tutorial for beginner and advanced user. http://techraga.com/category/basics-ofnetworking/ [Accessed 10 February 2010]
21
CCNA: Network Media Types http://www.ciscopress.com/articles/article.asp?p=31276 [Accessed 10 February
2010]
22
Network Cable Types and specifications
http://www.techotopia.com/index.php/Network_Cable_Types_and_Specifications [Accessed 10 February 2010]
23
Jobstown Networking. UTP, STP and Coaxial images source http://networking.jobstown.net/cable.html
24
ISO/IEC 8877 http://www.iso.org/iso/catalogue_detail.htm?csnumber=21311 [Accessed 10 February 2010]
25
RJ45 Standard Terminations picture source.
http://eduaraul.spaces.live.com/blog/cns!2C5731F99B07D172!801.entry [Accessed 10 February 2010]
26
HowStuffWorks – How WiFi Works http://www.howstuffworks.com/wireless-network.htm [Accessed 12
February 2010]
27
Wireless Security Explained http://www.moneysupermarket.com/c/broadband/wireless-security/ [Accessed 12
February 2010]
28
802.11 Wireless http://en.wikipedia.org/wiki/IEEE_802.11 [Accessed 12 February 2010]
29
Wireless Standards http://compnetworking.about.com/cs/wireless80211/a/aa80211standard.htm [Accessed 12
February 2010]
30
IEEE 802.15 Wikipedia http://en.wikipedia.org/wiki/IEEE_802.15 [Accessed 12 February 2010]
31
Optical Fiber Wikipedia http://en.wikipedia.org/wiki/Optical_fiber [Accessed 14 February 2010]
32
Photodiode Definition http://www.answers.com/topic/photodiode [Accessed 14 February 2010]
33
Fiber Optic Cable Single-Mode Mult-Mode Tutorial http://www.arcelect.com/fibercable.htm [Accessed 14
February 2010]
34
Fiber Optics Basis http://www.althosbooks.com/fiopba.html [Accessed 14 February 2010]
35
Optical time-domain Reflectometer http://en.wikipedia.org/wiki/Optical_time-domain_reflectometer [Accessed
14 February 2010]
36
Data Encoding Techniques http://www.rhyshaden.com/encoding.htm [Accessed 14 February 2010]
37
Error detection and correction http://en.wikipedia.org/wiki/Error_detection_and_correction [Accessed 14
February 2010]
38
Non-return-to-zero – Wikipedia http://en.wikipedia.org/wiki/Non-return-to-zero [Accessed 14 February 2010]
39
Manchester Encoding http://www.erg.abdn.ac.uk/users/gorry/course/phy-pages/man.html [Accessed 14
February 2010]
40
What is IEEE 802 standards? http://www.webopedia.com/TERM/I/IEEE_802_standards.html [Accessed 14
February 2010]
41
How a LAN Switch Works > Frame Size http://www.informit.com/articles/article.aspx?p=357103&seqNum=3
[Accessed 18 February 2010]
42
Ethernet MAC Address Assignments http://www.erg.abdn.ac.uk/users/gorry/course/lan-pages/mac-vendorcodes.html [Accessed 18 February 2010]
43
Jam Signal – Wikipedia http://en.wikipedia.org/wiki/Jam_signal [Accessed 18 February 2010]
44
Ethernet Tutorial http://compnetworking.about.com/od/ethernet/l/aa102900b.htm [Accessed 18 February 2010]
45
What is the Difference between a hub and a switch? http://www.duxcw.com/faq/network/hubsw.htm [Accessed
18 February 2010]
46
ARP Process http://technet.microsoft.com/en-us/library/cc940010.aspx [Accessed 18 February 2010]
47
How ARP Works http://www.tildefrugal.net/tech/arp.php [Accessed 18 February 2010]
3. Straightforward and Difficulties
At this point of the course I can say with confidence that I am sure I will pass
this semester. After the big obstacle that was chapter 6, I am finding the other
chapters not very difficult to understand, though I want to make clear they are not
easy either. It is true that the more we dig into the course, the more the materials that
we are learning relates to each other and the more everything is starting to make sense
as a whole. That helps the growth in my confidence, which in returns brings me even
more confidence, thus making me easy to take full control over this course. The
routine that the teacher has setup for us (power point presentation, questions, exams
Technical Diary – Semester 1
Page 28 of 39
Manuel Munoz Soria – 21076464
m
and then practical) is really good and definitely works to help you understand the
relevant chapter with a minimum attention.
