Вы находитесь на странице: 1из 37

Cisco Certified Network Associate - Level 1

TABLE OF CONTENTS

1.0 INTERNETWORKING ........................................................................................ 3

1.1 Introduction to Internetworking 3

1.2 051 Model 7

Exercise 1.2.1 10

Exercise 1.2.2 10

1.3 Ethernet 11

Exercise 1.3.1 16

1.4 Wireless 17

Review Questions 18

2.0 TCP/IP .............................................................................................................. 19

2.1 The DoD Model 19

2.2 The IP Address 24

Exercise 2.2.1 25

Exercise 2.2.2 26

Exercise 2.2.3 27

Exercise 2.2.4 29

Exercise 2.2.5 30

Exercise 2.2.6 30

2.3 IP Classes 31

Exercise 2.3.1 31

Exercise 2.3.2 32

Exercise 2.3.3 32

Exercise 2.3.4 33

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 1
Cisco Certified Network Associate - Level 1

Review Questions 34
Answers 35

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 2
Cisco Certified Network Associate - Level 1

1.0 Internetworking
Before we can get into the specifics of Cisco products, we need to have a good
understanding of internetworking. Not just because we need a base to build upon,
but also because you will be tested on these concepts in the CCNA exam. Not to
mention the fact that its just plain fun stuff. Well it is to me anyway.
In a nutshell internetworking is simply connecting multiple networks together.
Those networks could be LANs or WANs it really doesn't matter.
In the CCNA course you will need to know the basics of router and switch operation.
But it would help if you know what routers and switches do. We will discuss
network devices in this section and of course go into more detail in later sections.

1.1 Introduction to Internetworking


The first thing I want to do is make sure you are familiar with some internetworking
terms as they will come up continually. The terms you need to know now are:
• Broadcast
• Unicast
• Multicast
• Broadcast Domain
• Collision Domain

A Broadcast is a message sent out on the network to all systems on the network.
It is very much like a conversation with walkie-talkies. When you hold down you
button and speak your radio sends out a signal and the other radio receives that
signal. In fact many other radios will hear that signal. Everyone on the same
channel hears it. The channel could be compared to the network. It is up to the
listener to decide if the message is meant for them or someone else. That's the
way a network broadcast works. The message is sent out on the network and all
computers look at it to determine if it is meant for them or not. Kind of like we all
hear the radio broadcast whether it is for us or not.
A Unicast on the other hand is more like a cell phone conversation. It is a message
sent through the air like the walkie-talkie example. The difference is that my phone
only pays attention to messages meant for it or for me. I only hear the message
when I answer my phone and carry on my conversation. So a unicast is a message
placed on the network intended for one (uni) recipient.

A Multicast is a message sent to a group of recipients. To follow the same theme it


would be similar to a conference call where someone speaks and all others listen.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 3
Cisco Certified Network Associate - Level 1

A Broadcast Domain is kind of like the range of your walkie-talkie or radio. If I'm
on channel eight talking with someone, everyone else in range will hear my
message and will probably listen to see if some one is talking to them. If you were
out of range you would not hear me at all. In other words my communication does
not affect anyone unless they are in my range. With the broadcast on the network,
the only systems that have to consider it are those in my broadcast domain. What
do I mean by consider it? Well a broadcast, as you know is a message sent out to
everyone. But not every system really needs to get the information being sent. But
every system has to look at the broadcast and consider if Ihey are an intended
recipient. So Ihe more broadcasls my system hast to look at the more my system
has to consider. So it's a good idea to break up our network into smaller broadcast
domains. It can improve network performance quite a bit. other possible causes of
traffic congestion are broadcast storms, multicasls, and just too litue bandwidth. A
router is used to break up broadcast domains.
Lastly, for now at least, a Collision Domain is part of a broadcast domain. Once
again consider the walkie-talkie. If I am talking on channel eight once again, and
you are in my range, can you talk on channel eight at the same time? Well if you
did most likely neither of our conversations would work out very well. On a network
there are mechanisms that keep this from happening. Your computer is not allowed
to use the network if it is currently being used. So every system has to wait wihile
computerA talks to computerB. Again this can slow network performance.
Switches break up collision domains Allowing C and D to talk wihile A and B are
talking.. How do they do this? Well, we shall see shortly.
In addition to leaming some terms we also need to know wihat some network
devices are and wihat they do.
The first is the HUB.

