Layered
Protocol Models
The TCP/IP
Layered
Architecture
Model
Layered Protocol Models
The TCP/IP Layered Architecture Model
Data Encapsulation
Communicating the Messages
Segmenting message benefits
Different conversations can be interleaved
Increased reliability of network communications
Segmenting message disadvantage
Increased level of complexity
Reference Models
Benefits of Using a Layered Model
Presentation: format
Session : timeout
Protocol Model
A model that describes an actual implementation
Reference Model
Used to describe generic networking processes
Comparin
g the OSI
and TCP/IP
Models
The Physical Layer
The Physical
Layer
General
Purpose
Sending
Accepts a frame from the Data Link
Layer
Transmits as binary bits over media
between devices
Receiving
Receives a signal over a common
media
Converts back into a sequence of bits
Passes to the Data Link Layer as a
frame for processing
MAC and
IP
MAC Address
This address does not change
Similar to the name of a person
Known as physical address because physically
assigned to the host NIC
IP Address
Similar to the address of a person
Based on where the host is actually located
Known as a logical address because assigned
logically
Assigned to each host by a network administrator
Both the physical MAC and logical IP addresses are
required for a computer to communicate just like
both the name and address of a person are required
to send a letter.
End-to-End Connectivity, MAC,
and IP
Media Access Control
Physical vs Logical
Physical
Arrangement of nodes and the physical
connections between them
What the network looks like
Logical
Virtual arrangement of nodes independent
of their physical connectivity
The Data Link Layer sees the Logical
Topology
Influences network framing and MAC
Common
Physical
WAN
Topologies
Half- and Full-Duplex
Half-Duplex
Sent or receive only
Full-Duplex
Sent or receive both at same time
Contention-Based Access
Characteristics
Stations can transmit at
any time
Collision exist
There are mechanisms to
resolve contention for the
media
Contention-Based
Technologies
CSMA/CD for 802.3
Ethernet networks
CSMA/CA for 802.11
wireless networks
Carrier Sense Multiple
Access
Collision Detection
Collision Avoidance
Controlled Access
Characteristics
Only one station can
transmit at a time
Devices wanting to
transmit must wait their
turn
No collisions
May use a token passing
method
Contention-Based
Technologies
Token Ring (IEEE 802.5)
Fiber Distributed Data
Interface (FDDI)
LLC and MAC Sublayers
Logical-Link Layer (LLC)
Handles communication between upper
and lower layers
Media Access Control (MAC)
Constitutes the lower sublayer of the
data link layer
Implemented by hardware, typically in
the computer NIC
Two primary responsibilities:
Data encapsulation
Media access control
CSMA/CD
Carrier Sense Multiple Access with Collision Detection
Multiple Access
Bus topology
Shared Medium
Carrier Sense
Listen to medium
Dont send until medium is free
Collision Detection
Detect when collisions occur
CSMA/CA
Carrier Sense Multiple Access with Collision Avoidance
Collision Avoidance
After media is free send notification of stations intent to use
medium Wait for response from controller Transmit
Ethernet
Encapsulation
Preamble
Synchronisation signal (0101010)
Allows receivers to synchronise clocks for rest of
frame
Addresses
Who is sending/receiving this frame
Type
Tells Ethernet layer what Network Layer Protocol
is carried in Data
Frame check
Check for errors
Unicast MAC Address
Broadcast MAC Address
Collision
Domains
Collisions still happen on a shared network
Probability increases with number of hosts
Define a collision domain
Portion of network where, if two hosts
want to talk at the same time, a
collision will occur
An entire shared network is a Collision
Domain
Any two hosts on a hub/sharedsegment have the possibility of
colliding
Ethernet packets contain a source
MAC address
Bridges
Operation
By listening to traffic we can determine
where each Ethernet host is connected to
the network
A bridge connects two shared-Ethernet
segments together
Learns which MAC addresses are on each
side of the switch
Switch MAC Address Table
1. The switch receives a broadcast frame from PC 1 on Port 1
2. Store the source MAC address and switch port into the address table
3. Destination address is broadcast flood the frame to all ports, except the port
on which it received the frame.