It seems to be that the contents of this Cisco course are being design to really
scrutinise every singles aspect of a network. It studies in detail the functions of every
field we go through with an engineering mind, making difficult the learning process
because I get lost in the details very often. The terminology associated with the
aspects of the course is very complex as well, and because everything is new it takes
time to assimilate and try to memorise everything. I realised more and more that this
is a technical course, and therefore the curriculum is always going to be technical, full
of acronyms, calculations, numbers and mathematics. There is no Plug-And-Play
button on the Cisco course.
ud
y.
co
4. Strategies
I have continued firm on my decision for working all Saturday mornings,
either at home or at the University, and the results are evident to my point of my in
relation with the Cisco course. Though not all the time I turn up for the Wednesday
lessons having read all the material, I always attend with confidence and whishing to
learn because in a way I have done my bit on Saturday, developing this Diary and
reading.
Practical on Cisco are the area where I am feeling weak. We do practical every
Wednesday, but this is the only time a week that I dedicate to this important area of
the course. I do have Packet Tracker at home, the Cisco program to create practical
exercises, but do not really know how to use it and have done very little of the
practical exercises that the online course recommend us to do every week. I still have
to develop a strategy to be able to do the practical exercises of this course with certain
level of confidence.
na
za
5. Reflections
After the black hole of Chapter 6 and the bad beginning that I had on doing the
exam for Chapter 7 (I scored for the first time on this course less than the passing
mark of 70%), things are beginning to take shape again and I am trying to cope with
this course a bit better. The material to learn is now denser and complex than ever, the
researches that I have to do to create this Diary involves lots of reading and analysing.
There is virtually not enough time to process all the information that we are learning,
especially when you work full time. Time is always the decisive factor: the more you
put into it, the better the course evolves.
There is not doubt that whoever design the course material presentation need
to have a second thought about it. Chapter 8, the types of media used on a network,
should have been given to us at the beginning of the course, so that we can start
building from that. The pieces of each chapter are related to each other, I can see that
now, but definitely they are not in the order I would have chosen at the time of
showing these somehow complex concepts to a student.
And the Packet Tracer is becoming an issue now. Still, well into the course
process, Packet Tracer has not been installed on the labs where our course takes place.
The practical are very good and instructive, but they will be brilliant if we dedicate a
few minutes to replicate the problems using Packet Tracer, so that we can start
learning how to use the software and use it at home for testing.
Technical Diary – Semester 1
Page 29 of 39
Manuel Munoz Soria – 21076464
Part 4 [Chapters 10 and 11]
ud
y.
co
m
1. Technical Content
Chapter 10 was focus on planning and cabling networks and we study in this
chapter the different devices that make up a network.
The primary Internetwork device is the router1, which is used to connect networks
to one another, delimiting the broadcast domains. Then the switch is use to connect
the network internally, segmenting the network into collision domains.
Factors that need to be analysed at the time of buying a switch and its speed, the
number of ports and the management capabilities like security and advanced features.
Other considerations are redundancy, if we want to provide it, the expansion modules
or fiber ports needed. Using a simple ‘cost per port’ calculation is a way to approach
the investment, and it is recommended to buy small switches connected to a main one
rather than a massive one single switch where everything is connected.
