The document provides an overview of network device configuration, detailing the OSI model layers and their functions, including physical, data link, network, transport, session, presentation, and application layers. It also discusses various network devices such as hubs, switches, routers, and the importance of configuration management, VLANs, and VPNs. Additionally, it covers specific protocols and their roles in network communication and management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
19 views27 pages
NDC ch1
The document provides an overview of network device configuration, detailing the OSI model layers and their functions, including physical, data link, network, transport, session, presentation, and application layers. It also discusses various network devices such as hubs, switches, routers, and the importance of configuration management, VLANs, and VPNs. Additionally, it covers specific protocols and their roles in network communication and management.
Febr, 2025 Outline Configuration Wizard. View VLANs by device and port. Automatic Discovery and Configuration Manager. Wireless Mobility configuration menu Device Schedules VPN Policy Manager Element Manager. CLI Configuration Manager. 1.1 Configuration Wizard While the configuration wizard is an easy way to display complex configuration options, it does rely on the user having a basic understanding of the software component. Network Devices Computer networking devices are units that mediate data in a computer network and are also called network equipment. OSI Model The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. Advantages: • Network communication is broken into smaller, more manageable parts. • Allows different types of network hardware and software to communicate with each other. • All layers are independent and changes does not affect other layers. • Easier to understand network communication. Why layered communication? • To reduce complexity of communication task OSI model LAYER 1: PHYSICAL LAYER The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured data bits across the network from the physical layer of the sending device to the physical layer of the receiving device. It can include specifications such as voltages, pin layout, cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as network hubs, cabling, repeaters, network adapters or modems. • Define physical characteristics of network. E.g. wires, connector, voltages, data rates, Asynchronous, Synchronous Transmission. • Handles bit stream or binary transmission. • Used to maintain, activate and deactivate physical link. • For Receiver it reassembles bits and send to upper layer for frames. LAYER 2: DATA LINK At the data link layer, directly connected nodes are used to perform node-to-node data transfer where data is packaged into frames. The data link layer also corrects errors that may have occurred at the physical layer. The data link layer encompasses two sub-layers of its own. The first, media access control (MAC), provides flow control and multiplexing for device transmissions over a network. The second, the logical link control (LLC), provides flow and error control over the physical medium as well as identifies line protocols Sub layers of Layer 2 √ Logical link layer (LLC) Used for communication with upper layers Error correction Flow control
√ Media Access Control (MAC)
Access to physical medium Header and trailer Trailer: The trailer typically includes a frame check sequence LAYER 3: NETWORK The network layer is responsible for receiving frames from the data link layer, and delivering them to their intended destinations among based on the addresses contained inside the frame. The network layer finds the destination by using logical addresses, such as IP (internet protocol). At this layer, routers are a crucial component used to quite literally route information where it needs to go between networks. • Defines source to destination delivery of packets across NWs. • Defines logical addressing and best path determination. • Treat each packet independently • Defines how routing works and how routes are learned • Converts frames to packets • Routed protocols ( encapsulate data into packets) and Routing protocols (create routing tables) work on this layer • Examples of Routed protocols are: IP, IPX, AppleTalk and Routing protocols are OSPF, IGRP/EIGRP, RIP, BGP • Routers operate at Layer 3. LAYER 4: TRANSPORT The transport layer manages the delivery and error checking of data packets. It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts. One of the most common examples of the transport layer is TCP or the Transmission Control Protocol. It regulates information flow to ensure process-to- process connectivity between host applications reliably and accurately Adds service point address or Port address Segmentation & Re-assembly: SEGMENTS data from sending node and reassembles data on receiving node Flow control / Error control at Source to destination level Connection oriented transport service ensures that data is delivered error free, in sequence with no losses or duplications Establishes, maintains and terminates virtual circuits Connection oriented / Connectionless: (TCP/UDP) LAYER 5: SESSION The session layer controls the conversations between different computers. A session or connection between machines is set up and managed at layer 5. Session layer services also include authentication and reconnections. The session layer defines how to start, control and end conversations (called sessions) between applications Establishes dialog control between the two computers in a session, regulating which side transmits, plus when and how long it transmits (Full duplex) Synchronization: Allows processes to add check points. E.g. Insert check point at every 100 page of 2000 page file to ensure that each 100-page unit is received & acknowledged Transmits Data LAYER 6: PRESENTATION The presentation layer formats or translates data for the application layer based on the syntax or semantics that the application accepts. Because of this, it at times also called the syntax layer. This layer can also handle the encryption and decryption required by the application layer. Presentation layer is concerned with the syntax and semantics of the information exchanged between two systems. This layer is primarily responsible for the translation, encryption and compression of data. Defines coding and conversion functions This layer also manages security issues by providing services such as data encryption and data compression Examples of these formats and schemes are: MPEG, QuickTime, ASCII, EBCDIC, GIF, TIFF, JPEG LAYER 7: APPLICATION At this layer, both the end user and the application layer interact directly with the software application. This layer sees network services provided to end-user applications such as a web browser or Office 365. The application layer identifies communication partners, resource availability, and synchronizes communication. The application layer is responsible for providing services to the user Closest to the user and provides user interface Establishes the availability of intended communication partners Examples of Application layer protocols are: Telnet, SMTP, FTP, SNMP