4. Destination device replies to broadcast with a unicast addressed to PC 1.
5. Store the source MAC address of PC 2 and switch port into the address table
6. Destination address and associated port is found in the MAC address table
7. The switch can now forward frames between source and destination devices
without flooding
Store-andforward
Cut-through Switching
Fast-forward switching:
Lowest level of latency
Immediately forwards a packet
after reading the destination
address
Typical cut-through method of
switching
Fragment-free switching:
Switch stores the first 64 bytes
of the frame before Forwarding
Most network errors and
collisions occur during the first
64 bytes
Memory Buffering on Switches
VLAN
Definitions
A VLAN is a logical partition of a Layer
2 network
Multiple partitions (VLANs) can be
created
Each VLAN is a broadcast domain
VLANs are mutually isolated and
packets can only pass between them
via a Layer 3 device
The hosts grouped within a VLAN are
typically unaware of the VLANs
existence
Benefits of
VLANs
Security
Cost reduction
Better performance
Shrink broadcast domains
VLAN Ranges on Catalyst Switches
Cisco Catalyst 2960 and 3560 Series switches support over 4,000 VLANs
VLANs are split into two categories:
Normal range VLANs
VLAN numbers from 1 to 1,005
Configurations stored in the vlan.dat (in the flash memory)
Extended Range VLANs
VLAN numbers from 1,006 to 4,096
Configurations stored in the running configuration (NVRAM)
Some limitations to Extended VLANs should limit use to normal VLANs
VLAN
Access
Ports
Port can only belong to one VLAN
Traffic is normal untagged Ethernet
frames
Network devices are unaware of VLAN
Network devices see normal Ethernet
network
Traffic is restricted based on
Only traffic for that VLAN
Contents of switch CAM Table
VLAN Membership
Static VLAN
Dynamic VLAN
Ports manually assigned
Membership is configured
to a VLAN
using a VMPS VLAN
Configured with:
Membership Policy Server
switchport access vlan Based on source Mac
XX
address of device
Requires reconfiguration if
circumstances change
VLAN Trunks
Inefficient to connect switches using Access Ports need one
connection for each VLAN
Trunks allow a single connection to carry traffic of multiple VLANs
Traffic is still segmented
Frames are tagged to allow receiving switch to know which VLAN
traffic belongs to
Native VLANs and 802.1Q Tagging
Frames that belong to the native VLAN are not tagged
Frames received untagged remain untagged and are placed in
the native VLAN when forwarded
If there are no ports associated to the native VLAN and no other
trunk links, an untagged frame is dropped
In Cisco switches, the native VLAN is VLAN 1, by default
Cisco 3650 switches need to have trunking mode configured
before any trunk can be established
Introduction to Dynamic Trunk
Protocol (DTP)
Cisco solution to automatically configure switch port state
Dynamic Trunking Protocol (DTP) manages trunk negotiation
Cisco proprietary protocol
Default, enabled in Cisco Catalyst 2960 and 3560 switches
The default DTP configuration for Cisco Catalyst 2960 and 3560
switches is dynamic auto
Data and Default VLANs
Data VLAN
Default VLAN
Configured to Carry data
Default setting on
traffic
unconfigured switch
User VLANs for networked Cisco VLAN 1
devices and computers
Same features as other
VLANs except it cannot be
deleted or renamed
Default Carries all Layer
2 control traffic
Data and Default VLANs
Native VLAN
Management VLAN
Backwards compatibility
Default VLAN 1
with other switches
Assigned with IP address
Non tagged frames on an
for network layer
Ethernet Trunk will be
connectivity to switch
assumed to belong to this
VLAN
Best practice change
from VLAN 1
Voice VLANs
Default Gateway
Hosts must maintain their own, local, routing table to ensure that
network layer packets are directed to the correct destination network.
The local table of the host typically contains:
Direct connection
Local network route
Local default route
All end hosts need a gateway address if they need to communicate with
hosts outside the local Link Layer network