SlideShare ist ein Scribd-Unternehmen logo
1 von 27
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer
Network Fundamentals – Chapter 5
2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives
 Identify the role of the Network Layer, as it describes
communication from one end device to another end device
 Examine the most common Network Layer protocol, Internet
Protocol (IP), and its features for providing connectionless and
best-effort service
 Understand the principles used to guide the division or grouping
of devices into networks
 Understand the hierarchical addressing of devices and how this
allows communication between networks
 Understand the fundamentals of routes, next hop addresses and
packet forwarding to a destination network
3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Define the basic role of the Network Layer in data
networks
4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Identify the basic characteristics and the role of the
IPv4 protocol
5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Describe the implications for the use of the IP protocol
as it is connectionless
6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Describe the implications for the use of the IP protocol
as it is considered an unreliable protocol
7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Describe the implications for the use of the IP as it is
media independent
8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Describe the role of framing in the Transport Layer and
explain that segments are encapsulated as packets
9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Identify the major header fields in the IPv4 protocol and
describe each field's role in transporting packets
10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 List several different reasons for grouping devices into
sub-networks and define several terms used to identify
the sub-networks
11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 List several ways in which dividing a large network can
increase network performance
12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 List several ways in which dividing a large network can
increase network security
13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 Explain the communication problems that emerge when
very large numbers of devices are included in one large
network
14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 Describe how hierarchical addressing solves the
problem of devices communicating across networks of
networks
15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 Describe the purpose of further subdividing networks
into smaller networks
16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the role of an intermediary gateway device in
allowing devices to communicate across sub-divided
networks
17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Trace the steps of an IP packet as it traverses
unchanged via routers from sub network to sub-network
18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the role of a gateway and the use of a simple
route table in directing packets toward their ultimate
destinations
19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Define a route and its three key parts
20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the purpose and use of the destination
network in a route
21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the purpose and use of the next hop in a route
22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Trace the steps of several IP packets as they are
routed through several gateways from devices on one
sub network to devices on other sub networks
23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the purpose of routing protocols and the need
for both static and dynamic routes
24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Explain how routes are manually configured to build
routing table
25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Explain the role of routing protocols in building the
routing table
26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary
27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2Irsandi Hasan
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3Irsandi Hasan
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Sachii Dosti
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2Irsandi Hasan
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Sachii Dosti
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1Irsandi Hasan
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2Raghu nath
 
CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1Irsandi Hasan
 
CCNA Industrial Training Presentation
CCNA Industrial Training PresentationCCNA Industrial Training Presentation
CCNA Industrial Training PresentationTalvinder Singh
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Carmelo de Jesús
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Carmelo de Jesús
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5Irsandi Hasan
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2Irsandi Hasan
 

Was ist angesagt? (20)

CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
 
Exploration network chapter11
Exploration network chapter11Exploration network chapter11
Exploration network chapter11
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1
 
CCNA Industrial Training Presentation
CCNA Industrial Training PresentationCCNA Industrial Training Presentation
CCNA Industrial Training Presentation
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3
 
MyNFChapter5
MyNFChapter5MyNFChapter5
MyNFChapter5
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 

Andere mochten auch

CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7Irsandi Hasan
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerAbdelkhalik Mosa
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 

Andere mochten auch (6)

Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Chapter3
Chapter3Chapter3
Chapter3
 
Data link layer
Data link layer Data link layer
Data link layer
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 

Ähnlich wie CCNA Exploration 1 - Chapter 5

Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptNukriTskvitaia
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5r82093403
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptssuser7c54e61
 
CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6Irsandi Hasan
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2r82093403
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3Irsandi Hasan
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6r82093403
 
Exploration network chapter9
Exploration network chapter9Exploration network chapter9
Exploration network chapter9r82093403
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3Irsandi Hasan
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4Irsandi Hasan
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3r82093403
 
Exploration network chapter10
Exploration network chapter10Exploration network chapter10
Exploration network chapter10r82093403
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4r82093403
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIRJET Journal
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10Irsandi Hasan
 

Ähnlich wie CCNA Exploration 1 - Chapter 5 (20)

Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.ppt
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.ppt
 
CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
chapter_5
chapter_5chapter_5
chapter_5
 
Exploration network chapter9
Exploration network chapter9Exploration network chapter9
Exploration network chapter9
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3
 
Exploration network chapter10
Exploration network chapter10Exploration network chapter10
Exploration network chapter10
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 

Mehr von Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 

Mehr von Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

Kürzlich hochgeladen

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

CCNA Exploration 1 - Chapter 5

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5
  • 2. 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives  Identify the role of the Network Layer, as it describes communication from one end device to another end device  Examine the most common Network Layer protocol, Internet Protocol (IP), and its features for providing connectionless and best-effort service  Understand the principles used to guide the division or grouping of devices into networks  Understand the hierarchical addressing of devices and how this allows communication between networks  Understand the fundamentals of routes, next hop addresses and packet forwarding to a destination network
  • 3. 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Define the basic role of the Network Layer in data networks
  • 4. 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Identify the basic characteristics and the role of the IPv4 protocol
  • 5. 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP protocol as it is connectionless
  • 6. 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP protocol as it is considered an unreliable protocol
  • 7. 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP as it is media independent
  • 8. 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the role of framing in the Transport Layer and explain that segments are encapsulated as packets
  • 9. 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Identify the major header fields in the IPv4 protocol and describe each field's role in transporting packets
  • 10. 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several different reasons for grouping devices into sub-networks and define several terms used to identify the sub-networks
  • 11. 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several ways in which dividing a large network can increase network performance
  • 12. 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several ways in which dividing a large network can increase network security
  • 13. 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Explain the communication problems that emerge when very large numbers of devices are included in one large network
  • 14. 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Describe how hierarchical addressing solves the problem of devices communicating across networks of networks
  • 15. 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Describe the purpose of further subdividing networks into smaller networks
  • 16. 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the role of an intermediary gateway device in allowing devices to communicate across sub-divided networks
  • 17. 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Trace the steps of an IP packet as it traverses unchanged via routers from sub network to sub-network
  • 18. 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the role of a gateway and the use of a simple route table in directing packets toward their ultimate destinations
  • 19. 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Define a route and its three key parts
  • 20. 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose and use of the destination network in a route
  • 21. 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose and use of the next hop in a route
  • 22. 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Trace the steps of several IP packets as they are routed through several gateways from devices on one sub network to devices on other sub networks
  • 23. 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose of routing protocols and the need for both static and dynamic routes
  • 24. 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Explain how routes are manually configured to build routing table
  • 25. 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Explain the role of routing protocols in building the routing table
  • 26. 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary
  • 27. 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public