Factors to be considered when buying a router and similar to those of the
switches, however we have to think carefully about the expandability, the modular
devices that we want to connect and the number of networks the router will support,
and the operating system features, which determine what sort of extra services the
router will provide2, like VPN security, Quality of Service, Voice over IP, Dynamic
Host Control Protocol, etc. Routers are generally more expensive than switches, and
its purchase have to be consider carefully.
na
za
-Interconnecting Devices. The main factor to consider when joining interconnecting
devices is the type of media to use. We should avoid attenuation3, the reduction of the
signal strength as it moves down the media: the longer the media the more attenuation
the signal will have. Cabling distance is therefore a critical factor, and other things to
considerer when choosing a type of media is the cost of the media itself (fiber is more
expensive than UTP), the bandwidth that the media will provide, the easy of
installation and the susceptibility to the media of Electromagnetic Interferences
(EMI).
When planning the installation of a network4, there are four physical areas to
consider:
Technical Diary – Semester 1
Page 30 of 39
Manuel Munoz Soria – 21076464
m
-The Work Area. The UTP cable in this area, called patch cable, should not extend 10
meters, and normally it connects the wall jack to the computer using a straightthrough cable.
-Horizontal Cabling. The maximum length on the cable in this area should not extend
90 meters, and this distance is referred as the permanent link because it is installed
with the building structure and normally is not changed or upgraded.
-Telecommunications Room; this is where the routers, switches and servers will
reside. For UTP the recommended length of the cable to connected devices on the
telecommunications room is up to 5 meters.
-Backbone Cabling; is the link that connects the telecommunication room to other
telecommunications rooms, where more servers could be located, or to a WAN
connection or ISP.
na
za
ud
y.
co
-RJ-45 Connection; in an Ethernet LAN, devices use one of two types of UTP
interfaces, MDI or MDIX5. In MDI (Media-Dependent Interface), pins 1 and 2 are use
for transmitting, while pins 3 and 6 are used for receiving.
For MDIX (Media-Dependent Interface Crossover), the transmitting pairs are
swapped internally, thus allowing similar devices to connect to each other.
Straight-Through cables have the connector on each end terminated exactly the same;
they both can be either standard T568A or T568B6. This cable is use to connect
different devices to each other, like switch to a router, computer to switch or computer
to hub.
Crossover cables have got one terminated with the T568A standard and the other with
the T568B standard. They are use to connect similar devices like from switch to
switch/hub or hub to hub/switch, as well as router to router Ethernet port connections,
computer to computer and computer to router Ethernet.
Technical Diary – Semester 1
Page 31 of 39
Manuel Munoz Soria – 21076464
co
m
Many devices have a mechanism that electrically swap the transmitting and receiving
pairs, their ports functions as MDI or MDIX and are not affected by the type of cable.
-WAN Connection; The typical cable7 use to connect Cisco router to a wan connection
is a serial cable with one end using a Winchester 15 pin connector (that can be male
or female) and the other end using a smart serial DB-60 connector.
ud
y.
The communication via a WAN connection needs one of the ends to provide a
clock8 in order to maintain synchronisation of the data transferred. The clock rate
needs to be acceptable for both the sending and receiving device, and normally the
synchronisation clock is provided by the ISP end. Care has to be taken at the time of
connecting the serial cable to the router, to determine which end will provide the
clock. DCE (Data Communications Equipment) is the device that supplies9 the clock.
DTE (Data circuit-Terminal Equipment) is the device that receives the clocking.
The V.35 compliant router cables are available in DTE and DCE versions.
Devices network interfaces normally do not have keyboard, mouse or
monitors. To connect to them we use programs called Terminal Emulator, connecting
to the network device often via a serial or console cable.
na
za
There are many reasons to divide a network into subnets, to manage broadcast
traffic, for security or for different network requirement on each subnet. We need to
be aware of all the possible devices that will require an IP address, like switches and
wireless access points.
To allocate IP addresses to a network there are two main methods, we can use
the Variable Length Subnet Masking (VLSM) when we divide the networks
depending on the numbers of host that each one of them will contain, or we can use a
non-VLSM approach, where all the subnets use the same prefix length and number of
host bits.
