SlideShare ist ein Scribd-Unternehmen logo
1 von 28
OSI Network Layer

Network Fundamentals – Chapter 5

ITE I Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

1
Objectives


Identify the role of the Network Layer, as it describes
communication from one end device to another end
device



Identify the most common Network Layer protocol,
Internet Protocol (IP), and its features for providing
connectionless and best-effort service



Identify the principles used to guide the division or
grouping of devices into networks



Identify the hierarchical addressing of devices and
how this allows communication between networks



Identify the fundamentals of routes, next hop
addresses and packet forwarding to a destination
network

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
Network Layer Protocols and Internet Protocol
(IP)
 Provides addressing via IP version 4 and increasingly
IPv6
 The routing of data

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

3
Network Layer Protocols and Internet Protocol
(IP)
 Internet Protocol version 4 (IPv4)
 Allows network devices to find each other

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

4
Network Layer Protocols and Internet Protocol
(IP)
 IP protocol is connectionless
 The receiver is not contacted before the data is sent

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

5
Network Layer Protocols and Internet Protocol
(IP)
 IP is an unreliable protocol i.e. does not guarantee data
delivery

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

6
Network Layer Protocols and Internet Protocol
(IP)
 IP uses the same protocol irrespective of the media

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
Network Layer Protocols and Internet Protocol
(IP)
 Transport Layer Segments or PDU are encapsulated in
Packets

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

8
Network Layer Protocols and Internet Protocol
(IP)
 IP Packets have fields just like TCP/UDP segments
 IP Encapsulate TCP/UDP segment with its header
Ver = IPv4
IHL = IP header length, Service Type =Priority (QOS),
Header Checksum = Error checking
Source Address =IP address of data source
Destination address = Data destination address

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

9
Hierarchical Addressing scheme (IP) and
grouping networks
 Enhances: Security, Manageability, Performance,
Troubleshooting, Scalability
Networks can be Divided
on:
Department
Purpose
Location
User – Permissions
User – Rights

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10
Hierarchical Addressing aids performance
 Performance: Keeping traffic where it should be
increases network performance

Broadcast = The
ability to reach
all the devices
on your network
with the same
data

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11
Hierarchical Addressing improves security
 Security: User permission and rights can be specified

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
Hierarchical Addressing aids data delivery
 Structure allows network devices to be quickly found
i.e. What network, then what host on that network

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13
Networks and their address can be subdivided
with subnetting
 The host portion can be further subdivided into smaller
networks or subnets
Subnetting converts Host
bits into Network bits

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Routers allow devices on different networks to pass
data between each other

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 To move packets to a different network a router is
required

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Gateways are used to pass data to other networks

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17
Gateways
 Gateways lead to other networks

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 A route consist of: Destination network, a Next hop
interface address and an Outgoing interface

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

19
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 A destination network is where the data is required to
be when its journey is complete

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 The next hop interface address tells the current router
what next interface to use for data to reach its
destination network

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

21
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Routers move packet between subnets

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

22
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Routing protocols allow routers to learn routing tables
that contain the location of networks
 Routing tables can be statically (manually) or
dynamically (automatically) configured

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

23
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Routes or destination networks can be configured to
automatically build routing tables i.e.
(RIP,IGRP,EIGRP,OSPF etc)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

24
Testing network addresses and connectivity
 Both ping and tracert are used by network engineers
to test network connectivity. For basic network
connectivity, the ping command works best. To test
latency (delay) and the network path, the tracert
command is preferred.
 The ability to accurately and quickly diagnose network
connectivity issues is a skill expected from network
engineer. Knowledge about the TCP/IP protocols and
practice with troubleshooting commands will build that
skill.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

25
Ping example

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

26
Tracert example

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

27
Labs
 Lab 5.5.2 Examining a route (Destination networks,
Next hop interface, Gateway)
 Lab 6.7.1- Ping and Traceroute (Testing connectivity)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

28

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS) Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS)
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Lecture3 Physical Layer
Lecture3 Physical LayerLecture3 Physical Layer
Lecture3 Physical Layer
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
IPv4
IPv4IPv4
IPv4
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Tcp
TcpTcp
Tcp
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
CCNA
CCNACCNA
CCNA
 
