Вы находитесь на странице: 1из 89

Please purchase a personal license.

CCNA Exploration version 4.0

Objectives

Identify the role of the Network Layer, as it describes communication from one end device to another end device Examine the most common Network Layer protocol, Internet Protocol (IP), and its features for providing connectionless and best-effort service Understand the principles used to guide the division or grouping of devices into networks Understand the hierarchical addressing of devices and how this allows communication between networks Understand the fundamentals of routes, next hop addresses and packet forwarding to a destination network
H c vi n m ng Bch Khoa - Website: www.bkacad.com 2

Labs

H c vi n m ng Bch Khoa - Website: www.bkacad.com

Introduction

End-to-End connections Host-to-Host

The protocols of the OSI model Network layer specify addressing and
processes that enable Transport layer data to be packaged and transported.

The Network layer encapsulation allows its contents to be passed to


the destination within a network or on another network with minimum overhead.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 4

Introduction

IPv4

IPv4 addresses are 32 bits long, written in dotted decimal, and separated by periods.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

Network Layer Communication from Host to Host

Layer 3 uses 4 basic processes: 1. Addressing 2. Encapsulation 3. Routing: Intermediary devices that connect the networks are called routers. The role of the router is to select paths for and direct packets toward their destination. This process is known as routing. 4. Decapsulation During the routing through an internetwork, the packet may traverse many intermediary devices. Each route that a packet takes to reach the next device is called a hop. As the packet is forwarded, its contents (the Transport layer PDU), remain intact until the destination host is reached.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 6

Network Layer Communication from Host to Host

Unlike the Transport layer (OSI Layer 4), which manages the data transport between the processes running on each end host, Network layer protocols specify the packet structure and processing used to carry the data from one host to another host. Operating without regard to the application data carried in each packet allows the Network layer to carry packets for multiple types of communications between multiple hosts.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

Network Layer Communication from Host to Host

Animation: 5.1.1-1
H c vi n m ng Bch Khoa - Website: www.bkacad.com 8

Network Layer Communication from Host to Host

H c vi n m ng Bch Khoa - Website: www.bkacad.com

Network Layer Protocols

Protocols implemented at the Network layer that carry user data include: Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Novell Internetwork Packet Exchange (IPX) AppleTalk Connectionless Network Service (CLNS/DECNet)

H c vi n m ng Bch Khoa - Website: www.bkacad.com

10

The IPv4 Protocol Example Network Layer Protocol

The Internet Protocol was designed as a protocol with low overhead. It provides only the functions that are necessary to deliver a packet
from a source to a destination over an interconnected system of networks. The protocol was not designed to track and manage the flow of packets. These functions are performed by other protocols in other layers. Basic characteristics:

H c vi n m ng Bch Khoa - Website: www.bkacad.com

11

The IPv4 Protocol Connectionless

H c vi n m ng Bch Khoa - Website: www.bkacad.com

12

The IPv4 Protocol Best Effort

Best Effort Service (unreliable) Describe the implications for the use of the IP protocol as it is considered an unreliable protocol Unreliable means simply that IP does not have the capability to manage, and recover from, undelivered or corrupt packets. Since protocols at other layers can manage reliability, IP is allowed to function very efficiently at the Network layer.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 13

Extra: Reliable vs. Best-effort Protocols


Protocol: I have the mechanism to know if the packet is received. Sender: Ive sent the packet #n.

In a reliable protocol, the receiver confirms (ACK) the packet its received. Example: TCP.

Receiver: I confirm that Ive received the packet #n.

In a best effort or non-reliable protocol, the receiver keeps silent instead. Example: IP, UDP.

Protocol: I do not have the mechanism to know if the packet is received. Sender: Ive sent the packet #n. Receiver: I keep silence upon receiving packets.

This is a classification of networking protocols. Non-reliable does not mean inaccurately data delivery.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 14

The IPv4 Protocol Media Independent


MTU (Token Ring, Ethernet) ?

