"Data Collation" Cisco [OSI, IP Address, Network Segment, Subnet Mask]
### concept ###----------------------from 20110712 to 201107161.network segment{ Router;switch;bridge;} 2.lan blocks{broadcast domain;broadcast storm;multicast;low brandwidth;} 3.benefits of the router{! forward broadcast;filter msgs on layer-3 ( Network layer);} 4. benefits of the switch{enhance lan performance;supply more Blandwidth;} 5. collision domain{data packets can collide with one another When being sent on a shared medium,in particular, when using early versions of the ethernet.a network collision occurs when more than one device attempts to send a packet on a network segment at the same time.} 6. bridge{a network Bridge connects mulitple network segments at the layer-2 (Data Link layer) of the osi model. A device that behaves according to the ieee 802.1d standard. A bridge and a switch are very much alike.a switch being a bridge with numerous ports.} 7. osi (open systems interconnection) reference model{Description of Osi layers:---Layer 7: application layerit contains all protocols and methods that fall into the realm of process-to process Communications across an ip network. application layer methods use the underlying transport layer protocols to establish host-to-host connections. ---layer 6: Presentation LayerIt serves as the data translator for the network. it is sometimes called the syntax layer. it is Lowest layer at which application programmers consider data structure and presentataion, instead of simply sending data in form Of datagrams or packets between hosts. this layer deals with issus of string representation. the idea is that the Application Layer should be able to point at the Data to be moved, and the presentation layer will deal with the rest. serialization of complex data structures into flat byte-strings; #Services #: encryption and decryption; compression; data conversion character code translation. within the service layering semantics of the osi network Architecture, the presentation layer responds to service requests from the Application Layer and issues service requests to the Session layer.---layer 5: session layerit provides the mechanism for opening, closing and managing a session between end-user application processes. communication sessions consist of requests and Responses that occur between applications. session layer services are commonly used in appliCation environments that make use of remote procedure calls (RPCs). #Services #: authentication; permissions; session restoration ( checkpointing and recovery).---layer 4: transport layerit provides end-to-end communication services for applications within a layered architecture of network components and protocols. #Services #: Connection-oriented communication; Byte orientation; Same order delivery; reliability; flow control; congestion avoidance; multiplexing.---Layer 3: Network LayerIt is responsible for routing packets delivery Including routing through intermediate routers, where as the data link layer is responSible for media access control, flow control and error checking. it provides the functional and procedural means of transferring variable length data sequences from a source to a Destination host via one or more networks while maintaining the quality of service functions. Functions of the Network layer include: connection model: connectionless communication; host addressing; message forwording.---layer 2: data link layerit is the protocol layer which transfers data between adjacent network nodes in a wide area network or between nodes on the Same local area&nbsP;network segment. it provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the Physical Layer. ------2.1 wan protocol architecturethe uppermost sublayer is logical link control (LLC). This sublayer multiplexes protocols running stop the data link layer, and optionally provides flow control, acknowledgment, and error Notification. the llc provides addressing and control of the data link. it specifies which mechanisms are to be used for addressing stations oveR the transmission medium and for controlling the data exchanged between the originator and recipient machines.