A hub is simply a device used to connect systems together. A hub is sometimes


referred to as a repeater. Signal goes in one port and is repeated out all olher
ports. The hub does not break up broadcast domains because it simply forwards all
traffic induding broadcasts. It does not break up collision domains because once
again, the traffic is forwarded out every port. So, if A and B are talking everyone
else wails.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 4
Cisco Certified Network Associate - Level 1

The next device we will look at is the Bridge.

A bridge connects usually two networks into one broadcast domain. (Some bridges
support more than two networiks) But each network would be a separate collision
domain. So if A and B were on the same network and C and D were on the other, A
and B could talk at the same time C and D were talking. However, if A were to send
a broadcast it would be forwarded through the bridge and C and D would have to
consider the broadcast just a B would.

Next we will consider the Switch.

A switch is similar to a bridge. A bridge connecting many networiks. In fact, each


port on a switch is a separate collision domain. But each of these ports is part of the
same broadcast domain. If a broadcast comes in one port, it is forwarded out all
other ports. But a unicast will only be sent out the appropriate port. We wilileam
how this is done later. For now it is enough to know one broadcast domain, many
collision domains.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 5
Cisco Certified Network Associate - Level 1

The last device we will look at now is the router.

~ • ......

A router could have many networks connected to it. These networks connect to
something called an interface. A router does not forward broadcasts. So networks
separated by a router are in different broadcast domains and different collision
domains. So will a router forward a unicas!? Well the short answer is yes, if it
needs to. The router will determine that through a process called routing. Imagine
that. Which we will discuss in detail later.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 6
Cisco Certified Network Associate - Level 1

1.2 OSI Model

The 051 model is the Open Systems Interconnection reference model. The 051
model was developed by the ISO. I love that. ISO is the International Organization
for Standardization. The beauty of standardization is that many vendors can
develop hardware and software that support networking and they can all play well
together. The 051 model breaks networking down into 7 layers. Yes Virginia. you
better know these layers and what happens there!

Application

Presentation

Session

Transport

Network

Data Link

Physical

Perhaps you will remember this slide. And you may remember the pneumonic
device I showed you. People Do Not Throw Sausage Pizza Away! Well use that or
make up your own because the order is important. And you need to be familiar with
what takes place at the various layers as well so let's go over that now.
We're going to cover the 051 layers like we're building a building which means we'll
start at the foundation or the Bottom.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 7
Cisco Certified Network Associate - Level 1

First is the Physical layer. Basically the physical layer is responsible for sending
and receiving ones and zeros or the bits. If you recall, all a hub does is repeat a
message out every port. So a hub works at the physical layer. It just repeats the
ones and zeros. The physical layer is pretty simple as far as what we need to
know.
The next layer is the Data Link layer. The Data Link layer is responsible for creating
Frames. This is done by creating a header containing source and destination
addresses that is added to the data sent down from the upper layers. Frames are
basically a series of ones and zeros passed down to the physical layer to send.
Anything received is passed up to the data link layer and the header is removed and
the data is passed up. The Data Link Layer is generally divided into two sub layers.
As follows:

Logical Link Control

Media Access Control

The Media Access Control defines how information is passed to the physical layer
and vice-versa. The Logical Link Layer is responsible for identifying the network
layer protocols in use. Switches and bridges work at the data link layer. In fact
you'll often hear the term layer 2 switching.
Layer three is the network layer. The network layer is responsible for addressing
and routing of information. The network layer creates packets and sends the
packets down to the data link layer. The network layer also receives packets from
the data link layer and strips of the network layer information from the sending
system and passes data up to the next layer..
The next layer is the transport layer. This is the layer where network connections
are established. But connectionless communication is also allowed at this layer.
Connection oriented communication basically means that for each segment of data
sent, the sender receives an acknowledgment from the receiver of the transmission.
You also need to understand the term window. The window size of the receiver is
the number of segments that it can receive at a time. So if the window size is 4
then our sender will send 4 segments. When the first is acknowledged, then it will
send one more. If two are acknowledged, it will send two more keeping the window
full. If we tried to send more than could be received then data would be lost and we

