FIGURE 2.22
PDU and layer addressing
Before we go further in our discussion of
Figure 2.22
, let’s discuss port
numbers and make sure you understand them. The Transport layer uses
port numbers to define both the virtual circuit and the upper-layer
processes, as you can see from
Figure 2.23
.
FIGURE 2.23
Port numbers at the Transport layer
When using a connection-oriented protocol like TCP, the Transport layer
takes the data stream, makes segments out of it, and establishes a reliable
session by creating a virtual circuit. It then sequences (numbers) each
segment and uses acknowledgments and flow control. If you’re using
TCP, the virtual circuit is defined by the source and destination port
number plus the source and destination IP address and called a socket.
Understand that the host just makes this up, starting at port number
1024 because 0 through 1023 are reserved for well-known port numbers.
The destination port number defines the upper-layer process or
application that the data stream is handed to when the data stream is
reliably rebuilt on the receiving host.
Now that you understand port numbers and how they are used at the
Transport layer, let’s go back to
Figure 2.22
. Once the Transport layer
header information is added to the piece of data, it becomes a segment
that’s handed down to the Network layer along with the destination IP
address. As you know, the destination IP address was handed down from
the upper layers to the Transport layer with the data stream and was
identified via name resolution at the upper layers—probably with DNS.
The Network layer adds a header and adds the logical addressing such as
IP addresses to the front of each segment. Once the header is added to
the segment, the PDU is called a packet. The packet has a protocol field
that describes where the segment came from (either UDP or TCP) so it
can hand the segment to the correct protocol at the Transport layer when
it reaches the receiving host.
The Network layer is responsible for finding the destination hardware
address that dictates where the packet should be sent on the local
network. It does this by using the Address Resolution Protocol (ARP)—
something I’ll talk about more in Chapter 3. IP at the Network layer looks
at the destination IP address and compares that address to its own source
IP address and subnet mask. If it turns out to be a local network request,
the hardware address of the local host is requested via an ARP request. If
the packet is destined for a host on a remote network, IP will look for the
IP address of the default gateway (router) instead.
The packet, along with the destination hardware address of either the
local host or default gateway, is then handed down to the Data Link layer.
The Data Link layer will add a header to the front of the packet and the
piece of data then becomes a frame. It’s called a frame because both a
header and a trailer are added to the packet, which makes it look like it’s
within bookends—a frame—as shown in
Figure 2.22
. The frame uses an
Ether-Type field to describe which protocol the packet came from at the
Network layer. Now a cyclic redundancy check is run on the frame, and
the answer to the CRC is placed in the Frame Check Sequence field found
in the trailer of the frame.
The frame is now ready to be handed down, one bit at a time, to the
Physical layer, which will use bit-timing rules to encode the data in a
digital signal. Every device on the network segment will receive the digital
signal and synchronize with the clock and extract the 1s and 0s from the
digital signal to build a frame. After the frame is rebuilt, a CRC is run to
make sure the frame is in proper order. If everything turns out to be all
good, the hosts will check the destination MAC and IP addresses to see if
the frame is for them.
If all this is making your eyes cross and your brain freeze, don’t freak. I’ll
be going over exactly how data is encapsulated and routed through an
internetwork later, in Chapter 9, “IP Routing.”
The Cisco Three-Layer Hierarchical Model
Most of us were exposed to hierarchy early in life. Anyone with older
siblings learned what it was like to be at the bottom of the hierarchy.
Regardless of where you first discovered the concept of hierarchy, most of
us experience it in many aspects of our lives. It’s hierarchy that helps us
understand where things belong, how things fit together, and what
functions go where. It brings order to otherwise complex models. If you
want a pay raise, for instance, hierarchy dictates that you ask your boss,
not your subordinate, because that’s the person whose role it is to grant
or deny your request. So basically, understanding hierarchy helps us
discern where we should go to get what we need.
Hierarchy has many of the same benefits in network design that it does in
other areas of life. When used properly, it makes networks more
predictable and helps us define which areas should perform certain
functions. Likewise, you can use tools such as access lists at certain levels
in hierarchical networks and avoid them at others.
Let’s face it: Large networks can be extremely complicated, with multiple
protocols, detailed configurations, and diverse technologies. Hierarchy
helps us summarize a complex collection of details into an
understandable model, bringing order from the chaos. Then, as specific
configurations are needed, the model dictates the appropriate manner in
which to apply them.
The Cisco hierarchical model can help you design, implement, and
maintain a scalable, reliable, cost-effective hierarchical internetwork.
Cisco defines three layers of hierarchy, as shown in
Figure 2.24
, each with
specific functions.
FIGURE 2.24
The Cisco hierarchical model
Each layer has specific responsibilities. Keep in mind that the three layers
are logical and are not necessarily physical devices. Consider the OSI
model, another logical hierarchy. Its seven layers describe functions but
not necessarily protocols, right? Sometimes a protocol maps to more than
one layer of the OSI model, and sometimes multiple protocols
communicate within a single layer. In the same way, when we build
physical implementations of hierarchical networks, we may have many
devices in a single layer, or there may be a single device performing
functions at two layers. Just remember that the definition of the layers is
logical, not physical!
So let’s take a closer look at each of the layers now.
The Core Layer
The core layer is literally the core of the network. At the top of the
hierarchy, the core layer is responsible for transporting large amounts of
traffic both reliably and quickly. The only purpose of the network’s core
layer is to switch traffic as fast as possible. The traffic transported across
the core is common to a majority of users. But remember that user data is
processed at the distribution layer, which forwards the requests to the
core if needed.
If there’s a failure in the core, every single user can be affected! This is
why fault tolerance at this layer is so important. The core is likely to see
large volumes of traffic, so speed and latency are driving concerns here.
Given the function of the core, we can now consider some design
specifics. Let’s start with some things we don’t want to do:
Never do anything to slow down traffic. This includes making sure you
don’t use access lists, perform routing between virtual local area
networks, or implement packet filtering.
Don’t support workgroup access here.
Avoid expanding the core (e.g., adding routers when the internetwork
grows). If performance becomes an issue in the core, give preference
to upgrades over expansion.
Here’s a list of things that we want to achieve as we design the core:
Design the core for high reliability. Consider data-link technologies
that facilitate both speed and redundancy, like Gigabit Ethernet with
redundant links or even 10 Gigabit Ethernet.
Design with speed in mind. The core should have very little latency.
Select routing protocols with lower convergence times. Fast and
redundant data-link connectivity is no help if your routing tables are
shot!
The Distribution Layer
The distribution layer is sometimes referred to as the workgroup layer
and is the communication point between the access layer and the core.
The primary functions of the distribution layer are to provide routing,
filtering, and WAN access and to determine how packets can access the
core, if needed. The distribution layer must determine the fastest way
that network service requests are handled—for example, how a file
request is forwarded to a server. After the distribution layer determines
the best path, it forwards the request to the core layer if necessary. The
core layer then quickly transports the request to the correct service.
The distribution layer is where we want to implement policies for the
network because we are allowed a lot of flexibility in defining network
operation here. There are several things that should generally be handled
at the distribution layer:
Routing
Implementing tools (such as access lists), packet filtering, and
queuing
Implementing security and network policies, including address
translation and firewalls
Redistributing between routing protocols, including static routing
Routing between VLANs and other workgroup support functions
Defining broadcast and multicast domains
Key things to avoid at the distribution layer are those that are limited to
functions that exclusively belong to one of the other layers!
The Access Layer
The access layer controls user and workgroup access to internetwork
resources. The access layer is sometimes referred to as the desktop layer.
The network resources most users need will be available locally because
the distribution layer handles any traffic for remote services.
The following are some of the functions to be included at the access layer:
Continued (from distribution layer) use of access control and policies
Creation of separate collision domains (microsegmentation/switches)
Workgroup connectivity into the distribution layer
Device connectivity
Resiliency and security services
Advanced technology capabilities (voice/video, etc.)
Technologies like Gigabit or Fast Ethernet switching are frequently seen
in the access layer.
I can’t stress this enough—just because there are three separate levels
does not imply three separate devices! There could be fewer or there
could be more. After all, this is a layered approach.
Summary
In this chapter, you learned the fundamentals of Ethernet networking,
how hosts communicate on a network. You discovered how CSMA/CD
works in an Ethernet half-duplex network.
I also talked about the differences between half- and full-duplex modes,
and we discussed the collision detection mechanism called CSMA/CD.
I described the common Ethernet cable types used in today’s networks in
this chapter as well, and by the way, you’d be wise to study that section
really well!
Important enough to not gloss over, this chapter provided an
introduction to encapsulation. Encapsulation is the process of encoding
data as it goes down the OSI stack.
Last, I covered the Cisco three-layer hierarchical model. I described in
detail the three layers and how each is used to help design and implement
a Cisco internetwork.
Exam Essentials
Describe the operation of Carrier Sense Multiple Access with
Collision Detection (CSMA/CD). CSMA/CD is a protocol that helps
devices share the bandwidth evenly without having two devices transmit
at the same time on the network medium. Although it does not eliminate
collisions, it helps to greatly reduce them, which reduces retransmissions,
resulting in a more efficient transmission of data for all devices.
Differentiate half-duplex and full-duplex communication and
define the requirements to utilize each method. Full-duplex
Ethernet uses two pairs of wires at the same time instead of one wire pair
like half-duplex. Full-duplex allows for sending and receiving at the same
time, using different wires to eliminate collisions, while half-duplex can
send or receive but not at the same time and still can suffer collisions. To
use full-duplex, the devices at both ends of the cable must be capable of
and configured to perform full-duplex.