Transport layer
Transport layerTransport layer
Transport layer
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernetting
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
OSI Model
OSI ModelOSI Model
OSI Model
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 

Andere mochten auch

CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5Irsandi Hasan
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport LayerSachii Dosti
 
Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...Joshua Owolabi
 
Asure one spark (3)
Asure one spark (3)Asure one spark (3)
Asure one spark (3)Bizapity
 
Patrimonio urbano imagenes
Patrimonio urbano imagenesPatrimonio urbano imagenes
Patrimonio urbano imagenesvanessavergara18
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần tanqn_hut
 
Linked in Master
Linked in MasterLinked in Master
Linked in MasterSimon Dear
 
Sayed-Minhal-Principles of Beautiful Design
Sayed-Minhal-Principles of Beautiful DesignSayed-Minhal-Principles of Beautiful Design
Sayed-Minhal-Principles of Beautiful DesignSayed Minhal
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-sklkb candipuro
 
Wikaniko Peter Simmonds - Home page slideshow
Wikaniko Peter Simmonds - Home page slideshowWikaniko Peter Simmonds - Home page slideshow
Wikaniko Peter Simmonds - Home page slideshowNatalie Harris
 
Re-Emerging Human Viral Hemorrhagic Fevers
Re-Emerging Human Viral Hemorrhagic FeversRe-Emerging Human Viral Hemorrhagic Fevers
Re-Emerging Human Viral Hemorrhagic FeversJoshua Owolabi
 
How consumers are using the smartphones
How consumers are using the smartphonesHow consumers are using the smartphones
How consumers are using the smartphonesCreadsmedia
 

Andere mochten auch (20)

CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
Network session 1 OSI Model
Network session 1 OSI ModelNetwork session 1 OSI Model
Network session 1 OSI Model
 
Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...Isolation and characterization of zinc resistant bacteria from a coil coating...
Isolation and characterization of zinc resistant bacteria from a coil coating...
 
Asure one spark (3)
Asure one spark (3)Asure one spark (3)
Asure one spark (3)
 
Actividad 7
Actividad 7Actividad 7
Actividad 7
 
Patrimonio urbano imagenes
Patrimonio urbano imagenesPatrimonio urbano imagenes
Patrimonio urbano imagenes
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
 
Linked in Master
Linked in MasterLinked in Master
Linked in Master
 
Sayed-Minhal-Principles of Beautiful Design
Sayed-Minhal-Principles of Beautiful DesignSayed-Minhal-Principles of Beautiful Design
Sayed-Minhal-Principles of Beautiful Design
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
 
Wikaniko Peter Simmonds - Home page slideshow
Wikaniko Peter Simmonds - Home page slideshowWikaniko Peter Simmonds - Home page slideshow
Wikaniko Peter Simmonds - Home page slideshow
 
Entorno natural
Entorno naturalEntorno natural
Entorno natural
 
Ciudades eternas --
Ciudades eternas --Ciudades eternas --
Ciudades eternas --
 
Re-Emerging Human Viral Hemorrhagic Fevers
Re-Emerging Human Viral Hemorrhagic FeversRe-Emerging Human Viral Hemorrhagic Fevers
Re-Emerging Human Viral Hemorrhagic Fevers
 
MPW - Management of self
MPW - Management of selfMPW - Management of self
MPW - Management of self
 
How consumers are using the smartphones
How consumers are using the smartphonesHow consumers are using the smartphones
How consumers are using the smartphones
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
E1S
E1SE1S
E1S
 

Ähnlich wie OSI Network Layer

Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5r82093403
 
Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptNukriTskvitaia
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Sachii Dosti
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1Joshua Torres
 
Week3 part 2
Week3  part 2Week3  part 2
Week3 part 2trayyoo
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1Irsandi Hasan
 
Ex 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenEx 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenĐô GiẢn
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3Waqas Ahmed Nawaz
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptxAyaanMohamed4
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 

Ähnlich wie OSI Network Layer (20)

Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5
 
Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.ppt
 
Ethernet
EthernetEthernet
Ethernet
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1
 
Week3 part 2
Week3  part 2Week3  part 2
Week3 part 2
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
 