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 8
Cisco Certified Network Associate - Level 1

would have to retransmit. Delays for everyone. If we don't keep the window full
then we're not communicating as fast as possible. The idea is to keep data
streaming as fast a feasible.
The next layer is the Session layer. What you should remember at the session
layer is the protocols that work there.
Network File System (NFS)
Remote Procedure Call (RPC)
Structured Query Language (SQL)
X Window
AppleTalk Session Protocol
DNASCP
Above the session layer is the Presentation layer. This is where encryption and
compression occur. Think of this layer as preparing the data to be presented to the
application and know the technologies at play.
Image formats TIFF, JPEG, and PICT
Musical Instrument Digital Interface or MIDI
Moving Picture Experts Group or MPEG
Quick Time
Rich Text Format or RTF
The last or top layer is the Application layer and as you could probably guess this is
the layer that applications use to access the network. A web browser
communicates with the application layer to start communication across the web.
Remember that when two computers are communicating on the network, logically
each layer is communicating directly with its counterpart on the other system. i.e.
the network layer on A talks to the network layer on B. Of course physically that
data had to travel down to the physical layer on A then to B and up to the network
layer on B. This is done by encapsulating the data or adding headers at different
layers as the information is passed down the OSI stack and stripping the extra data
off as it travels back up on the destination system.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 9
Cisco Certified Network Associate - Level 1

Exercise 1.2.1
Fill in the 051 chart from bottom to top.

See previous slide to check your answers.

Exercise 1.2.2
Match the Network Device to the Layer it works at.

Switch Layer1
Hub Layer2
Router Layer3

Review section for answers.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 10
Cisco Certified Network Associate - Level 1

1.3 Ethernet
The most popular network access method in use today is Ethernet. There are many
possible reasons. It is easy to use and setup. And with the advent of Fast Ethernet
and Gigabit Ethernet, It can be extremely fast. Now, Ethernet is what is called a
contention media access method. What does that mean exactly? It means that
each system contends for the use of the network. Remember our discussion about
the walkie-talkies? Only one computer can talk at a time. How does a system using
ether net know? It uses CSMAlCD. What? That's Carrier Sense Multiple Access
with Collision Detection. Before your system sends data on the network it checks
the wire to see if it is in use. IF its in use then our system waits if not then we can
begin transmissions. Our system continues to monitor for any other systems trying
to start communication. If they attempt it then our system sends out a signal that
causes them to stop. Do you see what we were talking about now with the collision
domains and that if we break them up more than one system can talk at a time? I
hope so this stuff is supposed to build on itself.
We also need to understand Ethernet addresses. Generally we refer to these a
MAC addresses. MAC comes from Media Access Control. The MAC address is a
48 bit or 6 byte address. The first 3 bytes refer to the manufacturer of the adapter.
The last 3 are should be unique among each adapter they manufacture. The
importance of this MAC address will be discussed later as it plays a roll in IP
delivery and in Switching.
A couple more terms you will need to know. Half-Duplex and Full-Duplex. Ethernet
uses 4 wires. In half-duplex only 2 of the wires are in use. In full-duplex all four
wires are used. 2 for sending and 2 for receiving. What that means is that in a
perfect world using full-duplex in a 100Mb per second network means that we can
send at 100Mb and receive at 100Mb at the same time! Wow! Oh, by the way,
Hubs won't do this. So if you have a hub between the two systems they're going to
use half-duplex whether their respective adapters support full-duplex or not.
If you will recall, earlier as we discussed the OSI model, we mentioned that the data
link layer was responsible for creating frames. Ethernet actually supports four
frame types.
Ethernet II
IEEE 802.3
IEEE 802.2
SNAP
Ethernet_II is a simple frame type that includes a preamble, destination and source
MAC addresses and a type field to specify the network layer protocol within the
frame.
802.3 is also pretty simple in fact too simple. It has a preamble, destination and
source MAC addresses but no type. Why is that? Well it was developed by Novell

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 11
Cisco Certified Network Associate - Level 1

when the only network layer protocol used was IPX so there was no need to
differentiate. It was in use before it was classified by IEEE as 802.3.
802.2 is a helper for 802.3. It adds DSAP and SSAP fields and the information
needed to specify the network layer protocol in the data field of the frame.
SNAP also adds the DSAP and SSAP fields but they are always AA. And it
specifies the network layer protocol in a type field using the same type codes used
by Ethernet_".
We mentioned earlier that Ethernet was easy to work with. We need to now look at
some of the physical options that with have with Ethernet.

• 10Base2
10Mb per second Ethernet that ran over thinnet or coaxial cable, like what
plugs into a television. Thinnet supported cable lengths up to 185 meters
and used a BNC connector. No hub or switch required.

• 10Base5
Let met just say this the first number is the speed. So 10Mb per second over
in this case thicknet. A thicker coaxial cable that could support lengths up to
500 meters. Uses AUI connector, no hub or switch required.

• 10BaseT
Same speed. Uses twisted pair cable and an RJ-45 jack (looks like a wide
phone jack) 1OBaseT does require a hub or switch to connect all your
devices.

• 100BaseTX
Twisted pair, faster speeds.

• 100 BaseFX
Multi Mode Fiber optic cables.

• 1000BaseCX
Copper twisted pair

• 1000BaseT

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 12
Cisco Certified Network Associate - Level 1

Cat 5 twisted pair

• 1000BaseSX
Multi Mode Fiber.

• 1000BaseLX
Single Mode Fiber. Longest cable distances.

You'll also need to know the twisted pair cable types.

• Straight trough
• Rolled
• Crossover

1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8

The numbers represent positions on the RJ-45 Jack.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 13
Cisco Certified Network Associate - Level 1

A straight through cable is your run of the mill network cable used to connect a host
to a switch or hub.

1 1
~ .;;===:>-«~:: ~
4 4
5 5
6 6
7 7
8 8

The numbers represent positions on the RJ-45 Jack


A cross over cable is used to connect PC directly to PC, no hub. You could also
use the cross over to connect hub to hub, or switch to switch or hub to switch.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 14
Cisco Certified Network Associate - Level 1

1 1
2 2
3 3

~~==. 6~
4
5
6
7 7
8 8

The Rolled cable is used to connect your com port to the console port on a router or
switch. You connect using HyperTerminal and make sure you set your baud rate or
bps to 9600 and flow control to none.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 15
Cisco Certified Network Associate - Level 1

Exercise 1.3.1
Connect the pins to make a cross-over cable.

1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
Review the above graphics for answer.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 16
Cisco Certified Network Associate - Level 1

1.4 Wireless
Lastly, we need to take a look at wireless networking. The following are the
different types of wireless LANs.

Narrowband Wireless
Not very fast and requires proprietary equipment.

PCS
Consists of a whole group of communication technologies.

Narrowband PCS
Includes services like two-way paging and text based messaging. It is also
used to AMR which is automatic meter reading.

Broadband PCS
Broadband supports both voice and data transmission. You've no doubt
heard of PCS from the various wireless phone companies.

Satellite
Great for covering large distances and the speed is pretty good as
well, once connected. The problem then is in the delay of establishing the
connection. If you remain connected constantly then this is not a problem. If
however, you only want to connect when you transmit then the connection
delay could be problematic.

Infrared
The problem with infrared is the range. Connecting on the other hand is
quite fast.

Spread Spectrum Wireless


This is where your wireless network cards and access points fit in. You may
be familiar with the 802.11 standard for wireless. Distance is a bit of a problem and
speeds go up to 11 Mbs but is expected to go up.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 17
Cisco Certified Network Associate - Level 1

Review Questions

1. A ____ breaks up collision domains and broadcast domains.

2. A switch breaks up _ _ _ _ _ domains but not _ _ __


domains.

3. A _____ is sometimes called a repeater.

4. Switches work at layer _ or the 051 model which is called

5. Encryption takes place at the _ _ _ _ _ Iayer of the 051 model.

6. When connecting to the console port on your router or switch you should
use a _ _ _ _ cable.

7. A _ _ _ _ cable is used for connecting two pes without a hub or


switch.

8. 802.11 wireless network cards are _ _ _ _ _ _ _ _ _ wireless


LANs.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 18
Cisco Certified Network Associate - Level 1

2.0 TCP/IP
This is where the fun begins. Understanding the how TCP/IP works is essential to
success on the CCNA exam and being a CCNA. TCP/IP is the protocol of the
internet. In fact the I in TCP/IP stands for internet. How about that? TCP/IP was
developed by the Department of Defense. I'm not going to go into a detailed history
of TCP/IP because you don't need it. We will however want to see how TCP/IP
maps to OSI so we'll start off there.

2.1 The DoD Model


The Department of Defense model only has four layers and they map to the OSI
layers as follows.

Application

Processl
Presentation
Application <: - :>
Session

Host to Host <: :> Transport

Internet <: 00:::; , •

::> Network

Data Link
Network
Access
Physical

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 19
Cisco Certified Network Associate - Level 1

The Network Access layer maps to both the Data Link layer and the Physical layer
of the OSI model.

The Internet layer maps to the network layer. This layer is responsible for
addressing and routing. IP resides here.

The Host-to-Host layer maps to the Transport layer and controls the establishment
of connections if needed and the transmission of data between hosts. Of course we
will discuss this in more detail.

The Process/Application layer maps to the three upper layers of the OSI model and
we won't need to be as concerned about those layers as a CCNA because frankly
the routers and switches work at the lower levels. But we will look at a few things
dealing with the Process/Application layer.
TCP stands for transmission control protocol and IP is the internet protocol. At first
glance it might appear that TCP/IP then is made up of two protocols. That is not
even close to the truth. TCP/IP is a suite of many protocols and we're going to look
at many of them and where they fit in compared to the DoD model that we were just
introduced to. This is illustrated in the next Diagram.
At the top layer we have the following protocols.
FTP or the file transfer protocol. As the name suggests it is used for file transfers.
It uses reliable communication which basically means TCP.
TFTP is trivial file transfer protocol. It does basically the same thing but uses UDP
instead of TCP so it is connectionless and unreliable.
SNMP is the simple network management protocol and is used for managing
network devices across the network.
SMTP is the simple mail transfer protocol and as you could probably guess it is for
transferring mail. If you've set up an email client, you may have been asked to
supply the name of an SMTP server for outgoing mail.
LPD or line printer daemon is for print services.
NFS is the network file system and is for sharing files on the network.
Telnet provides terminal emulation. We will use tel net later to connect to routers
and switches for management.
X window is a technology to provide client-server applications using a graphical
user interface or GUI.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 20
Cisco Certified Network Associate - Level 1

Before we go on we want to look at a couple of services that just make it easier to


work with TCP/IP. As we will shortly see, for two computers to talk to each other
using TCP/IP they have to know each others IP address. A number that looks like
this 10.235.1.45. We will look at IP addresses in detail in this section but no matter
how much we understand the workings of the IP address, as human beings we can
still remember names better than numbers. So computers can also be assigned a
hostname. But remember that the name is just there for us humans. For
computer1 to talk to computer2 it has to resolve the name that we like to a number
that it needs. How can it do this? Well there's a couple of ways. You could create a
file called a host file. Which is a text file that maps names to numbers. In fact there
was a time wihen this was used with the internet and there was one host file for
every system on the internel. That was a long time ago. As the internet grew it just
got to hard to keep this file up to date. Another method was needed and the
solution was DNS or the domain name system. DNS is a hierarchical name
mapping system. To give you a simple example if I wanted to go to
www.joetucker.info my system would send a request to my DNS server. My DNS
server would contact a root name serer to get the IP address of a .info server. My
DNS server would then query the .info server to get the IP address of the
joetucker.info server. My server would then query the joetucker.info server to get
the ip address of www.joetucker.info and then respond to my system with that

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 21
Cisco Certified Network Associate - Level 1

address which of course is the number we were looking for so now the tow systems
can communicate.

Another service that makes TCP/IP easier is DHCP or the dynamic host
configuration protocol. With DHCP we don't have to manually assign IP addresses
to our hosts it is done dynamically or automatically. Which makes our life easier.
You see, you can't duplicate IP addresses on your network. Well you can but it
doesn't work. DHCP won't assign the same address twice so as long as you set it
up right you don't have to worry about the day to day typing errors.