IPv4 and IPv6 operate independently of the media that carry the data at lower layers of the protocol stack One major characteristic of the media that the Network layer considers: the maximum size of PDU that each medium can transport: the Maximum Transmission Unit (MTU). Part of the control communication between the Data Link layer and the Network layer is the establishment of a maximum size for the packet. In some cases, an intermediary device - usually a router - will need to split up a packet when forwarding it from one media to a media with a smaller MTU. This process is called fragmenting the packet or fragmentation.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 15

Packaging the Transport Layer PDU

The routing performed by these intermediary devices only considers the contents of the packet header that encapsulates the segment.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

16

IPv4 Packet Header

H c vi n m ng Bch Khoa - Website: www.bkacad.com

17

IPv4 Packet Header

H c vi n m ng Bch Khoa - Website: www.bkacad.com

18

IPv4 Packet Header

H c vi n m ng Bch Khoa - Website: www.bkacad.com

19

Extra: Type of Service

H c vi n m ng Bch Khoa - Website: www.bkacad.com

20

Extra: Flags

H c vi n m ng Bch Khoa - Website: www.bkacad.com

21

Extra: Protocols

H c vi n m ng Bch Khoa - Website: www.bkacad.com

22

Network Layer Fields

4 bits Indicates version of IP used IPv4: 0100; IPv6: 0110


H c vi n m ng Bch Khoa - Website: www.bkacad.com 23

Network Layer Fields

4 bits Indicates datagram header length in 32 bit words

H c vi n m ng Bch Khoa - Website: www.bkacad.com

24

Network Layer Fields

8 bits Specifies the level of importance that has been assigned by upper-layer protocol
H c vi n m ng Bch Khoa - Website: www.bkacad.com 25

Network Layer Fields

16 bits Specifies the length of the entire packet in bytes, including data and header
H c vi n m ng Bch Khoa - Website: www.bkacad.com 26

Network Layer Fields

16 bits Identifies the current datagram


H c vi n m ng Bch Khoa - Website: www.bkacad.com 27

Network Layer Fields

3 bits The second bit specifies if the packet can be fragmented; the last
bit specifying whether the packet is the last fragment in a series of fragmented packets.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

28

Network Layer Fields

13 bits Used to help piece together datagram fragments


H c vi n m ng Bch Khoa - Website: www.bkacad.com 29

Network Layer Fields

8 bits Specifies the number of hops a packet may travel. This


number is decreased by one as the packet travels through a router

H c vi n m ng Bch Khoa - Website: www.bkacad.com

30

Network Layer Fields

8 bits Indicates which upper-layer protocol, such as TCP(6) or


UDP(17), receives incoming packets after IP processing has been completed

H c vi n m ng Bch Khoa - Website: www.bkacad.com

31

Network Layer Fields

16 bits Helps ensure IP header integrity Not caculated for the encapsulation data

H c vi n m ng Bch Khoa - Website: www.bkacad.com

32

Network Layer Fields

32 bits Specifies the sending node IP address

H c vi n m ng Bch Khoa - Website: www.bkacad.com

33

Network Layer Fields

32 bits Specifies the receiving node IP address

H c vi n m ng Bch Khoa - Website: www.bkacad.com

34

Network Layer Fields

Variable length Allows IP to support various options, such as security

H c vi n m ng Bch Khoa - Website: www.bkacad.com

35

Network Layer Fields

Variable length Extra zeros are added to this field to ensure that the IP header is always a multiple of 32 bits.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 36

Network Layer Fields

Variable length up to 64 KB Contains upper-layer information

H c vi n m ng Bch Khoa - Website: www.bkacad.com

37

Network Layer Fields

H c vi n m ng Bch Khoa - Website: www.bkacad.com

38

Networks Dividing Hosts into Groups

H c vi n m ng Bch Khoa - Website: www.bkacad.com

39

Separating Hosts into Common Groups

Networks can be grouped based on factors that include: Geographic location Purpose Geographic Ownership

H c vi n m ng Bch Khoa - Website: www.bkacad.com

40

Separating Hosts into Common Groups


Purpose: Users who have similar tasks typically use common software, common tools, and have common traffic patterns.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

41

Separating Hosts into Common Groups


Purpose

H c vi n m ng Bch Khoa - Website: www.bkacad.com

42

Separating Hosts into Common Groups


Ownership: To assists in controlling access to the devices and data as well as the administration of the networks.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

43

Separating Hosts into Common Groups


Ownership

H c vi n m ng Bch Khoa - Website: www.bkacad.com

44

Why separate hosts into networks ?


