Wednesday, January 11, 2012

Peer-to-Peer Communication


Peer-to-Peer Communication
During the process of peer-to-peer communication, the protocols at each layer exchange packets of information called protocol data units (PDUs) between peer layers.

The PDU should go through OSI layers start from Application to Physical layer. When PDU  goes to Transport layer , transport layer adds its own header depending of protocol is in use ,and  PDU is called SEGMENT .So segment is PDU that transport layer adds its header to it . Then transport layer send the packet to network layer , the netwotk adds its own header , now the PDU is called  packet . Then network layer sends packet to data link layer , data link layer adds its own header and PDU at the data link layer is called FRAME . 


So the hierarchical level is like this:

DATA= Application+Presentation+Session layers

Segment= Transport layer

Packet= Network Layer

Frame= Data link layer

Bytes= Physical layer

Encapsulation and De-Encapsulation


if we review our video in OSI model again , we can get the concept of  encapsulation and de-encapsulation 

after review this video you can see that goods are encapsulated in containers and then put into truck . in the other side , reverse process occurs .

the same thing happen If one computer wants to send data to another computer, the data must first be packaged by a process called encapsulation. Encapsulation wraps data with the necessary protocol information before network transit. As the data moves down through the layers of the OSI model, each OSI layer adds a header (and a trailer, if applicable) to the data before passing it down to a lower layer.

The following steps occur to encapsulate data:

Step 1 The user data is sent from an application to the application layer.

Step 2 The application layer adds the application layer header (Layer 7 header) to the user data. The Layer 7 header and the original user data become the data that is passed down to the presentation layer.

Step 3 The presentation layer adds the presentation layer header (Layer 6 header) to the data. This then becomes the data that is passed down to the session layer.

Step 4 The session layer adds the session layer header (Layer 5 header) to the data. This then becomes the data that is passed down to the transport layer.

Step 5 The transport layer adds the transport layer header (Layer 4 header) to the data. This then becomes the data that is passed down to the network layer.

Step 6 The network layer adds the network layer header (Layer 3 header) to the data. This then becomes the data that is passed down to the data link layer.

Step 7 The data link layer adds the data link layer header and trailer (Layer 2 header and trailer) to the data. A Layer 2 trailer is usually the frame check sequence (FCS), which is used by the receiver to detect whether the data is in error. This then becomes the data that is passed down to the physical layer.

Step 8 The physical layer then transmits the bits onto the network media.


De-Encapsulation

When the remote device receives a sequence of bits, the physical layer at the remote device passes the bits to the data link layer for manipulation. The data link layer performs the following steps:

Step 1 The data link layer checks the data-link trailer (the FCS) to see if the data is in error.

Step 2 If the data is in error, it may be discarded, and the data link layer may ask for the data to be retransmitted.

Step 3 If the data is not in error, the data link layer reads and interprets the control information in the data-link header.

Step 4 The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer .


This process is referred to as de-encapsulation. Each subsequent layer performs a similar deencapsulation process.

Sunday, December 18, 2011

The OSI Reference Model


one of the first topic that faces any one beginning network career is osi model , i will try to make it very simple , so i made a video to approach osi model concepts and layers.



after seeing the video lets go more deep in osi model 

The Open Systems Interconnection (OSI) reference model provides a means of describing how data is transmitted over a network. The model addresses hardware, software, and data transmission. This topic describes the purpose of the OSI model

The OSI reference model provides a number of benefits in understanding how networks function, by doing the following:
- Reducing complexity: The OSI model breaks network communications into smaller, simpler parts.
- Standardizing interfaces: The OSI model standardizes network components to allow multiple-vendor development and support.
- Facilitating modular engineering: The OSI model allows different types of network hardware and software to communicate with one another.
- Ensuring interoperable technology: The OSI model prevents changes in one layer from affecting the other layers, allowing for quicker development.
- Accelerating evolution: The OSI model provides for effective updates and improvements to individual components without affecting other components or having to rewrite the entire protocol.
- Simplifying teaching and learning: The OSI model breaks network communications into smaller components to make learning easier

The OSI Model Layers and Their Functions
The OSI isn’t a physical model. it's a set of guidelines that application developers can use to create and implement applications that run on a network.
The OSI has seven different layers, divided into two groups. The top three layers define how the applications within the end stations will communicate with each other and with users. The bottom four layers define how Data is transmitted end to end.

The OSI reference model has seven layers:
-        Application layer (layer 7)
-        Presentation layer (layer 6)
-        Session layer (layer 5)
-        Transport layer (layer 4)
-        Network layer (layer 3)
-        Data Link layer (layer 2)
-        Physical layer (layer 1)

The Application Layer
The application layer is the OSI layer that is closest to the user, acting as an interface between the actual application program—which isn’t  part of the layered structure—and the next layer down.
This layer provides network services to the applications of the user, such as e-mail, file transfer, and terminal emulation.
The Application layer is also responsible for identifying and establishing the availability of the communication partner and determining whether sufficient resources for the intended communication exist.



The Presentation Layer
The Presentation is responsible for data translation and code formatting. Tasks like data compression, decompression, encryption, and decryption are associated with this layer.

The Session Layer
The Session layer is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities (keeps different applications’ data separate from other applications’ data.).
For example, web servers have many users, so there are many communication processes open at a given time. It is important, then, to keep track of which user communicates on which path.

The Transport Layer
The transport layer segments data from the system of the sending host and reassembles the data into a data stream on the system of the receiving host.

The transport layer establishes, maintains, and properly terminates virtual circuits. Transport error detection and recovery and information flow control ensure reliable service.

The Network Layer
The network layer provides connectivity and path selection between two host systems that may be located on geographically separated networks.


The Data Link Layer
The data link layer defines how data is formatted for transmission and how access to the physical media is controlled. This layer also typically includes error detection and correction to ensure reliable delivery of the data.


The Physical Layer
the Physical layer does two things: It sends bits and receives bits.
This layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems.
Characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications.

Monday, December 12, 2011

Network Components and Topolgies


What Is a Network?
A network is a connected collection of devices and end systems, such as computers and servers, which can communicate with each other. Networks carry data in many types of environments, including homes, small businesses, and large enterprises.

Common Physical Components of a Network
These are the four major categories of physical components in a computer network:
Personal computers (PCs): The computers serve as end points in the network, sending and receiving data.
Interconnections:  a means for data to travel from one point to another. Interconnections include:
— Network interface cards (NICs) that translate the data produced by the computer into network
— Network media, such as cables or wireless media.
— Connectors that provide the connection points for the media
Switches: Switches are devices that provide network attachment to the end systems and switching of the data within the local network.
Routers: Routers interconnect networks and choose the best paths between networks


Physical Topologies
The physical topology of a network refers to the physical layout of the devices and cabling. Here are the three primary categories of physical topologies:

Bus: computers and other network devices were cabled together in a line using coaxial cable.


Ring: Computers and other network devices are cabled together, with the last device connected to the first to form a circle, or ring. The physical connection can be made using either coaxial or fiber.


Star: A central cabling device connects the computers and other network devices. This category includes both star and extended-star topologies. The physical connection is commonly made using twisted-pair wiring.


Extended Star

full-mesh: topology connects all devices (or nodes) to one another for redundancy and fault tolerance. Implementing a full-mesh topology is expensive and difficult. This method is the most resistant to failures, because any single link failing will not affect reach ability.


partial-mesh: topology, at least one device maintains multiple connections to all other devices, without being fully meshed. 



Sunday, December 4, 2011

Introduction to CCNA

what is CCNA ?

ccna: is abbreviation of "cisco certified Network Associate"

what cisco needs you to know to be ccna certified :

- install, configure, operate, and troubleshoot medium-size route and switched networks
- implementation and verification of connections to remote sites in a WAN.
- basic mitigation of security threats
- introduction to wireless networking concepts and terminology.
- how to use some protocols and features as : IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),Open shortest path first (OSPF) , VLANs, Ethernet, access control lists (ACLs).

CCNA Prerequisites

No prerequisites 

CCNA Exam paths :

The CCNA certification can be earned through two exam paths, the single exam, #640-802, or dual exams, #640-822 ICND1 (Interconnecting Cisco Networking Devices Part 1) and #640-811 ICND2 (Interconnecting Cisco Network Devices Part 2)

Exam Contents
 

The exams consist of multiple-choice, fill-in-the-blank and simulation questions covering subjects which include subnets, access lists, switching and routing protocols.
 