Describe the sections of a MAC address and the information
contained in each section . The MAC, or hardware, address is a 48-bit
(6-byte) address written in a hexadecimal format. The first 24 bits, or 3
bytes, are called the organizationally unique identifier (OUI), which is
assigned by the IEEE to the manufacturer of the NIC. The balance of the
number uniquely identifies the NIC.
Identify the binary and hexadecimal equivalent of a decimal
number. Any number expressed in one format can also be expressed in
the other two. The ability to perform this conversion is critical to
understanding IP addressing and subnetting. Be sure to go through the
written labs covering binary to decimal to hexadecimal conversion.
Identify the fields in the Data Link portion of an Ethernet
frame. The fields in the Data Link portion of a frame include the
preamble, Start Frame Delimiter, destination MAC address, source MAC
address, Length or Type, Data, and Frame Check Sequence.
Identify the IEEE physical standards for Ethernet cabling. These
standards describe the capabilities and physical characteristics of various
cable types and include but are not limited to 10Base-2, 10Base-5, and
10Base-T.
Differentiate types of Ethernet cabling and identify their
proper application. The three types of cables that can be created from
an Ethernet cable are straight-through (to connect a PC’s or router’s
Ethernet interface to a hub or switch), crossover (to connect hub to hub,
hub to switch, switch to switch, or PC to PC), and rolled (for a console
connection from a PC to a router or switch).
Describe the data encapsulation process and the role it plays in
packet creation. Data encapsulation is a process whereby information
is added to the frame from each layer of the OSI model. This is also called
packet creation. Each layer communicates only with its peer layer on the
receiving device.
Understand how to connect a console cable from a PC to a
router and switch. Take a rolled cable and connect it from the COM
port of the host to the console port of a router. Start your emulations
program such as putty or SecureCRT and set the bits per second to 9600
and flow control to None.
Identify the layers in the Cisco three-layer model and describe
the ideal function of each layer. The three layers in the Cisco
hierarchical model are the core (responsible for transporting large
amounts of traffic both reliably and quickly), distribution (provides
routing, filtering, and WAN access), and access (workgroup connectivity
into the distribution layer).
Written Labs
In this section, you’ll complete the following labs to make sure you’ve got
the information and concepts contained within them fully dialed in:
Lab 2.1: Binary/Decimal/Hexadecimal Conversion
Lab 2.2: CSMA/CD Operations
Lab 2.3: Cabling
Lab 2.4: Encapsulation
You can find the answers to these labs in Appendix A, “Answers to
Written Labs.”
Written Lab 2.1: Binary/Decimal/Hexadecimal Conversion
1. Convert from decimal IP address to binary format.
Complete the following table to express 192.168.10.15 in binary
format.
128 64 32 16 8 4 2 1 Binary
Complete the following table to express 172.16.20.55 in binary format.
128 64 32 16 8 4 2 1 Binary
Complete the following table to express 10.11.12.99 in binary format.
128 64 32 16 8 4 2 1 Binary
2. Convert the following from binary format to decimal IP address.
Complete the following table to express
11001100.00110011.10101010.01010101 in decimal IP address format.
128 64 32 16 8 4 2 1 Decimal
Complete the following table to express
11000110.11010011.00111001.11010001 in decimal IP address format.
128 64 32 16 8 4 2 1 Decimal
Complete the following table to express
10000100.11010010.10111000.10100110 in decimal IP address
format.
128 64 32 16 8 4 2 1 Decimal
3. Convert the following from binary format to hexadecimal.
Complete the following table to express
11011000.00011011.00111101.01110110 in hexadecimal.
128 64 32 16 8 4 2 1 Hexadecimal
Complete the following table to express
11001010.11110101.10000011.11101011 in hexadecimal.
128 64 32 16 8 4 2 1 Hexadecimal
Complete the following table to express
10000100.11010010.01000011.10110011 in hexadecimal.
128 64 32 16 8 4 2 1 Hexadecimal
Written Lab 2.2: CSMA/CD Operations
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) helps
to minimize collisions in the network, thereby increasing data
transmission efficiency. Place the following steps of its operation in the
order in which they occur after a collision.
All hosts have equal priority to transmit after the timers have expired.
Each device on the Ethernet segment stops transmitting for a short
time until the timers expire.
The collision invokes a random backoff algorithm.
A jam signal informs all devices that a collision occurred.
Written Lab 2.3: Cabling
For each of the following situations, determine whether a straight-
through, crossover, or rolled cable would be used.
1. Host to host
2. Host to switch or hub
3. Router direct to host
4. Switch to switch
5. Router to switch or hub
6. Hub to hub
7. Hub to switch
8. Host to a router console serial communication (COM) port
Written Lab 2.4: Encapsulation
Place the following steps of the encapsulation process in the proper order.