Data Encapsulation Data Encapsulation is the process of adding a header to wrap/envelop the data that flows down the OSI model. The 5 Steps of Data Encapsulation are: The Application, Presentation and Session layers create DATA from users’ input. The Transport layer converts the DATA to SEGMENTS The NW layer converts the Segments to Packets (datagram) The Data Link layer converts the PACKETS to FRAMES The Physical layer converts the FRAMES to BITS Some of application layer protocols and their functions Simple Mail Transfer Protocol (SMTP) Governs the transmission of mail messages and attachments SMTP is used in the case of outgoing messages More powerful protocols such as POP3 and IMAP4 are needed and available to manage incoming messages POP3(Post Office Protocol version 3) is the older protocol IMAP4(Internet Mail Access Protocol version 4) is the more advanced protocol Telnet: It allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet server, in order to access a command-line interface. File Transfer Protocol (FTP) File Transfer Protocol (FTP) actually lets us transfer files, and it can accomplish this between any two machines using it. FTP’s functions are limited to listing and manipulating directories, typing file contents, and copying files between hosts Cont’d Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) collects and manipulates valuable network information. Hypertext Transfer Protocol (HTTP) It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside. Hypertext Transfer Protocol Secure (HTTPS) Hypertext Transfer Protocol Secure (HTTPS) is also known as Secure Hypertext Transfer Protocol. It uses Secure Sockets Layer (SSL). Domain Name Service (DNS) Domain Name Service (DNS)resolves hostnames—specifically, Internet names, such as www.wcu.edu.et Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP)assigns IP addresses to hosts dynamically. It allows for easier administration and works well in small to very large network environments. Some of Transport layer protocols and their functions TCP (Transmission Control Protocol) TCP: takes large blocks of information from an application and breaks them into segments. It is Connection oriented means that a virtual connection is established before any user data is transferred. (handshake) User Datagram Protocol (UDP) UDP does not sequence the segments and does not care about the order in which the segments arrive at the destination. UDP just sends the segments off and forgets about them. Cont’d Network device Hub Hubs connect computers together in a star topology network. They increase the chances for collisions. Hubs operate in the physical layer. Bridge In telecommunication networks, a bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol. Repeater A repeater is an electronic device that receives a signal and retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances without degradation Modem Modem (from modulator-demodulator) is a device that turns the digital 1s and 0s of a personal computer into sounds that can be transmitted over the telephone lines NIC (Network Interface Card) Cont’d Switch • A switch when compared to bridge has multiple ports. Switches can perform error checking before forwarding data • Switches can support both layer 2 (based on MAC Address) and layer 3 (Based on IP address) depending on the type of switch Routers • A router, like a switch forwards packets based on address. • Usually, routers use the IP address to forward packets, which allows the network to go across different protocols. • Routers forward packets based on software while a switch (Layer 3 for example) forwards using hardware called ASIC (Application Specific Integrated Circuits). • Routers support different WAN technologies but switches do not. • Besides, wireless routers have access point built in. • The most common home use for routers is to share a broadband internet connection. • As the router has a public IP address which is shared with the network, when data comes through the router, it is forwarded to the correct computer 1.2. View VLANs by Device and Port VLANs are assigned to individual switch ports. Ports can be statically assigned to a single VLAN or dynamically assigned to a single VLAN. All ports are assigned to VLAN 1 by default Ports are active only if they are assigned to VLANs that exist on the switch. Static port assignments are performed by the administrator and do not change unless modified by the administrator, whether the VLAN exists on the switch or not. Dynamic VLANs are assigned to a port based on the MAC address of the device plugged into a port. Dynamic VLAN configuration requires a VLAN Membership Policy Server (VMPS) client, server, Cont’d 1.3. Configuration Manager
Configuration management is a process closely
linked to change management, which is also called configuration control. Any system that needs to be controlled closely and run with good reliability, maintainability and performance benefits greatly from configuration management Configuration management can extend life, reduce cost, reduce risk, and even correct defects 1.5. Device Schedules In order to take a backup of your device configurations, you need to first discover your devices using Network Configuration Manager. The tool also allows you to add devices in bulk. Once the devices are discovered, you can proceed to scheduling network backups. In order to take a backup of your device configurations, you need to first discover your devices using Network Configuration Manager 1.6. VPN Policy Manager A virtual private network (VPN) is a private data network connection that makes use of the public telecommunications infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. Using a virtual private network involves maintaining privacy through the use of authorization, authentication, and encryption controls that encrypt da ta before sending it through the public network and decrypting it at the receiving end. Overview of how it Works • Two connections – one is made to the Internet and the second is made to the VPN. • Datagrams – contains data, destination and source information. • Firewalls – VPNs allow authorized users to pass through the firewalls. • Protocols – protocols create the VPN tunnels. Cont’d VPN Gateway and Tunnels A VPN gateway is a network device that provides encryption and authentication service to a multitude of hosts that connect to it. There are two types of endpoint VPN tunnels: 1. Computer to gateway For remote access: generally set up for a remote user to connect A corporate LAN 2. Gateway to Gateway This is a typical enterprise-to-enterprise configuration. The two gateways communicate with each other 1.7. Element Manager Importance of Managing Network Devices • Configuration Management • Performance Management • Fault Management Common ways to analyze the configuration, Performance and Faults on a Cisco Device • CLI (Command Line Interface) • SNMP (Simple Network Management Protocol) • CiscoView Using SNMP and CiscoView: • A user can define a VTP domain, • Configure devices as VTP servers, clients, or transparent devices in the domain, • Create VLANs within the domain, • Assign ports to a VLAN, and view the ports assigned to a Cont’d Thank You