Chapter 3 Connecting to the Network
PDF created with pdfFactory trial version www.pdffactory.com
Objectives
Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols. Explain how communication occurs across a local Ethernet network. Describe Access layer devices and communication methods on a local Ethernet network. Describe Distribution layer devices and communication methods across networks. Plan, implement, and verify a local network.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www.pdffactory.com
What is a Network?
Networks provide the ability to connect people and equipment no matter where they are in the world.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www.pdffactory.com
What is a Network?
Converged networks
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www.pdffactory.com
Benefits of Networking
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www.pdffactory.com
Benefits of Networking
Here are other uses of a network and the Internet: Sharing music and video files Research and on-line learning Chatting with friends Planning vacations Purchasing gifts and supplies
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www.pdffactory.com
Basic Network Components Peripherals
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www.pdffactory.com
Basic Network Components Hosts
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www.pdffactory.com
Basic Network Components Network Devices
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
PDF created with pdfFactory trial version www.pdffactory.com
Basic Network Components Network Media
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
10
PDF created with pdfFactory trial version www.pdffactory.com
Computer Roles in a Network
Servers are hosts that have software installed that enable them to provide information, like email or web pages, to other hosts on the network. Clients are computer hosts that have software installed that enable them to request and display the information obtained from the server.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
11
PDF created with pdfFactory trial version www.pdffactory.com
Computer Roles in a Network
A computer with server software can provide services simultaneously to one or many clients.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
12
PDF created with pdfFactory trial version www.pdffactory.com
Peer-to-Peer Networks
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
13
PDF created with pdfFactory trial version www.pdffactory.com
Network Topologies
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
14
PDF created with pdfFactory trial version www.pdffactory.com
Network Topologies
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
15
PDF created with pdfFactory trial version www.pdffactory.com
Source, Channel, and Destination
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
16
PDF created with pdfFactory trial version www.pdffactory.com
Source, Channel, and Destination
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
17
PDF created with pdfFactory trial version www.pdffactory.com
Rules of Communication
Among the protocols for successful human communication are: Identification of sender and receiver Agreed-upon medium or channel (face-to-face, telephone, letter, photograph) Appropriate communication mode (spoken, written, illustrated, interactive or one-way) Common language Grammar and sentence structure Speed and timing of delivery
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
18
PDF created with pdfFactory trial version www.pdffactory.com
Rules of Communication - Protocols
Protocols define the details of how the message is transmitted, and delivered
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
19
PDF created with pdfFactory trial version www.pdffactory.com
Message Encoding
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
20
PDF created with pdfFactory trial version www.pdffactory.com
Message Encoding
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
21
PDF created with pdfFactory trial version www.pdffactory.com
Message Formatting
In many cultures, a personal letter contains the following elements:
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
22
PDF created with pdfFactory trial version www.pdffactory.com
Message Formatting
When a message is sent from source to destination, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
23
PDF created with pdfFactory trial version www.pdffactory.com
Message Size
These sentences are limited in size to what the receiving person can process at one time.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
24
PDF created with pdfFactory trial version www.pdffactory.com
Message Size
When a long message is sent from one host to another over a network, it is necessary to break the message into smaller pieces.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
25
PDF created with pdfFactory trial version www.pdffactory.com
Message Timing
People use timing to determine when to speak, how fast or slow to talk, and how long to wait for a response. These are the rules of engagement. Access Method Flow Control Response Timeout
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
26
PDF created with pdfFactory trial version www.pdffactory.com
Message Patterns
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
27
PDF created with pdfFactory trial version www.pdffactory.com
Message Patterns
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
28
PDF created with pdfFactory trial version www.pdffactory.com
Message Patterns
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
29
PDF created with pdfFactory trial version www.pdffactory.com
Protocol Use in Communication