Packets or datagrams are converted to frames for transmission on the
local network. Hardware (Ethernet) addresses are used to uniquely
identify hosts on a local network segment.
Segments are converted to packets or datagrams, and a logical address
is placed in the header so each packet can be routed through an
internetwork.
User information is converted to data for transmission on the
network.
Frames are converted to bits, and a digital encoding and clocking
scheme is used.
Data is converted to segments, and a reliable connection is set up
between the transmitting and receiving hosts.
Review Questions
The following questions are designed to test your
understanding of this chapter’s material. For more information on
how to get additional questions, please see
www.lammle.com/ccna
.
You can find the answers to these questions in Appendix B, “Answers to
Review Questions.”
1. In the accompanying graphic, what is the name for the section of the
MAC address marked as unknown?
A. IOS
B. OSI
C. ISO
D. OUI
2. __________on an Ethernet network is the retransmission delay
that’s enforced when a collision occurs.
A. Backoff
B. Carrier sense
C. Forward delay
D. Jamming
3. On which type of device could the situation shown in the diagram
occur?
A. Hub
B. Switch
C. Router
D. Bridge
4. In the Ethernet II frame shown here, what is the function of the
section labeled “FCS”?
A. Allows the receiving devices to lock the incoming bit stream.
B. Error detection
C. Identifies the upper-layer protocol
D. Identifies the transmitting device
5. A network interface port has collision detection and carrier sensing
enabled on a shared twisted-pair network. From this statement, what
is known about the network interface port?
A. This is a 10 Mbps switch port.
B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half-duplex.
D. This is an Ethernet port operating at full-duplex.
E. This is a port on a network interface card in a PC.
6. For what two purposes does the Ethernet protocol use physical
addresses? (Choose two.)
A. To uniquely identify devices at layer 2
B. To allow communication with devices on a different network
C. To differentiate a layer 2 frame from a layer 3 packet
D. To establish a priority system to determine which device gets to
transmit first
E. To allow communication between different devices on the same
network
F. To allow detection of a remote device when its physical address is
unknown
7. Between which systems could you use a cable that uses the pinout
pattern shown here?
A. With a connection from a switch to a switch
B. With a connection from a router to a router
C. With a connection from a host to a host
D. With a connection from a host to a switch
8. In an Ethernet network, under what two scenarios can devices
transmit? (Choose two.)
A. When they receive a special token
B. When there is a carrier
C. When they detect that no other devices are sending
D. When the medium is idle
E. When the server grants access
9. What type of cable uses the pinout shown here?
A. Fiber optic
B. Crossover Gigabit Ethernet cable
C. Straight-through Fast Ethernet
D. Coaxial
10. When configuring a terminal emulation program, which of the
following is an incorrect setting?
A. Bit rate: 9600
B. Parity: None
C. Flow control: None
D. Data bits: 1
11. Which part of a MAC address indicates whether the address is a
locally or globally administered address?
A. FCS
B. I/G bit
C. OUI
D. U/L bit
12. What cable type uses the pinout arrangement shown below?
A. Fiber optic
B. Rolled
C. Straight-through
D. Crossover
13. Which of the following is not one of the actions taken in the operation
of CSMA/CD when a collision occurs?
A. A jam signal informs all devices that a collision occurred.
B. The collision invokes a random backoff algorithm on the systems
involved in the collision.
C. Each device on the Ethernet segment stops transmitting for a short
time until its backoff timer expires.
D. All hosts have equal priority to transmit after the timers have
expired.
14. Which of the following statements is false with regard to Ethernet?
A. There are very few collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.
C. The host network card and the switch port must be capable of
operating in full-duplex mode to use full-duplex.
D. The default behavior of 10Base-T and 100Base-T hosts is 10 Mbps
half-duplex if the autodetect mechanism fails.
15. In the following diagram, identify the cable types required for
connections A and B.
A. A= crossover, B= crossover
B. A= crossover, B= straight-through
C. A= straight-through, B= straight-through
D. A= straight-through, B= crossover
16. In the following image, match the cable type to the standard with
which it goes.
1000Base-T
IEEE 802.3u
1000Base-SX IEEE 802.3
10Base-T
IEEE 802.3ab
100Base-TX IEEE 802.3z
17. The cable used to connect to the console port on a router or switch is
called a _________cable.
A. Crossover
B. Rollover
C. Straight-through
D. Full-duplex
18. Which of the following items does a socket comprise?
A. IP address and MAC address
B. IP address and port number
C. Port number and MAC address
D. MAC address and DLCI
19. Which of the following hexadecimal numbers converts to 28 in
decimal?
A. 1c
B. 12
C. 15
D. ab
20. What cable type is shown in the following graphic?
A. Fiber optic
B. Rollover
C. Coaxial
D. Full-duplex
|