Chapter 11 involved configuring and testing the network; we leant during
this chapter about the Cisco Internetwork Operating System10 (IOS) that is use in the
Cisco devices to provide the following network services:
-Basic routing and switching functions
-Reliable and secure access to networked resources
-Network scalability
The services provided by the IOS are generally accessed using a Command Line
Interface11 (CLI). Using flash memory allows the IOS to be upgraded to newer
versions or to have their features improved. In many Cisco routers, the IOS is copied
into RAM when the device is power on, and then it runs from the RAM; this is done
by design to increase the performance of the device. There are several ways to access
the CLI environment, the most common methods are:
Technical Diary – Semester 1
Page 32 of 39
Manuel Munoz Soria – 21076464
ud
y.
co
m
-Console; it use a low speed serial cable connected directly to a compute, and
the console port is the management port that provides out-of-band access to a router.
The connection to the console port is know as the CTY, and is accessible even if no
networking services have been configured on the device. Normally, when a router is
first place into service, the console port is use to configure the device. Though to
access the console port, an intruder has to be physically connected to the router and by
pass the security of the building or whichever location the router is installed, it is
recommended to setup a password to access the console port.
-Telnet and SSH; Telnet12 is use to access remotely a router and open a CLI
session. Connections using telnet are known as VTY, and they require one active
interface to access the device through the network. Secure Shell Protocol (SSH) is a
more secure method of accessing the device remotely, it provides stronger password
authentication than telnet and it uses encryption when transferring the data. For
security reasons, the IOS requires that all telnet connections to the router use a
password. Newer IOS contains the facility to connect to the router using SSH, though
this service may have to be enable.
-AUX; Another way to establish a CLI session remotely is via a telephone line
connected to the AUX port of the router. Like the console port, the AUX port does not
need any configuration or active network connection in the router. In addition, the
AUX port can also be used locally like a console port.
za
Configuration files contain the IOS software commands that are use to
customise and configure the Cisco device. Commands are parsed (translated and
executed) by the IOS when the system is booted from the startup-config file, or when
commands are entered in the CLI by the administrator. A Cisco network device
normally contains two configuration files:
-Start-up Configuration file (startup-config) is stored in the non-volatile RAM
(NVRAM) and is loaded into memory when the device is started. Because the
NVRAM will keep the configuration file even if the power if off, the startup-config
file is use as well as a backup of the configuration device.
-Running Configuration file (running-config); once in memory, the startupconfig becomes the running-config and is use to operate the network device. Changes
to the running configuration will take effect immediately; however we have to save
the changes from the running-config to the startup-config, so that the changes are
saved into the NVRAM and are loaded next time the router reboots.
na
The Cisco IOS is design as a modal operating system13, with different modes
of operations that grant different access at the time of configuring the device. The
most common operation modes for the IOS are:
-User Executive Mode [Router>] has limited capabilities but is useful for some
basic operations. By default there is no authentication required to access the User
Exec Mode, but it is a good practice to ensure that a password is configured.
-Privilege Executive Mode [Router#] only administrators should access this
mode, because the Privilege Exec Mode allows the execution of configuration and
management commands. By default, this mode does not prompt for authentication,
and it is crucial that a password is configured to access this Privilege Exec Mode.
When using CLI, you should type ‘enable’ or ‘disable’ to switch from User Exec
Mode to Privilege Exec Mode.
-Global Configuration Mode [Router(config #] can only be reached from the
Privilege Exec Mode, and is use for specific configuration of the device. Changes
Technical Diary – Semester 1
Page 33 of 39
Manuel Munoz Soria – 21076464
ud
y.
co
m
made to the device during this mode will affect the operation of the unit as a whole, or
just the particular interface we are configuring. To enter Global Configuration Mode
type ‘configure terminal’ in the Privilege Exec Mode.
When using the CLI (Command Line Interface) we are actually accessing the
IOS. To access the CLI Help just enter a question mark (?) at any prompt. Shortcuts
and hotkeys are available, and you could use Ctrl-R to redisplay a line, Ctrl-Z to exit
the current configuration mode, Crtl-Shif-6 to interrupt a process like the ping
command or traceroute and Ctrl-C to abort the current command and exit the
configuration mode. The following graphics shows some of the different variations
the show command could have:
za
-Cisco IOS Good Practices. Some of the best practices for using Cisco products are
the configuration of a hostname, saving the configuration of the startup-config file,
enable password and display an ownership message of the day.