Let's take a look now at the Host-to-Host layer protocols. There are two, TCP and
UDP. As mentioned earlier, TCP is the transmission control protocol. UDP is the
user datagram protocol. TCP is connection based. Which means that it uses
acknowledgements which means it is reliable. Because if our system doesn't get
the ack it will retransmit. When our system gets the ack, it knows that the
destination system received the information. That's what is meant by reliable. UDP
is unreliable. Well, not really it is just connectionless communication which means
there are no acknowledgements. But as long as the network is reliable, and today
they are pretty reliable, then we can be pretty sure that it was received but we don't
know for sure without the ack. To illustrate the point, if we're talking on the phone
and I say "did you hear me?" then you can respond yes or no. If I were a radio DJ
broadcasting to you I don't know if you are hearing me or not because I don't have a
way to receive acknowledgements. Unless you call me. But then it's like TCP
again. So UDP sends the message to an IP address and just hopes it gets there.
TCP makes sure with the use of acknowledgements. UDP is faster because it
doesn't have to establish a session. Also, TCP sequences the segments it sends
and UDP does not. TCP does this by using a sequence number so the recipient can
put it together in the right order. UDP just hopes for the best.
TCP and UDP both use port numbers to communicate with the upper layers.
Different applications use different port numbers. This way information will make it
up to the right application. So, when trying to communicate with a POP3 server it
will try to use UDP port 110. When this information is received by the server it
passes the information to port 110 where the POP3 server application is listeni ng
and it will be able to respond. We wouldn't want the web server to respond to pop3
requests or the ftp server to respond to tel net requests even though all these
services may be running on the same server so the port numbers distinguish the
traffic.
The following shows some of the well known ports.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 22
Cisco Certified Network Associate - Level 1

At the Internet layer of course IP is the main player but lers look at some of the
other protocols first.
First we'll look at ICMP or the Inlerne! Control Message Protocol. It is primarily for
messages with IP. Ping is one of the most often and common uses of ICMP. Some
other information provided by ICMP are Destination Unreachable, Buffer Full, and
the number of hops. Traceroute also uses ICMP to trace a route to a destination
address.
ARP is the Address Resolution Protocol. IP addresses are used for routing
messages. But final delivery of a message actually goes from MAC address to
MAC address. So the IP address has to be resolved to a MAC address. That is the
responsibility of ARP. ARP does this by checking its cache. If the Address
mapping is not in cache then a system will send an ARP broadcast. A message
sent to all MAC addresses with the destination IP address. The host that has that
IP address assigned will respond to the broadcast while all other systems ignore it.
With the response the original system can now deliver the message from MAC to
MAC.
RARP is reverse ARP. It slats with a MAC and resolves it to an IP address.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 23
Cisco Certified Network Associate - Level 1

2.2 The IP Address


Now as we begin our discussion of IP, we need to first understand the IP address.
The IP address is a 32 bit address. That simply means that it is made up of 32
ones and zeros. In the IP address the bits are separated into four groupings of
eight known as octets. To understand the IP address you need to know how to
count in binary so that is where we will begin.
In the binary number system there are only two numbers. A one and a zero. In our
world we use a decimal number system which has ten numbers they are
1,2,3,4,5,6,7,8,9, and the 0 giving us ten. Now the ten is written 10 combining a
one in the ten column and zero on the ones column. Okay so you know that. Well
in binary, you don't have a ten column and then a 100 column instead it's a two
column and then a four column.
Consider this. These first two are easy.
o in binary is a 0 in decimal
1 in binary is a 1 in decimal
Now it gets tricky. There is no 2 in binary so to write a 2 you would use 10.
Use this chart:

Decimal Binary Decimal Binary


1 1 15 1111
2 10 16 10000
3 11 17 10001
4 100 18 10010
5 101 19 10011
6 110 20 10100
7 111 21 10101
8 1000 22 10110
9 1001 23 10111
10 1010 24 11000
11 1011 25 11001
12 1100 26 11010
13 1101 27 11011
14 1110 28 11100

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 24
Cisco Certified Network Associate - Level 1

Now, because the IP address is separated into bytes or octets or eight digits, we
only need to go up to eight places. Now look at this slide.

1 1 1 1 1 1 1 1
128 64 32 16 8 4 2 1

1 o o o 1 1 o 1
128 + 0 + 0 + 0 + 8 + 4 + 0 + 1 = 141

IN this slide we see the place value of a one in each location. i.e. 1,2.4,8,16,32,64,
and 128. Then on the bottom we converted a binary number 10001101 into decimal
number 141. Now it's your tum.

Exercise 2.2.1
Convert the following numbers to decimal:

11001010

10000010

01000100

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 25
Cisco Certified Network Associate - Level 1

Using the same logic, you can reverse the process converting a decimal number to
binary. Once again, in an octet 255 is the largest decimal number you can have so
we don't need to go over that. Let's convert 201 to binary.

