0% found this document useful (0 votes)
41 views39 pages

Layered Protocol Models The Tcp/Ip Layered Architecture Model

The document discusses layered protocol models and the TCP/IP layered architecture model. It covers topics such as data encapsulation, reference models, comparing OSI and TCP/IP models, physical layer functions, MAC and IP addresses, media access control, Ethernet encapsulation, collision domains, bridges, switches, VLANs, trunking, and default gateways.

Uploaded by

유요화
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views39 pages

Layered Protocol Models The Tcp/Ip Layered Architecture Model

The document discusses layered protocol models and the TCP/IP layered architecture model. It covers topics such as data encapsulation, reference models, comparing OSI and TCP/IP models, physical layer functions, MAC and IP addresses, media access control, Ethernet encapsulation, collision domains, bridges, switches, VLANs, trunking, and default gateways.

Uploaded by

유요화
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 39

Layered

Protocol Models
The TCP/IP
Layered
Architecture
Model

Layered Protocol Models

The TCP/IP Layered Architecture Model

Data Encapsulation

Communicating the Messages


Segmenting message benefits
Different conversations can be interleaved
Increased reliability of network communications

Segmenting message disadvantage


Increased level of complexity

Reference Models

Benefits of Using a Layered Model


Presentation: format
Session : timeout

Protocol Model

A model that describes an actual implementation

Reference Model

Used to describe generic networking processes

Comparin
g the OSI
and TCP/IP
Models

The Physical Layer

The Physical
Layer
General
Purpose

Sending
Accepts a frame from the Data Link
Layer
Transmits as binary bits over media
between devices
Receiving
Receives a signal over a common
media
Converts back into a sequence of bits
Passes to the Data Link Layer as a
frame for processing

MAC and
IP

MAC Address
This address does not change
Similar to the name of a person
Known as physical address because physically
assigned to the host NIC
IP Address
Similar to the address of a person
Based on where the host is actually located
Known as a logical address because assigned
logically
Assigned to each host by a network administrator
Both the physical MAC and logical IP addresses are
required for a computer to communicate just like
both the name and address of a person are required
to send a letter.

End-to-End Connectivity, MAC,


and IP

Media Access Control

Physical vs Logical
Physical
Arrangement of nodes and the physical
connections between them
What the network looks like

Logical
Virtual arrangement of nodes independent
of their physical connectivity
The Data Link Layer sees the Logical
Topology
Influences network framing and MAC

Common
Physical
WAN
Topologies

Half- and Full-Duplex


Half-Duplex
Sent or receive only

Full-Duplex
Sent or receive both at same time

Contention-Based Access
Characteristics
Stations can transmit at
any time
Collision exist
There are mechanisms to
resolve contention for the
media

Contention-Based
Technologies
CSMA/CD for 802.3
Ethernet networks
CSMA/CA for 802.11
wireless networks
Carrier Sense Multiple
Access
Collision Detection
Collision Avoidance

Controlled Access
Characteristics
Only one station can
transmit at a time
Devices wanting to
transmit must wait their
turn
No collisions
May use a token passing
method

Contention-Based
Technologies
Token Ring (IEEE 802.5)
Fiber Distributed Data
Interface (FDDI)

LLC and MAC Sublayers


Logical-Link Layer (LLC)
Handles communication between upper
and lower layers
Media Access Control (MAC)
Constitutes the lower sublayer of the
data link layer
Implemented by hardware, typically in
the computer NIC
Two primary responsibilities:
Data encapsulation
Media access control

CSMA/CD
Carrier Sense Multiple Access with Collision Detection
Multiple Access
Bus topology
Shared Medium
Carrier Sense
Listen to medium
Dont send until medium is free
Collision Detection
Detect when collisions occur

CSMA/CA
Carrier Sense Multiple Access with Collision Avoidance
Collision Avoidance
After media is free send notification of stations intent to use
medium Wait for response from controller Transmit

Ethernet
Encapsulation
Preamble
Synchronisation signal (0101010)
Allows receivers to synchronise clocks for rest of
frame
Addresses
Who is sending/receiving this frame
Type
Tells Ethernet layer what Network Layer Protocol
is carried in Data
Frame check
Check for errors

Unicast MAC Address

Broadcast MAC Address

Collision
Domains

Collisions still happen on a shared network


Probability increases with number of hosts
Define a collision domain
Portion of network where, if two hosts
want to talk at the same time, a
collision will occur
An entire shared network is a Collision
Domain
Any two hosts on a hub/sharedsegment have the possibility of
colliding