All communication, both human and computer, is governed by preestablished rules, or protocols. Based on the source, channel and destination, the protocols define the details for the issues of message format, message size, timing, encapsulation, encoding and standard message pattern.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
30
PDF created with pdfFactory trial version www.pdffactory.com
Importance of Protocols
Computers, just like humans, use rules, or protocols, in order to communicate.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
31
PDF created with pdfFactory trial version www.pdffactory.com
Standardization of Protocols
As networks became more widespread, standards were developed that defined rules by which network equipment from different vendors operated. Standards are beneficial to networking in many ways: Facilitate design Simplify product development Promote competition Provide consistent interconnections Facilitate training Provide more vendor choices for customers
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
32
PDF created with pdfFactory trial version www.pdffactory.com
Standardization of Protocols
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
33
PDF created with pdfFactory trial version www.pdffactory.com
Physical Addressing
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
34
PDF created with pdfFactory trial version www.pdffactory.com
Ethernet Communication
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
35
PDF created with pdfFactory trial version www.pdffactory.com
Ethernet Communication
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
36
PDF created with pdfFactory trial version www.pdffactory.com
Ethernet Communication
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
37
PDF created with pdfFactory trial version www.pdffactory.com
Ethernet Communication
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
38
PDF created with pdfFactory trial version www.pdffactory.com
Hierarchical Design of Ethernet Networks
Access Layer - to provide connections to hosts in a local Ethernet network. Distribution Layer - to interconnect the smaller local networks. Core Layer - a high-speed connection between distribution layer devices.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
39
PDF created with pdfFactory trial version www.pdffactory.com
Logical Addressing
The IP address is known as a logical address because it is assigned logically based on where the host is located. IP addresses contain two parts. One part identifies the local network. The second part of the IP address identifies the individual host.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
40
PDF created with pdfFactory trial version www.pdffactory.com
Access Layers
The Access Layer is the most basic level of the network. It is the part of the network in which people gain access to other hosts and to shared files and printers. There are several types of networking devices that can be used to connect hosts at the Access Layer, including Ethernet hubs and switches.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
41
PDF created with pdfFactory trial version www.pdffactory.com
Function of Hubs
Hubs contain multiple ports that are used to connect hosts to the network. Hubs cannot determine which host should get any particular message. A hub simply accepts electronic signals from one port and regenerates (or repeats) the same message out all of the other ports. A hub is referred to as a shared-bandwidth device.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
42
PDF created with pdfFactory trial version www.pdffactory.com
Function of Hubs
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
43
PDF created with pdfFactory trial version www.pdffactory.com
Function of Switches
Like a hub, a switch connects multiple hosts to the network. Unlike a hub, a switch can forward a message to a specific host. A table on the switch, called a MAC address table, contains a list of all of the active ports and the host MAC addresses that are attached to them. Switch allows many conversations to take place at the same time, without collisions occurring.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
44
PDF created with pdfFactory trial version www.pdffactory.com
Function of Switches
How does the MAC address of a new host get into the MAC address table? Refer: 3.4.3.2
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
45
PDF created with pdfFactory trial version www.pdffactory.com
Function of Switches
When a hub is connected to a switch port, the switch associates the MAC addresses of all hosts connected to that hub with the single port on the switch.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
46
PDF created with pdfFactory trial version www.pdffactory.com
Broadcast Messaging
Broadcasts are useful when a host needs to find information without knowing exactly what other host can supply it or when a host wants to provide information to all other hosts in the same network in a timely manner. The broadcast MAC address in hexadecimal notation is FFFF.FFFF.FFFF.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
47
PDF created with pdfFactory trial version www.pdffactory.com
Broadcast Messaging
A local network is also referred to as a broadcast domain.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
48
PDF created with pdfFactory trial version www.pdffactory.com
MAC and IP
Address resolution protocol (ARP) is used to discover the MAC address of any host on the same local network.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
49
PDF created with pdfFactory trial version www.pdffactory.com
Address Resolution Protocol (ARP)
ARP uses a three step process to discover and store the MAC address of a host on the local network when only the IP address of the host is known. Refer 3.4.7.1