Common issues with large networks are: Performance degradation, Security issues, Address Management

Improving Performance: Broadcast domain ?

H c vi n m ng Bch Khoa - Website: www.bkacad.com

45

Why separate hosts into networks ?

Increase network security

H c vi n m ng Bch Khoa - Website: www.bkacad.com

46

Why separate hosts into networks ?

Increase network security

H c vi n m ng Bch Khoa - Website: www.bkacad.com

47

Why separate hosts into networks ?

Increase network security

H c vi n m ng Bch Khoa - Website: www.bkacad.com

48

Why separate hosts into networks ?

Address management: To expect each host to know the address of every other host would impose a processing burden on these network devices that would severely degrade their performance.

ARP table ? Gateway ?

H c vi n m ng Bch Khoa - Website: www.bkacad.com

49

How do we separate hosts into networks ?

Hierarchical addressing: solves the problem of devices communicating across networks of networks

H c vi n m ng Bch Khoa - Website: www.bkacad.com

50

How do we separate hosts into networks ?

H c vi n m ng Bch Khoa - Website: www.bkacad.com

51

Dividing the networks - Networks from networks

If a large network has to be divided, additional layers of addressing can be created. Using hierarchical addressing means that the higher levels of the address are retained; with a subnetwork level and then the host level.

Subnet Mask ? Prefix length ?

H c vi n m ng Bch Khoa - Website: www.bkacad.com

52

Extra: Classes of IP Addresses

Class A addresses are assigned to larger networks. Class B addresses are used for medium-sized networks, and Class C for small networks.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

53

H c vi n m ng Bch Khoa - Website: www.bkacad.com

54

Routing How Our Data Packets are Handled

H c vi n m ng Bch Khoa - Website: www.bkacad.com

55

Routing Protocols

Routing is an OSI Layer 3 function. Routing is the process of finding the most efficient path from one device to another.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

56

Routing protocol

Provides processes for sharing route information Examples:


Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and Enhanced IGRP (EIGRP)
H c vi n m ng Bch Khoa - Website: www.bkacad.com 57

Supporting communication outside our network



To communicate with a device on another network, a host uses the address of this gateway, or default gateway, to forward a packet outside the local network. The router also needs a route that defines where to forward the packet next. This is called the next-hop address.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

58

Fundamentals of Routes, Next Hop Addresses and Packet Forwarding

If the destination host is in the same network as the source host, the packet is delivered between the two hosts on the local media without the need for a router. If the destination host and source host are not in the same network, the packet may be carrying a Transport layer PDU across many networks and through many routers.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

59

IP Packet Carrying Data End-to-End

H c vi n m ng Bch Khoa - Website: www.bkacad.com

60

IP Packet Carrying Data End-to-End

H c vi n m ng Bch Khoa - Website: www.bkacad.com

61

IP Packet Carrying Data End-to-End

H c vi n m ng Bch Khoa - Website: www.bkacad.com

62

IP Packet Carrying Data End-to-End

H c vi n m ng Bch Khoa - Website: www.bkacad.com

63

IP Packet Carrying Data End-to-End

H c vi n m ng Bch Khoa - Website: www.bkacad.com

64

A gateway The way out of our network

H c vi n m ng Bch Khoa - Website: www.bkacad.com

65

A gateway The way out of our network

H c vi n m ng Bch Khoa - Website: www.bkacad.com

66

A gateway The way out of our network


A router makes a forwarding decision for each packet that arrives at
the gateway interface. This forwarding process is referred to as routing.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

67

Routing table
The routing table stores information about connected and remote
networks. Routes in a routing table have 3 main features: Destination network Next-hop Metric

H c vi n m ng Bch Khoa - Website: www.bkacad.com

68

A Route The Path to a Network

Default route ?

