semester 1 final study guide - college of dupage - in a peer-to-peer network, two or more computers...

13
SEMESTER 1 Final Study Guide Drippy Sweet Pancakes For Breakfast (Encapsulation) Please Do Not Throw Sausage Pizza Away (OSI model) Never Ingest Tainted Apple (TCP/IP model) * Make sure you know the basic functions of each layer for the above models. * Router is residing on which layer of OSI model? * Switch is residing on which layer of OSI model? * When a connectionless protocols is used to send mission critical data (such as TFTP protocol), how does the TFTP supplement this connectionless protocol and guaranty the delivery of all the mission critical data? * When a data going through the encapsulation process from the top to the bottom, it creates port number and then encapsulation it inside the packet. Then packet creates IP address and then encapsulated in the frame. Then frame create the MAC address and then turn it into bits. * When a data going through the reverse encapsulation process from the bottom to the top, it will only accept and pass the frame to the network layer, if the MAC address matches with the host’s MAC address (or match the broadcast address). Also, it will only accept and pass the packet to the transport layer, if the IP address matches with the host’s IP address (or match the broadcast address). * Can you identify what layer of the OSI each of the following diagrams is located? You need to be able to identity some of the fields from each of the diagram that we spend a lot of time to go over them in the class.

Upload: lyngoc

Post on 17-Mar-2018

215 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

SEMESTER 1 Final Study Guide

Drippy Sweet Pancakes For Breakfast (Encapsulation)

Please Do Not Throw Sausage Pizza Away (OSI model) Never Ingest Tainted Apple (TCP/IP model)

* Make sure you know the basic functions of each layer for the above models.

* Router is residing on which layer of OSI model?

* Switch is residing on which layer of OSI model?

* When a connectionless protocols is used to send mission critical data (such as TFTP protocol),

how does the TFTP supplement this connectionless protocol and guaranty the delivery of all the

mission critical data?

* When a data going through the encapsulation process from the top to the bottom, it creates port

number and then encapsulation it inside the packet. Then packet creates IP address and then

encapsulated in the frame. Then frame create the MAC address and then turn it into bits.

* When a data going through the reverse encapsulation process from the bottom to the top, it

will only accept and pass the frame to the network layer, if the MAC address matches with the

host’s MAC address (or match the broadcast address). Also, it will only accept and pass the

packet to the transport layer, if the IP address matches with the host’s IP address (or match the

broadcast address).

* Can you identify what layer of the OSI each of the following diagrams is located? You need to

be able to identity some of the fields from each of the diagram that we spend a lot of time to go

over them in the class.

Page 2: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* Make sure you know all the technical name of all the devices and all the protocols needed for

each link?

- MUA SMTP MTA SMTP MTA MDA POP MUA (Tony: Know the sequence.)

* The http://www.cisco.com/index.html example

• http (the protocol or scheme)

• www.cisco.com (the server name)

• A web page named index.html on a server.

* Port numbers:

Well Known Ports (Numbers 0 to 1023) - These numbers are reserved for services and

applications.

Registered Ports (Numbers 1024 to 49151) - These port numbers are assigned to user

processes or applications.

Dynamic or Private Ports (Numbers 49152 to 65535) - Also known as Ephemeral Ports,

these are usually assigned dynamically to client applications when initiating a connection.

Here is another one that I think the answer key is wrong again. The question asks

which range of the port dynamically assigned to the client’s when initiated a

connection to the server, but the range 49152 to 65535 is not one of the choices.

Therefore, you should pick 1024 to 49151 as the correct answer.

Peer-to-Peer Networks

Page 3: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

– In a peer-to-peer network, two or more computers are connected via a network

and can share resources (such as printers and files) without having a dedicated

server.

– Every connected end device (known as a peer) can function as either a server or a

client.

* The Client-Server Model

– the device requesting the information is called a client

– the device responding to the request is called a server.

– One example of a client/server network is a corporate environment where

employees use a company e-mail server to send, receive and store e-mail.

* The primary functions specified by all Transport layer protocols include:

– Segmentation and Reassembly

– Conversation Multiplexing

* In addition to the basic functions of data segmentation and reassembly, some protocols at the

Transport layer provide:

– Connection-oriented conversations

– Reliable delivery

– Ordered data reconstruction

– Flow control

* User Datagram Protocol (UDP)

– It providing for low overhead data delivery.

– The pieces of communication in UDP are called datagrams.

– These datagrams are sent as "best effort".

* Transmission Control Protocol (TCP)

– TCP is a connection-oriented protocol.

– TCP incurs additional overhead to gain functions.

– Additional functions specified by TCP are the same order delivery, reliable delivery, and

flow control.

