CCNA读书笔记(一)
Chapter I. Internetworking
一.Internetworking Basic
Network segment:breaking up a really big network into a number of smaller ones.You do this by using devices like routers,switchesand bridges.
Hub = multiport repeater Switch = multiport bridges
Hub的一些缺陷
1.one collision commonly casue LAN traffic congestion
2.too many hosts in a broadcast domain
3.broadcast storms
4.multicasting
5.low bandwidth
6.adding hubs for connecting to the network
7.a bunch of ARP or IPX traffic
router:break up a broadcast domain
switch:break up a collision domain
collision domain:an ethernet term,one particular device sends a packet on a netwok segment,forcing every other devices on that same segment to pay attention to it.
advantages of using routers in your network
1.They don't forward broadcast by default
2.They can filter the network based on layer 3(network layer)
four router function in your network
1.packet switching
2.packet filtering
3.interwork communicatoin
4.path selection
二.Internetworking models
In the 1970s,the Open System Interconnection(osi) reference model was created by Internation Organzation for Standardizatoin(ISO) to break this barrier.
the layered approach layered architecture
advantages of reference models(hierarchical)
1.It divides the network communication process into smaller and simpler components,thus aiding component development,design,and troubshooting.
2.It allows multiple-vender developmentthrough standardization of network components.
3.It encourages industry standardization by defining what functions occur at each layer of the model.
4.It allows various types of network hardware and software to communicate.
5.It presents change in one layer from affecting other layers,so it does not hamper development.
the OSI reference model
application layer presentation layer session layer transport layer network layer data link layer physical layer
涉及着七层的网络设备
network management
station web and application servers
gateway network
hosts
the application layer The application layer is acting as an interfance between the actual application programs.
the presentation layer The presentation layer gets its name from its purpose:It presents data to the application layer and is responsible for data translation and code formatting.Tasks like data compression,decompression,encryption,and decryption are associated with this layer.
the session layer The session layer is responsible for setting up,managing,and then tearing down sessions between presentation layer entities.
the transport layer They provide end-to-end transport services and can establish a logical connection between the sending host and destination host on an internetwork.
flow control
Data integrity is ensured at the transport layer by maintaining flow control and by allowing users to request reliable data transport between system
flow control:bufering,windowing,congestion avoidence advantages of flow control
1.The segment delivered are acknowledged back to the sender upon their reception
2.Any segments not aacknowledged are retransmitted.
3.Segments are sequences back into their proper order upon arrival at their destination.
4.A manageable data flow is maintained in order to avoid congestion,overloading,and data loss.
Connection-Oriented Communication
a Connection-Oriented session:setup or a three-way handshake sender receiver
----------------------------------------------->>>>
synchronize
<<<<------------------------------------------->>>>
negotitate connection
<<<<-----------------------------------------------
synchronize
----------------------------------------------->>>>
Acknowledged
---------------------------------------------------
connection established
---------------------------------------------------
<<<<------------------------------------------->>>>
data transfer
A service is considered connection-oriented.
1.A virtual circuit is set up (a three-way handshake)
2.It uses sequencing
3.It uses acknowledgments
4.It uses flow control
Windowing The quantity of data segments that the transmitting machine is allowed to send without receiving an acknowledgement for them is called a window.
Acknowledgments positive acknowledgment with retransmission-a technique that require a receiving machine to communicate with the transmitting source by sending an acknowledgment message back to sender when it receives data.
the network layer The network layer manage device addressing tracks the location of devices on the network,and determines the best way to more data. two types of packets are used at the network layer 1.data packets Protocols used to support data traffic are called routed protocols. 2.route updata packets Protocol that send route update packets are called routing protocols.
metric:the distance to the remote network. different routing protocols use different ways of computing this distance. rip:hop count
Router: 1.Routers,by default,will not forward any broadcast or multicast packet. 2.Routers use the logical address in a network layer header to determine the next hop router to forward the packet to. 3.Router can use access lists,created by an administrator,to cotrol security on the types of packets that are allowed to enter or exit an interface. 4.Routers can provide layer 2 bridging functionsif needed and can simultaneously route through the same interface. 5.Layer 3 devices provide connections between virtual LANs. 6.Routers can provide quality of service(QoS) for specific types of network traffic.
The Data Link Layer The Data Link Layer provides the physical transmission of data and handles error notificatoin,network topology,and flow control.
The Data link layer formats the message into pieces.each called a data frame, and adds a customized header containing the hardware destination and source address. media access control(MAC):Dedine how packets are placed on the media. logical link control(LLC):Responsible for identifying network layer protocols and then encapsulating them.
The Physical layer It sends bits and receives bits. data termial equipment(DTE) data communication equipment(DCE)
Ethernet Network Ethernet Network is a contention media accessmethod that all host on a network to share the same bandwidth of a link.
(CSMA/CD) Ethernet networking uses Carrier Sense Mutiple Access with collision Detection,a protocol that helps devices share the bandwidth eventy without having two device transmit at the same time on the network medium.
Half- and Full-Duplex ethernet 1.There are no collision in full-duplex mode. 2.A dedicated switch port is required for each full-duplex node. 3.The host network card and the switch port must be capable of operating in full-duolex mode.
ethernet at the data link layer 1.ethernet address Media Access Control(MAC)-48bit(6byte) IEEE Organizationally unique identifier(OUI) 2.Ethernet Frames It is responsible for combining bits into bytes and bytes into frames
ethernet at the physical layer unshielded twisted-pare(UTP) cabling(RJ45) an 8-pin modular connector
ethernet cabling straight-through cable 1.host to switch or hub 2.router to switch or hub crossover cable 1.switch to switch 2.hub to hub 3.hub to switch 4.router direct to host 1 to 3 ;2 to 6 Rolled cable a host to a router console serial communication(com) port
Data Encapsulation segment>packet>frame>bits
The Cisco Three-Layer Hierarchical model The Core Layer The Distribution Layer The Access Layer