It is recommended to assign a hostname for each networking device,
especially if you are accessing them through Telnet or SSH, in order to avoid
confusion and to follow a naming convention within the organisation. To change the
name of a device, do the following commands:
na
Router#configure terminal
Router#hostname London1
London1#
To remove the name of a device, simply type no hostname in the Global Configuration
Mode.
We need to save the changes made to the device, while working on the Global
Configuration Mode, to the startup configuration file stored in NVRAM. To do the
saving type this commands:
Router#copy running-config startup-config
This will prevent the lost of the modifications made due to power failure or restart. To
remove the configuration and set the device with the manufacture settings, type:
Router#erase startup-config
Router#reload
Technical Diary – Semester 1
Page 34 of 39
Manuel Munoz Soria – 21076464
It is recommended to use authentication passwords for each of the Exec
Modes levels, as well as password to protect specific ports in the device. Whenever
the device supported, we should use the enable secret command, to ensure the
password is encrypted. To configure a password for a console port, type these
commands:
Router(config)#line password 0
Router(config)#password cisco
Router(config)#login
m
In the above example, the password chosen was ‘cisco’. To setup a password for the
five VTY lines, numbered 0 to 4, do the following:
co
Router(config)#line vty 0 4
Router(config)#password cisco
Router (config)#login
Router(config)#enable secret class
Another useful command is password-encryption, to prevent the password showing up
as plain text when viewing configuration files.
It is vital to ensure that we clearly display to anybody attempting to logon to
the system, that only authorized access is allowed. Banners are used for this purpose,
especially the Message of the Day banner, and we should avoid using words like
‘invited’ or ‘welcome’. To configure a MOTD, do the following in Global
Configuration Mode:
ud
y.
Router(config)#banner motd %type your message here%
The delimiter character, in the above example is %, could be anything as long as it
does not appear in the message itself.
-Configuring Interfaces14. By default interface are disabled in routers and enable in
switches. To enable an interface enter the no shutdown command or the shutdown only
if you want to disabled that particular interface. For example, these are the commands
to configure an IP address on an interface of a router:
Router(config)#interface FastEthernet 0/0
Router(config-if)#ip address ip_address netmask
Router(config-if)#no shutdown
za
Router serial interfaces must also have an IP, as well as a clock signal to control the
timing of the communications. Normally the end connected to the ISP will provide the
clock. The following example describes how to configure an IP for a serial interface
and assign a specific clock rate. Note that first of all you have to be on Global
Configuration Mode and then enter the Interface Mode.
na
Router(config)#interface Serial 0/0/0
Router(config-if)#ip address ip_address netmask
Router(config-if)#clock rate 56000
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Switches, unless using VLANs for managements purposes, generally do not need to
be assign an IP Address
-Testing the Protocol Stack. The first command we should use at the time of testing
connectivity is the show ip interface brief to ensure the correct IP and Gateway have
been configured. Then we can verify connectivity with commands like ping or
traceroute (this command is called tracert if use within Windows OS command
prompt). The test procedure for the ping command is to ping first of all the local
Technical Diary – Semester 1
Page 35 of 39
Manuel Munoz Soria – 21076464
m
loopback (127.0.0.1), then the local IP Address, then the local Gateway, after that try
to ping a remote host and finally perform a traceroute to that remote host.
If we want to identify physical MAC addresses on the network, we should use
the arp command in the Windows command prompt, particularly the arp –a
combination will show us the arp table for the machine.
Network Baseline15 is the process of studying the network at regular intervals
to ensure that it is working as designed. Creating an effective network performance
baseline is crucial at the time of trying to solve problems, and it is really important to
keep the documentation concerning the network up to date all the time, reflecting on it
whatever changes have been made.