Ethernet packets contain a source


MAC address

Bridges
Operation

By listening to traffic we can determine


where each Ethernet host is connected to
the network

A bridge connects two shared-Ethernet


segments together
Learns which MAC addresses are on each
side of the switch

Switch MAC Address Table


1. The switch receives a broadcast frame from PC 1 on Port 1
2. Store the source MAC address and switch port into the address table
3. Destination address is broadcast flood the frame to all ports, except the port
on which it received the frame.
4. Destination device replies to broadcast with a unicast addressed to PC 1.
5. Store the source MAC address of PC 2 and switch port into the address table
6. Destination address and associated port is found in the MAC address table
7. The switch can now forward frames between source and destination devices
without flooding

Store-andforward

Cut-through Switching
Fast-forward switching:
Lowest level of latency
Immediately forwards a packet
after reading the destination
address
Typical cut-through method of
switching
Fragment-free switching:
Switch stores the first 64 bytes
of the frame before Forwarding
Most network errors and
collisions occur during the first
64 bytes

Memory Buffering on Switches

VLAN
Definitions

A VLAN is a logical partition of a Layer


2 network
Multiple partitions (VLANs) can be
created
Each VLAN is a broadcast domain
VLANs are mutually isolated and
packets can only pass between them
via a Layer 3 device
The hosts grouped within a VLAN are
typically unaware of the VLANs
existence

Benefits of
VLANs

Security
Cost reduction
Better performance
Shrink broadcast domains

VLAN Ranges on Catalyst Switches


Cisco Catalyst 2960 and 3560 Series switches support over 4,000 VLANs
VLANs are split into two categories:
Normal range VLANs
VLAN numbers from 1 to 1,005
Configurations stored in the vlan.dat (in the flash memory)
Extended Range VLANs
VLAN numbers from 1,006 to 4,096
Configurations stored in the running configuration (NVRAM)
Some limitations to Extended VLANs should limit use to normal VLANs

VLAN
Access
Ports

Port can only belong to one VLAN


Traffic is normal untagged Ethernet
frames
Network devices are unaware of VLAN
Network devices see normal Ethernet
network
Traffic is restricted based on
Only traffic for that VLAN
Contents of switch CAM Table

VLAN Membership
Static VLAN

Dynamic VLAN

Ports manually assigned


Membership is configured
to a VLAN
using a VMPS VLAN
Configured with:
Membership Policy Server
switchport access vlan Based on source Mac
XX
address of device
Requires reconfiguration if
circumstances change

VLAN Trunks
Inefficient to connect switches using Access Ports need one
connection for each VLAN
Trunks allow a single connection to carry traffic of multiple VLANs
Traffic is still segmented
Frames are tagged to allow receiving switch to know which VLAN
traffic belongs to

Native VLANs and 802.1Q Tagging


Frames that belong to the native VLAN are not tagged
Frames received untagged remain untagged and are placed in
the native VLAN when forwarded
If there are no ports associated to the native VLAN and no other
trunk links, an untagged frame is dropped
In Cisco switches, the native VLAN is VLAN 1, by default
Cisco 3650 switches need to have trunking mode configured
before any trunk can be established

Introduction to Dynamic Trunk


Protocol (DTP)

Cisco solution to automatically configure switch port state


Dynamic Trunking Protocol (DTP) manages trunk negotiation
Cisco proprietary protocol
Default, enabled in Cisco Catalyst 2960 and 3560 switches
The default DTP configuration for Cisco Catalyst 2960 and 3560
switches is dynamic auto

Data and Default VLANs


Data VLAN

Default VLAN

Configured to Carry data


Default setting on
traffic
unconfigured switch
User VLANs for networked Cisco VLAN 1
devices and computers
Same features as other
VLANs except it cannot be
deleted or renamed
Default Carries all Layer
2 control traffic

Data and Default VLANs


Native VLAN
Management VLAN
Backwards compatibility
Default VLAN 1
with other switches
Assigned with IP address
Non tagged frames on an
for network layer
Ethernet Trunk will be
connectivity to switch
assumed to belong to this
VLAN
Best practice change
from VLAN 1

Voice VLANs

Default Gateway
Hosts must maintain their own, local, routing table to ensure that
network layer packets are directed to the correct destination network.
The local table of the host typically contains:
Direct connection
Local network route
Local default route
All end hosts need a gateway address if they need to communicate with
hosts outside the local Link Layer network

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy