CCNA Exploration1 Chapter2: Summary and Review: Q and A

Q1- List 5 end devices, 6 intermediate devices, and 3 forms of networking media.
A1-
-     End devices: desktop computer, laptop computer, server, PDA, cellular mobile phone, printer, security camera, IP phone, electronic point of sale device, automatic teller machine
-     Intermediate device: repeater, hub, wireless access point, switch, router, modem, and firewall
-     Networking media: copper cable, fiber cable, radio (wireless)


Q2- Compare and contrast the following terms: Network, LAN, WAN, internetwork, and the Internet.
A2-
-     Network – a group of interconnected devices capable of carrying many different types of communications, including traditional computer data, interactive voice, video, and entertainment products.

-     LAN – a local network, or group of interconnected local networks that are under the same administrative control.  In the past, LANs were thought of only as small networks that existed in a single physical location.  While LANs can be as small as a single local network installed in a home or small office, LANs now include interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations.  All of the local networks within a LAN are under one administrative control group that governs the security and access control policies that are in force on the network

-          WAN – Telecommunications service providers (TSP) operate large regional networks spanning long distances. Individual organizations usually lease connections through a telecommunications service provider network.  These networks that connect LANs in geographically separated locations are Wide Area Networks (WANs).  Although the organization maintains all of the policies and administration of the LANs at both ends of the connection, the policies within the communications service provider network are controlled by the TSP. WANs use specifically designed network devices to make the interconnections between LANs.

-     Internetwork - Al mesh of interconnected networks is used. Some of these interconnected networks are owned by large public and private organizations, such as government agencies or industrial enterprises, and are reserved for their exclusive use. The most well-known and widely used publicly accessible internetwork is the Internet.

-     Internet - The most well-known and widely used publicly accessible internetwork. The Internet is created by the interconnection of networks belonging to Internet Service Providers (ISPs).   These ISP networks connect to each other to provide access for users all over the world.  Ensuring effective communication across this diverse infrastructure requires the application of consistent and commonly recognized technologies and protocols as well as the cooperation of many network administration agencies.

Q3- Compare and contrast the layers of the OSI model with the TCP/IP protocol stack.
A3- There are two basic types of networking models: protocol models and reference models.

-     A protocol model closely matches the structure of a particular protocol suite. The hierarchical set of related protocols in a suite t represents all the functionality required to interface the human network with the data network. The 4-layer TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols within the TCP/IP suite.

-     A reference model provides a common reference for maintaining consistency within all types of network protocols and services. A reference model is not intended to be an implementation specification or to provide a sufficient level of detail to define precisely the services of the network architecture. The primary purpose of a reference model is to aid in clearer understanding of the functions and process involved. The 7-layer Open Systems Interconnection (OSI) model is the most widely known internetwork reference model.  It is used for data network design, operation specifications, and troubleshooting.

-     The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI reference model.  In the OSI model, the Network Access layer and the Application layer of the TCP/IP model are further divided to describe discreet functions that need to occur at these layers.

-     At the Network Access Layer, the TCP/IP protocol suite does not specify which protocols to use when transmitting over a physical medium; it only describes the handoff from the Internet Layer to the physical network protocols. The OSI Layers 1 and 2 discuss the necessary procedures to access the media and the physical means to send data over a network.

-     The key parallels between the two network models occur at the OSI model Layers 3 and 4.  OSI Model Layer 3, the Network layer, almost universally is used to discuss and document the range of processes that occur in all data networks to address and route messages through an internetwork. The Internet Protocol (IP) is the TCP/IP suite protocol that includes the functionality described at Layer 3.

-     Layer 4, the Transport layer of the OSI model, is often used to describe general services or functions that manage individual conversations between source and destination hosts. These functions include acknowledgement, error recovery, and sequencing. At this layer, the TCP/IP protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) provide the necessary functionality.

-     The TCP/IP Application layer includes a number of protocols that provide specific functionality to a variety of end user applications.  The OSI model Layers 5, 6 and 7 are used as references for application software developers and vendors to produce products that need to access networks for communications.

Q4: Explain why networking models are used
A4: Although the TCP/IP and OSI models are the primary models used when discussing network functionality, designers of network protocols, services, or devices can create their own models to represent their products. Ultimately, designers are required to communicate to the industry by relating their product or service to either the OSI model or the TCP/IP model, or to both.

As a reference model, the OSI model provides an extensive list of functions and services that can occur at each layer.  It also describes the interaction of each layer with the layers directly above and below it.  Whereas TCP/IP model layers are referred to by name, the seven OSI model layers are usually referred to by number.

There are benefits to using a layered model to describe network protocols and operations:
-     Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below
-     Fosters competition because products from different vendors can work together
-     Prevents technology or capability changes in one layer from affecting other layers above and below
-     Provides a common language to describe networking functions and capabilities

Q5: Elaborate on the following terms: protocol, PDUs, and encapsulation.
A5:
Protocol:
All communication, whether face-to-face or over a network, is governed by predetermined rules called protocols.  These protocols are specific to the characteristics of the conversation.  In our day-to-day personal communication, the rules we use to communicate over one medium, like a telephone call, are not necessarily the same as the protocols for using another medium, such as a sending a letter.

Successful communication between hosts on a network requires the interaction of many different protocols.  A group of interrelated protocols that are necessary to perform a communication function is called a protocol suite.  These protocols are implemented in software and hardware that is on each host and network device.

PDU & Encapsulation:
As application data is passed down the protocol stack on its way to be transmitted across the network media, various protocols add information to it at each level.  This is commonly known as the encapsulation process.

The form that a piece of data takes at any layer is called a Protocol Data Unit (PDU). During encapsulation, each succeeding layer encapsulates the PDU that it receives from the layer above in accordance with the protocol being used. At each stage of the process, a PDU has a different name to reflect its new appearance.  PDUs within the protocols of the TCP/IP suite are:
-          Data – The general term for the PDU used at the Application layer
-          Segment – Transport Layer PDU
-          Packet – Internetwork Layer PDU
-          Frame – Network Access Layer PDU

Q6: Explain the postal metaphor or encapsulation.
A6: Individual pages of a letter are written and numbered sequentially. Each page is sealed in a separate envelope that is then addressed to the recipient. The letters are posted and put in a mailbag (labelled with the destination) with many other envelops each containing a page of different letters and addressed to recipients. Many mailbags are loaded into a van and transported towards the destination. Along the way the mailbags may be transferred to other vans or different modes of transport – trucks, trains, aircraft, ships. At the destination the mailbags are unloaded and emptied. The envelopes are delivered to the destination addresses. At one address all the envelopes received are opened, the page removed from each one, and the pages re-assembled into the letter.

The envelope, and then the mailbag and the vans/trucks/aircraft, each do not care what is in the "container" that they carry. The letter itself is not used to provide information to assist in its delivery. The address on the envelope, the label on the mailbag or the delivery instructions to the van driver are what direct the letter towards its destination.

Data encapsulation follows the same principle – it is the addresses used in each layer of encapsulation that direct the data towards its destination not the data itself.

Q7: what are the unique roles of Layer 2, Layer 3, and Layer 4 addresses?
A7:
-     Layer 4 addresses (ports) identify the individual applications sending or receiving data.
-     Layer 3 (logical) addresses identify devices and their networks.
Layer 2 (physical) addresses identify devices on a local network
Share this article :
 
Copyright © 2011. Telecommunication and IT Today - All Rights Reserved
Proudly powered by http://telecomedu.blogspot.com