2. References
1
za
ud
y.
co
Router Definition http://www.pcmag.com/encyclopedia_term/0,2542,t%253Drouter%2526i%253D50637,00.asp
[Accessed 21 February 2010]
2
What Advanced Features A Router Can Provide? http://ezinearticles.com/?What-Advanced-Features-Can-aRouter-Provide?&id=2780461 [Accessed 21 February 2010]
3
Attenuation - Wikipedia http://en.wikipedia.org/wiki/Attenuation [Accessed 21 February 2010]
4
Planning a network installation: ICT Hub Knowledgebase
http://www.ictknowledgebase.org.uk/planningnetworkinstallation [Accessed 21 February 2010]
5
Medium Dependent Interface http://en.wikipedia.org/wiki/Medium_dependent_interface [Accessed 21 February
2010]
6
The difference between the TIA/EIA T568A and T568B wiring standards
http://www.duxcw.com/faq/network/diff568ab.htm [Accessed 21 February 2010]
7
Used Cisco Systems Serial Cables http://www.alliancedatacom.com/manufacturers/ciscosystems/connector_cables/serial.asp [Accessed 21 February 2010]
8
Properly set a Cisco router’s clock and time zone http://articles.techrepublic.com.com/5100-10878_116129454.html [Accessed 22 February 2010]
9
DTE and DCE definition http://pinouts.ru/definition/dte-dce.shtml [Accessed 22 February 2010]
10
Cisco Internetwork Operating System (Cisco IOS)
http://www.cisco.com/en/US/products/sw/iosswrel/ps1818/products_tech_note09186a008015083e.shtml
[Accessed 22 February 2010]
11
Introduction to Cisco IOS Software http://www.ciscopress.com/articles/article.asp?p=101658&seqNum=2
[Accessed 23 February 2010]
12
How Telnet Works http://technet.microsoft.com/en-us/library/cc778139(WS.10).aspx [Accessed 23 February
2010]
13
Understand the levels of privilege in the Cisco IOS http://articles.techrepublic.com.com/5100-10878_115659259.html [Accessed 23 February 2010]
14
Cisco IOS Tutorial http://www.cisco.com/warp/cpropub/45/tutorial.htm [Accessed 23 February 2010]
15
Creating a Network Baseline Cisco Tutorial
http://www.thebryantadvantage.com/CreatingANetworkBaseline.htm [Accessed 23 February 2010]
na
3. Straightforward and Difficulties
After the Christmas period, it was with relief to notice that the complexity of
the material we had to learn for this last part of the course was not as hard to digest as
previous chapters. The concepts of Chapter 10, for example, were fairly easy and we
had study some of the serial cables previously on the practical sessions that we did
last year and which are now backing up our knowledge.
However, the Christmas break factor has made this last part of the course
rather difficult due to lost of concentration and a disruption of the learning routine that
the teacher setup for us since October. It has been tricky to achieve the same level of
attention and dedication on the materials for these chapters that I had previously on
other chapters of the course, and I feel that my motivation had decreased. I noticed
that there were not many terms, acronyms or lengthy processes to learn during this
part of the curriculum, however, the practical sessions are now very challenging and
growing in difficulty by the exercise. When we have to connect routers with switches
and issue commands, I had to refer to my notes all the times, and though I enjoy
Technical Diary – Semester 1
Page 36 of 39
Manuel Munoz Soria – 21076464
seeing how at the end of the practical a solution is achieved and the connections are
actually working, I find frustrating the fact that I am still unable to memorise the
majority of the command that we use to configure the Cisco routers and switches.
co
m
4. Strategies
The final exam date is approaching fast, as well as the date to hand out this
Technical Diary. I achieved the lowest mark of this course while doing the exam for
Chapter 11, the one regarding the Command Line Interface for Cisco. I was worry for
this, thinking that perhaps I was not fully prepared for the final exam. This low result
helps me to discover my weakest point (the commands), and it became evident to me
that I had to strength this area of my knowledge, as the final exam surely will be
populated with questions about commands. I started using Packet Tracer at home,
watching videos in You Tube to try to master the program and replicate on it the
problems that we were presented with during the practicals, on Wednesday evening.
It is a shame that Packet Tracer still has not been installed on the labs that we
use for the course, and my main goal during this part of the course was to learn how
to use the program. Lucky for us, Cisco is very popular and there is plenty of help
around the web for this application.
na
za
ud
y.