* The TCP and UDP based services keep track of the various applications that are

communicating. Both TCP and UDP have header fields that can uniquely identify these

applications.

These unique identifiers are the port numbers.

* Port Addressing: netstat command

Sometimes it is necessary to know which active TCP connections are open and running

on a networked host.

Netstat is an important network utility that can be used to verify those connections.

Netstat lists:

– the protocol in use,

– the local address and port number,

– the foreign address and port number,

– the state of the connection.

Page 4: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* You need to know how the segment sequence number and acknowledgement number are used

to confirm receipt of the bytes of data in the segments.

For example: The telnet example covered in the lecture.

– The host on the left is sending data containing 10 bytes of data and a sequence

number equal to 1 in the header.

– The on the right receives the segment and determines that the sequence number is

1 and that it has 10 bytes of data.

– When the sending host on the left receives this acknowledgement, it can now send

the next segment starting with byte number 11.

* IP Address:

32 bits

Each end device must have a unique address

The Internet consists of millions of hosts, each of which is identified by its unique

Network layer address.

Layer 3 addresses supply the network portion of the address. Routers forward packets

between networks by referring only to the part of the Network layer address that is

required to direct the packet toward the destination network

Page 5: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* What are the characteristics of “network layer address” (or some people call it network

address)?

Routers forward packets between networks by referring only to the part of the Network

layer address that is required to direct the packet toward the destination network.

Network layer addressing schemes are hierarchical.

The network address indicates the network on which each unique host address is located.

* A router makes a forwarding decision for each packet that arrives at the gateway interface.

This forwarding process is referred to as routing.

If a route to a destination network does not exist, the packet cannot be forwarded.

o [Tony]: Dropped the packet

* You will use the following tables for multiple questions. * 255.255.255.192 (or /26) 0 - 63 64 - 127 128 - 191 192 - 255 (with multiplier of 64) * 255.255.255.224 (or /27) 0 - 31 32 - 63 64 - 95 96 - 127 128 - 159 160 - 191 192 - 223 224 - 255 (with multiplier of 32)

* 255.255.255.240 (or /28) 0 - 15 16 - 31 32 - 47 48 - 63 64 - 79 80 - 95 96 - 111 112 - 127 And so on (with multiplier of 16)

Page 6: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* 255.255.255.248 (or /29) 0 - 7 8 - 15 16 - 23 24 - 31 32 - 39 40 - 47 48 - 55 56 - 63 And so on (with multiplier of 8)

* What is the subnet mask (you are allowed to use only one subnet mask) that can be used to

cover for all IP addresses from 10.16.128.0 through 10.16.159.255? * You will be presented a list of IP address and are expected to pick up: - Usable (assignable) host addresses * Study the reference table included above. - Network IP address

* Study the reference table included above. - Broadcast IP address * Study the reference table included above.

* Public and Private Addresses Public Addresses

– The majority of the addresses are public addresses.

– These addresses are designed to be used in the hosts that are publicly accessible

from the Internet.

Private addresses

– There are blocks of addresses that require no Internet access.

• 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8)

• 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12)

• 192.168.0.0 to 192.168.255.255 (192.168.0.0 /16)

Network Address Translation (NAT)

– With services to translate private addresses to public addresses, hosts on a

privately addressed network can have access to resources across the Internet.

* What is the subnet mask for the range of address from 10.10.128.0 through 10.10.159.255?

Page 7: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* 255.255.0.0: How many hosts are in this subnet? * 255.255.255.0: How many hosts are in this subnet? * 255.255.254.0: How many hosts are in this subnet? * 255.255.248.0: How many hosts are in this subnet? * 255.255.224.0: How many hosts are in this subnet?

* Testing Connectivity to Remote LAN

Ping is used to indicate the connectivity between two hosts.

Traceroute (tracert) is a utility that allows us to observe the path between these hosts.

– The trace generates a list of hops that were successfully reached along the path.

– This list can provide us with important verification and troubleshooting

information.

* Pinging the Local Loopback One case is for testing the internal configuration of IP on the local host. To perform this test, we ping the special reserve address of local loopback

(127.0.0.1). A response from 127.0.0.1 indicates that IP is properly installed on the host. This response is not, however, an indication that the addresses, masks, or

gateways are properly configured. Nor does it indicate anything about the status of the lower layer of the network stack.

* The characteristics of data link layer.

The Data Link layer prepares a packet for transport across the local media by

encapsulating it with a header and a trailer to create a frame.

Controls how data is placed onto the media and is received from the media using

techniques such as media access control and error detection

Page 8: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

Ethernet Topology:

The first versions of Ethernet used coaxial cable to connect computers in a bus topology.