Using the previous diagram we'll start on the left so ... 128 is less than 20 so that will
be a one and not a zero
So
1
Then 128 plus 64 is 192 which is less than 201 so,
11
Then 192 plus 32 is too much so
110
Then 192 plus 16, too much but 8 is 100 so,
11001
Now all we need is one more so the 4 and 2 are zeros
1100100
Then add the last one and you have it.
11001001
That's the manual way. You can use your calculator to check the answer.

Exercise 2.2.2
Convert the following to Binary

137

24

111

255

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 26
Cisco Certified Network Associate - Level 1

So far we've only looked at one octet but the IP address is four octets separated by
a period. The conversion is basically the same but you have to do it four times.

Exercise 2.2.3
Convert the following to Decimal

11000111.00001001.10011010.10000101

00000011.10000011.11110001.10100011

Convert the following to Binary

10.57.183.99

23.67.1.224

Okay, so now you now the counting and what the numbers mean. But there is more
to it. Let's go back to our discussion of the IP address. It has two parts. Much like
a street address. If you have a street address of 50 Main St. there's two parts to
that. The street name and the building number. Okay, in the IP address the two
parts are the network portion and the host portion of the address. So part of the
address tells us what network the system is on and the other part tells us what host
it is on that network. But how do we know which digits belong to the network
portion and which belong to the host portion? The subnet mask tells us. The
subnet mask is also a 32 bit binary number but it has some restrictions. It always
starts with a one and has consecutive ones until the first zero. Once we have a
zero in the subnet mask then we have all zeros from there on. Through all the
remaining octets. And it is also separated in octets. A sample subnet mask would
be
255.255.0.0
Which in binary is?
11111111.11111111.00000000.00000000
Now here is the secret, the ones represent network bits and the zeros represent
host bits in the IP address.
Look at this example from the presentation.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 27
Cisco Certified Network Associate - Level 1

The IP address is 197.32.161.44 and Ihe subnet mask is 255.255.0.0

Convert both to binary and you can see what I mean. The ones on the bottom, line
up with network bits. Because the ones go through the first and second octet we
know that the first and second octet are part of the network address and the third
and fourth belong to the host address. To specify the network address you use
zeros for the host bits. So this address is on Ihe 197.32.0.0 network.
The way our computers figure this out is by performing a process known as anding.
A 1 and 1 = 1, 1 and 0 = 0, 0 and 1 = 0 so only two ones equal a one. Here's
another slide to look at:

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 28
Cisco Certified Network Associate - Level 1

Network address is 197.32.0.0

As you can see the Address is compared to the subnet mask with the anding
process and you get a result. You can then convert the result to decimal and you
have the Network address.

Exercise 2.2.4
What is the network address of the host with the following IP address and subnet
mask?

11001111.11111100.10101010.00101111 - IP address
11111111.11111111.11111111.00000000 - Subnet Mask

When two systems have the same network address that means they are on the
same network. That is important when we start to look at routing because an IP
host can only deliver packets to other local IP hosts! Oh my! So does that mean my
system can communicate with remote hosts (hosts on other networks)? No. we'lI
just need a router. We'lI get to that.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 29
Cisco Certified Network Associate - Level 1

Exercise 2.2.5
Are the following addresses on the same or different networks?

11100011.11111110.11000000.10100101 - IP Address
11111111.11111111.11111111.00000000 - Subnet mask

11100011.11111110.10000000.10100101 - IP Address
11111111.11111111.11111111.00000000 - Subnet Mask

What about these two?

11100011.11111110.11000000.10100101 - IP Address
11111111.00000000.00000000.00000000 - Subnet mask

11100011.10101110.01111000.10111111-IPAddress
11111111.00000000.00000000.00000000 - Subnet mask

By the way, the broadcast address for a network is all ones for the host portion.
Just the opposite of the all zeros which is the network address.
So if my network address is 145.27.0.0
The Broadcast address for the network would be 145.27.255.255

Exercise 2.2.6
What is the broadcast address for the network this host is on?

11100011.11111110.11000000.10100101 - IP Address
11111111.00000000.00000000.00000000 - Subnet mask

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 30
Cisco Certified Network Associate - Level 1

2.3 IP Classes
IP addresses are separated into classes. They are A,B, C, D, and E. D addresses
are used for multicasting and that's about all well cover on that. E addresses are
used for experimentation. That leaves us with A, B, and C.
Class A addresses only use the first octet for network addresses. What that means
is that a Class A network has over 16 million possible host addresses. That means
it's big. But there aren't a lot of them. A class A address always starts of with a 0
which means networks starting in a one - 127 would be class A but. ... 127 is
reserved for diagnostics so its 1 - 126. The default sunbet mask in a Class A
network is 255.0.0.0
Class B address are still pretty big with over 65 thousand possible hosts and there
are more of them. Because the first and second octet are used for network address.
The first octet in class B always starts off with a 10. So if the first octet is 128-191
then it is class B and the default subnet mask is 255.255.0.0.
Class C Addresses only allow for 254 hosts per network but there are many of
them. They all start off with 110 in the first octet or 192-223. and the default subnet
mask is 255.255.0.0.

Exercise 2.3.1
What is the default subnet mask of the following Addresses? Hint: what class are
they?

118.45.33.111

201.56.28.1

187.23.41.243

Each of the Classes has some address space left for private addressing In class A
anything that starts with a 10 is part of reserved address space. In class Bits
172.16 -172.31 and in class C its 192.168.0 to 192.168.255. So anyone can use
these addresses on their own private network without fear of them being advertised
across the internet.

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 31
Cisco Certified Network Associate - Level 1

Exercise 2.3.2

Using what we've discussed so far, are the following machines on the same
network or not? Assume default subnet mask.

10.23.76.1
10.197.0.23

What about these two?

220.32.34.5
220.32.43.119

Lastly, you need to have some understanding of Hexadecimal numbers as well.


Hex as it is often called is a 16 based number system ranging from 0-9 then A-F for
=
a total of 16 numbers but remember F 15. There's 16 different numbers but one of
them is the zero. When we see the hex numbers very often they will also be written
=
it bytes which means there'll be 2 digits. FF 255 in decimal and 11111111 in
binary. When converting to hex its easiest to go from binary watch this:

11110011 convert the first 4 bits then the second 4 so


F 3
Which of course is also 243 in decimal. (F =15 so 15 X 16 because hex is 16 based
+3 =
243)

Exercise 2.3.3
Convert the following Binary numbers to Hex.

11100011

11001000

00010011

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 32
Cisco Certified Network Associate - Level 1

Exercise 2.3.4
Convert these Hex numbers to Decimal.

EB

1F

33

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 33
Cisco Certified Network Associate - Level 1

Review Questions

1. The main protocol of the Internet layer is _ _ _ _ __

2. Messages are sent to the appropriate Application using _ __

3. An IP address is made up of __ bits separated into __ octets.

4. The __________ tells our system where the network portion of


an IP address ends and the Host portion begins.

5. To send a message to every host on a network you would use the


_ _ _ _ _ address for the network which is all _ for the host portion of
the address.

6. IP addresses that start with a 128 to 223 are Class networks.

7. Class C networks have a default subnet mask of

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 34
Cisco Certified Network Associate - Level 1

Answers
Exercise 2.2.1
11001010 202
10000010 130
01000100 68

Exercise 2.2.2
137 10001001
24 00011000
111 01101111
255 11111111

Exercise 2.2.3
11000111.00001001.10011010.10000101 199.9.153.133
00000011.10000011.11110001.10100011 3.131.241.163
10.57.183.99 00001010.00111001.10110111.01100011
23.67.1.224 00010111.01000011.00000001.11100000

Exercise 2.2.4
11001111.11111100.10101010.00000000

Exercise 2.2.5
Different
Same

Exercise 2.2.6
11100011.11111111.11111111.11111111

Exercise 2.3.1
118.45.33.111 255.0.0.0
201.56.28.1 255.255.255.0
187.23.41.243 255.255.0.0

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 35
Cisco Certified Network Associate - Level 1

Exercise 2.3.2
Same
Different

Exercise 2.3.3
1100011 11001000 00010011
1110 0011 1100 1000 0001 0011
E 3 C 8 1 3
E3 C8 13

Exercise 2.3.4
EB 235
1F 31
33 51

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 36
Cisco Certified Network Associate - Level 1

Copyright © 2004 by Makau Corporation Corp. All rights reserved.


Cisco Certified Network Associate - Level 1 37

Вам также может понравиться