5. Reflections
We lost the first two Wednesdays of the course due to the snow disruptions,
which made even worse the final come back to the course, right in the middle of
January. It has been very hard to get accustom again and ‘sacrifice’ all Wednesday
evening for the sake of obtaining a Cisco certification and a degree. There is only a
handful of student now, which makes easy the learning in a way (more teaches’ time
dedicated per student) but also put you in the spot quickly if you have not prepare the
lesson as the teacher expects. A couple of times I asked myself during this period
where everybody has gone, why only a few people are doing the Cisco course? And
again my answers were that this is the best course for me to maintain my position in
the IT industry, by gaining intimate knowledge of how a network really works. If not
many people are tempted to do the Cisco course is because of its difficulty. I believe
that the HP variation of this Foundation Degree seems to be easier, and some people
may take it as a shorter route to learn IT.
I am happy to have chosen Cisco, and one of my New Year Resolution for
2010 is to finish successfully this course. There is still a long way to go.
Technical Diary – Semester 1
Page 37 of 39
Manuel Munoz Soria – 21076464
Conclusion
ud
y.
co
m
The process of creating this Technical Diary has been more intense and time
consuming that the Reflective Diary for the Problem Solving Module, which I has
been writing more or less at the same time than this Diary. The fact that this is a
Technical Diary involves lots of researching on the subject for every chapter, reading
complex paragraphs and populating references, some of them really interesting and
others quite boring. All this extreme research has the immediate effect of gaining
knowledge during the process. Without any doubt, this idea of creating a Technical
Diary about the contents that we are learning is for me the best way of learning. It
allows me (force me) to go back to the subject again and again, until the concepts are
really inside my head and given the tick of ‘learnt in detail’.
My score for the Final Exam of this course was 84.6%, and I am very happy to
have passed. I feel I have learnt a lot doing this course, especially by doing the
Technical Diary, which has setup the roots of knowledge into my head. The practical
sessions have contributed as well to my learning, but not in the theory aspects.
The graphic below shows the exams results data of all the tests that I did for
each of the chapters (note that we did not do any test for Chapter 1). It represents in a
graphical mode the learning process that I have experienced while doing this Semester
1 Cisco course. Note that at first I was ok with the material (I really started with high
motivation), then Chapter 6 appeared and I sunk, failing below the passing mark of
70% while doing the exam of Chapter7, because I hardly study anything for this
particular Chapter. I recovered a little bit by the end of the year, showing a more
steady and realistic figures of learning in the exam results, though my performance
overall was not as good as in the beginning. I failed again below the 70% mark during
Chapter 11, just as we came back from the Christmas holidays.
Cisco Exams Semester 1
100.0%
za
90.0%
80.0%
70.0%
60.0%
50.0%
na
40.0%
30.0%
20.0%
10.0%
0.0%
Results
2
3
4
5
6
7
8
9
10
11
80.4%
83.7%
95.1%
97.8%
72.3%
61.1%
82.9%
74.4%
78.4%
57.5%
The table that now follows represents the data from which I have created the
graphic. The source of this data is the ‘Gradebook’ information that monitors the
progress of each student on the NetAcad Cisco website. Notice that, after Chapter 6,
Technical Diary – Semester 1
Page 38 of 39
Manuel Munoz Soria – 21076464
the average score for each part of the course is going down and on the last part (Part
4) my average performance is less than the passing mark of 70%.
Part 3
Average
82.1%
88.4%
72.8%
68.0%
na
za
ud
y.
Part 4
Date Taken
14 October 2009
21 October 2009
04 November 2009
11 November 2009
25 November 2009
02 December 2009
09 December 2009
03 February 2010
03 February 2010
29 January 2010
m
Part 2
Result
80.4%
83.7%
95.1%
97.8%
72.3%
61.1%
82.9%
74.4%
78.4%
57.5%
co
Part 1
Chapter
2
3
4
5
6
7
8
9
10
11
Technical Diary – Semester 1
Page 39 of 39
Manuel Munoz Soria – 21076464
Download