The physical topology was also changed to a star topology using hubs.

* What are the characteristics of CSMA/CD?

– All network devices that have messages to send must listen before transmitting.

– All node sees all the frames that are on the medium,

– Once a collision occurs, the other devices in listening mode - as well as all the

transmitting devices - will detect the increase in the signal amplitude.

Ethernet Unicast, Multicast & Broadcast frame:

A unicast MAC address is the unique address used when a frame is sent from a single

transmitting device to single destination device.

With a broadcast, the packet contains a destination IP address that has all ones (1s) in the

host portion. FF-FF-FF-FF-FF-FF

the switch sends the frame to all ports except the port on which the frame arrived.

Multicast addresses allow a source device to send a packet to a group of devices.

Switch forwarding is based on the Destination MAC

– The switch maintains a table, called a MAC table. that matches a destination MAC

address with the port used to connect to a node.

– For each incoming frame, the destination MAC address in the frame header is

compared to the list of addresses in the MAC table.

– If a match is found, the port number in the table that is paired with the MAC address

is used as the exit port for the frame.

Page 9: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* Still need to know this. You need to know where is the location of the data and it determines

what is the source MAC and destination MAC address.

* Counting broadcast and broadcast domain.

* How to count the number of subnets needed for the network?

Page 10: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* Console cable (rollover):

- PC to Router console port (for initial router configuration)

* cross-over cable:

- PC to PC

- Router Ethernet to Router Ethernet

- Switch to switch

- Hub to hub

* Straight-through cable:

- PC to switch

- PC to hub

- Router to switch

- Router to hub

Page 11: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* Making WAN Connections

The cable is used as a V.35 connection to a Physical layer device such as a

CSU/DSU.

* Router Ethernet Interfaces:

Router Ethernet interfaces are used as the gateways for the end devices on the LANs

directly connected to the router.

Each Ethernet interface must have an IP address and subnet mask to route IP packets

In the example shown below (I know the IP addresses does not match, but concept is the

same), the IP address that is configured for the router Ethernet interface is going to be the

default gateway IP address for the PC inside your subnet. Also, the other way of saying it

is, the default gateway address configured on your PC is the router’s ethernet IP address.

Also, the IP address for the router and IP address for the PC, they must be in the same

subnet.

Page 12: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

To configure an Ethernet interface follow these steps:

– Router#config t

– Router(config)#interface FastEthernet 0/0

– Router(config-if)#ip address ip_address netmask

– Router(config-if)#no shutdown

** Pay attention on the prompt needed and the command needed

Serial interfaces require a clock signal to control the timing of the communications.

– In most environments, a DCE device such as a CSU/DSU will provide the clock.

– By default, Cisco routers are DTE devices, but they can be configured as DCE

devices.

– On serial links that are directly interconnected, as in our lab environment, one

side must operate as DCE to provide a clocking signal:

• Router(config)#interface Serial 0/0/0

• Router(config-if)#ip address ip_address netmask

• Router(config-if)#clock rate 56000

• Router(config-if)#no shutdown

To configure console or virtual terminal line (telnet).

– Switch(config)#line console 0

– Switch(config-line)#password password

– Switch(config-line)#login

– Switch(config)#line vty 0 4 5 telnet session is setup with the password access.

– Switch(config-line)#password password

– Switch(config-line)#login

* Passwords are the primary defense against unauthorized access to network devices.The

passwords here are:

Console password - limits access using the console connection

Enable password - limits access to the privileged EXEC mode

Enable secret password - encrypted, limits access to the privileged EXEC mode

VTY password - limits device access using Telnet

Page 13: SEMESTER 1 Final Study Guide - College of DuPage - In a peer-to-peer network, two or more computers are connected via a network and can share resources (such as printers and files)

* A Cisco network device contains two configuration files:

The running configuration file - used during the current operation of the device

– Stored in RAM, it is used to operate the device.

– Changes to the running configuration

The startup configuration file - used as the backup configuration and is loaded when the

device is started

– The startup configuration file is used during system startup to configure the

device.

– The startup configuration file is stored in NVRAM.

* Save the Changed Configuration

– Because the running configuration is stored in RAM, it is temporarily active while

the Cisco device is powered on.

– Saving the running configuration to the startup configuration in NVRAM

preserves the changes as the new startup configuration.

– Switch#copy running-config startup-config

* Removing All Configurations

If undesired changes are saved to the startup configuration, this requires erasing the

startup configuration and restarting the device.

Router#erase startup-config.

The startup configuration file is stored in NVRAM will be erased

Reload the device to remove the current running configuration file