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
50
PDF created with pdfFactory trial version www.pdffactory.com
Distribution Layer
The Distribution Layer connects the independent local networks and controls the traffic flowing between them. The Access Layer devices are connected to each other via the Distribution Layer device, such as routers.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
51
PDF created with pdfFactory trial version www.pdffactory.com
Function of Routers
A router is a networking device that connects a local network to other local networks. At the Distribution Layer of the network, routers direct traffic and perform other functions critical to efficient network operation. Refer 3.5.2.1
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
52
PDF created with pdfFactory trial version www.pdffactory.com
Function of Routers
Each port, or interface, on a router connects to a different local network. The routing table contain information about the routes, or paths, that the router uses to reach other remote networks that are not locally attached. Local network broadcasts are not sent across routers to other local networks. Refer 3.5.2.3
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
53
PDF created with pdfFactory trial version www.pdffactory.com
Default Gateway
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
54
PDF created with pdfFactory trial version www.pdffactory.com
Tables Mantained by routers
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
55
PDF created with pdfFactory trial version www.pdffactory.com
Tables Mantained by routers
Refer 3.5.4.2
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
56
PDF created with pdfFactory trial version www.pdffactory.com
Tables Mantained by routers
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
57
PDF created with pdfFactory trial version www.pdffactory.com
Tables Mantained by routers
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
58
PDF created with pdfFactory trial version www.pdffactory.com
Tables Mantained by routers
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
59
PDF created with pdfFactory trial version www.pdffactory.com
Tables Mantained by routers
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
60
PDF created with pdfFactory trial version www.pdffactory.com
Local Are Network (LAN)
The term Local Area Network (LAN) refers to a local network, or a group of interconnected local networks that are under the same administrative control.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
61
PDF created with pdfFactory trial version www.pdffactory.com
Local Are Network (LAN)
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
62
PDF created with pdfFactory trial version www.pdffactory.com
Addressing Hosts to Local and Remote Networks
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
63
PDF created with pdfFactory trial version www.pdffactory.com
Addressing Hosts to Local and Remote Networks
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
64
PDF created with pdfFactory trial version www.pdffactory.com
Learn to Use Packet Tracer
Refer: 3.5.7.1
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
65
PDF created with pdfFactory trial version www.pdffactory.com
Plan and Document an Ethernet Network
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
66
PDF created with pdfFactory trial version www.pdffactory.com
Plan and Document an Ethernet Network
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
67
PDF created with pdfFactory trial version www.pdffactory.com
Plan and Document an Ethernet Network
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
68
PDF created with pdfFactory trial version www.pdffactory.com
Prototypes
Once the network requirements are documented, and the physical and logical topology maps created, the next step in the implementation process is to test the network design. One of the ways to test a network design is to create a working model, or prototype, of the network. Refer: 3.6.2.2
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
69
PDF created with pdfFactory trial version www.pdffactory.com
Multi-function Device
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
70
PDF created with pdfFactory trial version www.pdffactory.com
Connecting the Linksys Router
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
71
PDF created with pdfFactory trial version www.pdffactory.com
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
72
PDF created with pdfFactory trial version www.pdffactory.com
Sharing Resources
It is important to consider security issues, and to assign specific permissions to shared resources. Simple File Sharing can be disabled so that more specific security access levels can be assigned. When this is done, the following permissions are available to assign to resources: Full Control Modify Read & Execute List Folder Contents Read Write Refer: 3.6.5.2
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
73
PDF created with pdfFactory trial version www.pdffactory.com
Summary
Information networks carry data using hosts as clients, servers, or both. All computer communication involves a source, destination, and channel. Rules called protocols govern computer communications. Larger networks are divided into smaller, more manageable ones using a layered hierarchical design. Each network host needs both a physical MAC address and a logical IP address. Good network design requires a network plan.
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
74
PDF created with pdfFactory trial version www.pdffactory.com
Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com
75
PDF created with pdfFactory trial version www.pdffactory.com