H c vi n m ng Bch Khoa - Website: www.bkacad.com

69

Host Routing Table


C:/> netstat -r

A host creates the routes used to forward the packets it originates. These routes are derived from the connected network and the configuration of the default gateway. Hosts automatically add all connected networks to the routes. These routes for the local networks allow packets to be delivered to hosts that are connected to these networks.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 70

Host Routing Table

H c vi n m ng Bch Khoa - Website: www.bkacad.com

71

Routing table entries

H c vi n m ng Bch Khoa - Website: www.bkacad.com

72

Routing table entries

H c vi n m ng Bch Khoa - Website: www.bkacad.com

73

Default route

A default route is a route that will match all destination networks.


In IPv4 networks, the address 0.0.0.0/0 is used for this purpose. The default route is used to forward packets for which there is no entry in the routing table for the destination network. Packets with a destination network address that does not match a more specific route in the routing table are forwarded to the next-hop router associated with the default route.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 74

Packet forwarding
Routing is done packet-by-packet and hop-by-hop. Each packet is
treated independently in each router along the path. The router will do one of 3 things with the packet: Forward it to the next-hop router; Forward it to the destination host; Drop it.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

75

Packet forwarding

If the routing table does not contain a more specific route entry for an arriving packet, the packet is forwarded to the interface indicated by a default route, if one exists. The default route is also known as the Gateway of Last Resort.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

76

Packet forwarding

H c vi n m ng Bch Khoa - Website: www.bkacad.com

77

Routing Processes How Routes are Learned

H c vi n m ng Bch Khoa - Website: www.bkacad.com

78

Routing protocol Sharing the route

H c vi n m ng Bch Khoa - Website: www.bkacad.com

79

Static Routing
Static route: routes to remote networks with the associated next hops
can be manually configured on the router. A default route can also be statically configured.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

80

Dynamic Routing

Routing protocols are the set of rules by which routers dynamically share their routing information.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

81

Routing protocol

H c vi n m ng Bch Khoa - Website: www.bkacad.com

82

IGP and EGP

Autonomous system is a network or set of networks under common administrative control. An autonomous system consists of routers that present a consistent view of routing to the external world. Interior Gateway Protocols (IGP): route data within an autonomous system. Eg: RIP and RIPv2; IGRP; EIGRP; OSPF; IS-IS; Exterior Gateway Protocols (EGP): route data between autonomous systems. Eg: BGP

H c vi n m ng Bch Khoa - Website: www.bkacad.com

83

Link state and Distance Vector

The distance-vector routing approach determines the distance and direction, vector, to any link in the internetwork. Routers using distance-vector algorithms send all or part of their routing table entries to adjacent routers on a periodic basis. This happens even if there are no changes in the network. Eg: RIP, IGRP, EIGRP Link state routing protocols send periodic update at longer time interval (30), Flood update only when there is a change in topology. Link state use their database to creat routing table. Eg: OSPF, IS-IS
H c vi n m ng Bch Khoa - Website: www.bkacad.com 84

Lab: Segment Broadcast Domains

In this activity, the replacement of a switch with a router breaks one


large broadcast domain into two more manageable ones.

H c vi n m ng Bch Khoa - Website: www.bkacad.com

85

Lab: Dynamic Routing- Example 5.4.3.2

H c vi n m ng Bch Khoa - Website: www.bkacad.com

86

Terminology

Broadcasts are contained within a network. In this context, a network is also known as a broadcast domain. For all other destinations, the hosts only need to know the address of an intermediary device, to which they send packets for all other destinations addresses. This intermediary device is called a gateway. The gateway is a router on a network that serves as an exit from that network. The number of bits of an address used as the network portion is called the prefix length. The router also needs a route that defines where to forward the packet next. This is called the next-hop address. If a route is available to the router, the router will forward the packet to the next-hop router that offers a path to the destination network. The default route is used when the destination network is not represented by any other route in the routing table. Hosts typically have an ARP table, which is a cache of IP/MAC address mappings. Hosts typically have an ARP table, which is a cache of IP/MAC address mappings. When you want to send a packet to a local host, your software looks up the IP in the ARP cache, gets the MAC address, constructs an Ethernet header with the correct source/destination MAC addresses, and sends that.
H c vi n m ng Bch Khoa - Website: www.bkacad.com 87

Summary

H c vi n m ng Bch Khoa - Website: www.bkacad.com

88

H c vi n m ng Bch Khoa - Website: www.bkacad.com

89

Вам также может понравиться