Ex 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenEx 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chen
 
MyNFChapter5
MyNFChapter5MyNFChapter5
MyNFChapter5
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
1
11
1
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
ccna lec 1.pdf
ccna lec 1.pdfccna lec 1.pdf
ccna lec 1.pdf
 

Mehr von Sachii Dosti

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2Sachii Dosti
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paperSachii Dosti
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpgSachii Dosti
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4Sachii Dosti
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4Sachii Dosti
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Sachii Dosti
 

Mehr von Sachii Dosti (9)

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paper
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpg
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
ip v6
ip v6ip v6
ip v6
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 

Kürzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

OSI Network Layer

  • 1. OSI Network Layer Network Fundamentals – Chapter 5 ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Identify the role of the Network Layer, as it describes communication from one end device to another end device  Identify the most common Network Layer protocol, Internet Protocol (IP), and its features for providing connectionless and best-effort service  Identify the principles used to guide the division or grouping of devices into networks  Identify the hierarchical addressing of devices and how this allows communication between networks  Identify the fundamentals of routes, next hop addresses and packet forwarding to a destination network ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Network Layer Protocols and Internet Protocol (IP)  Provides addressing via IP version 4 and increasingly IPv6  The routing of data ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Network Layer Protocols and Internet Protocol (IP)  Internet Protocol version 4 (IPv4)  Allows network devices to find each other ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Network Layer Protocols and Internet Protocol (IP)  IP protocol is connectionless  The receiver is not contacted before the data is sent ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Network Layer Protocols and Internet Protocol (IP)  IP is an unreliable protocol i.e. does not guarantee data delivery ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Network Layer Protocols and Internet Protocol (IP)  IP uses the same protocol irrespective of the media ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Network Layer Protocols and Internet Protocol (IP)  Transport Layer Segments or PDU are encapsulated in Packets ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Network Layer Protocols and Internet Protocol (IP)  IP Packets have fields just like TCP/UDP segments  IP Encapsulate TCP/UDP segment with its header Ver = IPv4 IHL = IP header length, Service Type =Priority (QOS), Header Checksum = Error checking Source Address =IP address of data source Destination address = Data destination address ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Hierarchical Addressing scheme (IP) and grouping networks  Enhances: Security, Manageability, Performance, Troubleshooting, Scalability Networks can be Divided on: Department Purpose Location User – Permissions User – Rights ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Hierarchical Addressing aids performance  Performance: Keeping traffic where it should be increases network performance Broadcast = The ability to reach all the devices on your network with the same data ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Hierarchical Addressing improves security  Security: User permission and rights can be specified ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Hierarchical Addressing aids data delivery  Structure allows network devices to be quickly found i.e. What network, then what host on that network ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Networks and their address can be subdivided with subnetting  The host portion can be further subdivided into smaller networks or subnets Subnetting converts Host bits into Network bits ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Routers allow devices on different networks to pass data between each other ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  To move packets to a different network a router is required ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Gateways are used to pass data to other networks ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Gateways  Gateways lead to other networks ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  A route consist of: Destination network, a Next hop interface address and an Outgoing interface ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  A destination network is where the data is required to be when its journey is complete ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  The next hop interface address tells the current router what next interface to use for data to reach its destination network ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Routers move packet between subnets ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Routing protocols allow routers to learn routing tables that contain the location of networks  Routing tables can be statically (manually) or dynamically (automatically) configured ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • 24. Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Routes or destination networks can be configured to automatically build routing tables i.e. (RIP,IGRP,EIGRP,OSPF etc) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
  • 25. Testing network addresses and connectivity  Both ping and tracert are used by network engineers to test network connectivity. For basic network connectivity, the ping command works best. To test latency (delay) and the network path, the tracert command is preferred.  The ability to accurately and quickly diagnose network connectivity issues is a skill expected from network engineer. Knowledge about the TCP/IP protocols and practice with troubleshooting commands will build that skill. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
  • 26. Ping example ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
  • 27. Tracert example ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
  • 28. Labs  Lab 5.5.2 Examining a route (Destination networks, Next hop interface, Gateway)  Lab 6.7.1- Ping and Traceroute (Testing connectivity) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28