------2.2 IEEE 802 lan architecturethe sublayer below it is media access control (MAC). sometimes this refers to the sublayer that determines who is allowed to access the media at any one time (USUALLY&NBSP;CSMA/CD) . other times it refers to a frame Structure with mac addresses inside. there are generally two forms of media access control: distributed and centralized. Both of these may be compared to communication between people. in&Nbsp;a network made up of people speaking, i.e. a conversation, we look for clues from our fellow talkers to see if any of them appear to be about to speak. If two people speak at the same time, they will back off and begin a long and elaborate game of saying "No, you first". The Media Access Control sublayer Also determines where one frame of data ends and the next one starts -- frame synchronization. There are four means of frame synchronization: time based, character counting, byte Stuffing and bit stuffing. #Services #: encapsulation of network layer data packets into frames; frame synchronization. #Services-llc#: Error control (Automatic repeat request, arg); flow control. #Services-mac#: multiple access protocols; physcical addressing; lan Switching; data packet queueing; store-and-forward switching; qualit of service (QoS) control; virtual lans (VLAN).---layer 1: physical layerthe Physical Layer consists of the basic hardware transmission Technologies of a network. it is a fundamental layer underlying the logical data structures of the higher level functions In a network. the Physical layer defines the means of transmitting raw bits rather than logical data packets over a physical link connecting Network nodes. the bit stream may be grouped into code words or symbols and converted to a physical signal that is Transmitted over a hardware transmission medium. the physical layer provides an electrical, mechanical, and procedural interface to the transmission medium. the shapes and properties of the Electrical connectors, the frequencies to broadcast on, the modulation scheme to use and similar low-level parameters, are specified here. #Services #: bit-by-bit; standardized interface ....} 8. ip address{bits->decimal1 1 1 1 1 1 1 1128 64 32 16 8 4 2 1--------------------------------------------------bits: 1-8, 9-16, 17-24, 25-32class:a: (0-127) 0xxx xxxx host, host, host b: (128-191) 10xx xxxx network, host, host c: (192-223) 110x xxxx network, network, network d: (224-239) 1110 xxxx multicast group, multicast group, multicast group1. A: 10.0.0.0 - 10.255.255.2552. B: 172.16.0.0 - 172.31.255.2553. C: 192.168.0.0 - 192.168.255.255}9. subnet mask{i.e.ip: 192.168.10.0mask: 255.255.255.192 (/26) 1. subnets = 2 * 2 = 42. hosts = 2^6 - 2 = 623. available subnet: block size = 256 - 192 = 64; [0, 64, 128, 192]4. broadcast address = nextsubnet - 1. [63, 127, 191, 255]5. range of the hosts: [192.168.10.1 ~ 192.168.10.62]; [192.168.10.65 ~ 192.168.10.126]; 192.168.10.129 ~ 192.168.10.190]; [192.168.10.193 ~ &NBSP;192.168.10.254] requires a block size = 32 = for a certain IP address: 192.168.0.0-192.168.30.254 subnet (subnet) 256 - 224 (subnet mask) subnet mask is:255.255.224.0 VLSM subnet bit = / 19111111111.11111111.11100000.000000000 Network bit 3 1 (2^3=8, total 8 network segments), the rest is the host bit. The network segment is as follows 0-3132-6364-9596-127128-159160-191192-223224-255host IP range: 192.168.0.0/19 = 192.168.0.1 - 192.168.31.254192.168.32.0/19 = 192.168.32.1 - 192.168.63.254...}10. unshielded twisted paired (UTP) {purpose: this figure Illustrates an unshielded twisted-pair rj-45 connector. emphasize: the rj-45 has eight pins. some are for tip (T) and some for ring (R). pin tip/ring pair1-41 t22 r23 t34 r15 t16 r37 t48 R4---emphasize: if you hold the two ends of an rj-45 Cable side by side, you ' Ll see eight colored strips, or pins , at each end. ------>if the order of the colored pins is the same at each end, then the cable is straight through. ------>if the order of the colors is reversed at each end, then the cable is crossed over or rolled.------>straight-thru ethernet uses pins 1, 2, 3, and 6. Straight-thru cables are Used for switch to router cabling, switch to pc or server cabling, or hub to PC or server cabling. ---straight: "x" <--> "crossover: " " <--> " " or " X " <--> "X" this figure describes a simple way to determine whether One should use a crossover or straight thru cable.} 11 rip{distance vector: rip igrplink state: ospf is-ishybird: EIGRP---DISTANCE:&NBSP;HOW&NBSP;FARVECTOR:&NBSP;IN&Nbsp;which directionconvergence time: rooting loops: ------>solution to Solve it:------>split horizon; route poisoning; poison reverse; holddown timers; triggered updates; max-hop}
"Data Collation" Cisco [OSI, IP Address, Network Segment, Subnet Mask]