The single exam, 640-802 is 90 minutes and contains 40 to 55 questions. The 640-822 ICND 1 exam is 90 minutes with 40 to 50 questions and concentrates on small networks, while the 640-816 ICND2 exam is 75 minutes covering small to medium enterprise networks. The two ICND exams cover the same information as that contained in the single exam

Exam Topics

The following topics are general guidelines for the content likely to be included on the Cisco Certified Network Associate exam.

Describe how a network works

  • Describe the purpose and functions of various network devices
  • Select the components required to meet a network specification
  • Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
  • Describe common networked applications including web applications
  • Describe the purpose and basic operation of the protocols in the OSI and TCP models
  • Describe the impact of applications such as Voice Over IP on a network
  • Interpret network diagrams
  • Determine the path between two hosts across a network
  • Describe the components required for network and Internet communications
  • Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach
  • Differentiate between LAN/WAN operation and features

Configure, verify and troubleshoot a switch with VLANs and interswitch communications


  • Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
  • Explain the technology and media access control method for Ethernet networks
  • Explain network segmentation and basic traffic management concepts
  • Explain basic switching concepts and the operation of Cisco switches
  • Perform and verify initial switch configuration tasks including remote access management
  • Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), and SHOW & DEBUG commands
  • Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures
  • Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
  • Describe how VLANs create logically separate networks and the need for routing between them
  • Configure, verify, and troubleshoot VLANs
  • Configure, verify, and troubleshoot trunking on Cisco switches
  • Configure, verify, and troubleshoot interVLAN routing
  • Configure, verify, and troubleshoot VTP
  • Configure, verify, and troubleshoot RSTP operation
  • Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.
  • Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)

Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network


  • Describe the operation and benefits of using private and public IP addressing
  • Explain the operation and benefits of using DHCP and DNS
  • Configure, verify and troubleshoot DHCP and DNS operation on a router (using both the CLI and SDM)
  • Implement static and dynamic addressing services for hosts in a LAN environment
  • Calculate and apply an addressing scheme including VLSM IP addressing to a network
  • Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
  • Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).
  • Describe IPv6 addresses
  • Identify and correct common problems associated with IP addressing and host configurations

Configure, verify, and troubleshoot basic router operation and routing on Cisco devices


  • Describe basic routing concepts (including: packet forwarding, router lookup process)
  • Describe the operation of Cisco routers (including: router bootup process, POST, router components)
  • Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
  • Configure, verify, and troubleshoot RIPv2
  • Access and utilize the router to set basic parameters.(including: CLI/SDM)
  • Connect, configure, and verify operation status of a device interface
  • Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
  • Perform and verify routing configuration tasks for a static or default route given specific routing requirements
  • Manage IOS configuration files. (including: save, edit, upgrade, restore)
  • Manage Cisco IOS
  • Compare and contrast methods of routing and routing protocols
  • Configure, verify, and troubleshoot OSPF
  • Configure, verify, and troubleshoot EIGRP
  • Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
  • Troubleshoot routing issues
  • Verify router hardware and software operation using SHOW & DEBUG commands.
  • Implement basic router security

Explain and select the appropriate administrative tasks required for a WLAN


  • Describe standards associated with wireless media (including: IEEE, WI-FI Alliance, ITU/FCC)
  • Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)
  • Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point
  • Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)
  • Identify common issues with implementing wireless networks. (Including: Interface, misconfiguration)

Identify security threats to a network and describe general methods to mitigate those threats


  • Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats
  • Explain general methods to mitigate common security threats to network devices, hosts, and applications
  • Describe the functions of common security appliances and applications
  • Describe security recommended practices including initial steps to secure network devices

Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network


  • Describe the purpose and types of ACLs
  • Configure and apply ACLs based on network filtering requirements using SDM and CLI
  • Configure and apply an ACL to limit telnet and SSH access to the router using SDM and CLI
  • Verify and monitor ACLs in a network environment
  • Troubleshoot ACL issues
  • Explain the basic operation of NAT
  • Configure NAT for given network requirements using SDM and CLI
  • Troubleshoot NAT issues

Implement and verify WAN links

  • Describe different methods for connecting to a WAN
  • Configure and verify a basic WAN serial connection
  • Configure and verify Frame Relay on Cisco routers
  • Troubleshoot WAN implementation issues
  • Describe VPN technology (including: importance, benefits, role, impact, components)
  • Configure and verify a PPP connection between Cisco routers