0% found this document useful (0 votes)
223 views

Part 1 Fundamentals of Ethernet LANs

Ethernet defines standards for wired and wireless local area networks (LANs). It specifies cabling, connectors, protocols, and other requirements. Ethernet standards cover various cable types and speeds up to 100 gigabits per second. Small office/home office (SOHO) networks typically use a single wireless router to function as both an Ethernet switch and wireless access point. Ethernet uses the same data link standard over different physical links, specifying a common header and trailer format.

Uploaded by

NOVA MAROC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
223 views

Part 1 Fundamentals of Ethernet LANs

Ethernet defines standards for wired and wireless local area networks (LANs). It specifies cabling, connectors, protocols, and other requirements. Ethernet standards cover various cable types and speeds up to 100 gigabits per second. Small office/home office (SOHO) networks typically use a single wireless router to function as both an Ethernet switch and wireless access point. Ethernet uses the same data link standard over different physical links, specifying a common header and trailer format.

Uploaded by

NOVA MAROC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 16

Resume Official Cert Guide february 2017

Chapter 1 :

Ethernet: refers to a family of LAN standards that together define the physical and
data link layers of the
world’s most popular wired LAN technology defined by the Institute of
Electrical and Electronics Engineers (IEEE),
define the cabling, the connectors on the ends of the cables, the
protocol rules, and everything else required to create an Ethernet LAN
The term Ethernet refers to an entire family of standards. Some standards define
the specifics of how to send data
over a particular type of cabling, and at a particular speed.Other standards
define protocols, or rules, that the
Ethernet nodes must follow to be a part of an Ethernet
LAN. All these Ethernet standards come from the IEEE
and include the number 802.3 as the beginning part of the
standard name.
Ethernet includes many standards for
different kinds of optical and copper cabling, and for
speeds from 10 megabits per second (Mbps) up to 100
gigabits per second (Gbps).

SOHO / Small office home office : it s a small eEthernet lan or a wirelsse lan or
both
most SOHO networks today would use a single device, often labeled as a
“wireless router,” that does all these functions
are just aa lan that support very small businesse .soho are considered any
busness that is made up of 1 to 10 peaple

Ethernet it uses the same data link layer standard over all types of Ethernet
physical links. That standard defines a common Ethernet
header and trailer

To send data, the two devices follow some rules called an


encoding scheme
With an encoding scheme, the transmitting
node changes the electrical signal over time, while the
other node, the receiver, using the same rules, interprets
those changes as either 0s or 1s. (For example, 10BASE-T
uses an encoding scheme that encodes a binary 0 as a
transition from higher voltage to lower voltage during the
middle of a 1/10,000,000th-of-a-second interval.)

When electrical current passes over


any wire, it creates electromagnetic interference (EMI)
that interferes with the electrical signals in nearby wires,
including the wires in the same cable. (EMI between wire
pairs in the same cable is called crosstalk.) Twisting the
wire pairs together helps cancel out most of the EMI, so
most networking physical links that use copper wires use
twisted pairs.

The cable holds


some copper wires, grouped as twisted pairs. The
10BASE-T and 100BASE-T standards require two pairs
of wires, while the 1000BASE-T standard requires four
pairs. Each wire has a color-coded plastic coating,

The RJ-45 connector has eight physical locations


into which the eight wires in the cable can be inserted,
called pin positions, or simply pins

UTP Cabling Pinouts for 10BASE-T and 100BASE-


10bast and 100 baset use 2 pairs
1000baset use 4 pairs

straight throogh Cable


defferent machine : beteween pc and switch or router and switch
1------1
2------2
3------3
.
.
etc----etc
crossover cable
between the same nodes : between pc and pc router and router or oc and router or
switch and switch
1-----3
2-----6
3-----1
4-----4
5-----5
6-----2
etc---etc

Cisco
switches have a feature called auto-mdix that
notices when the wrong cable is used and
automatically changes its logic to make the
link work.

1000BASE-T requires four wire pairs. Second, it uses


more advanced electronics that allow both ends to
transmit and receive simultaneously on each wire pair

format header ethernet


Preamble SFD DESSTINATION SOURCE TYPE DATA FCS
7 BYTE 1 6 6 2 46-1500 4
Preamble : synchronisation
SFD ; start Frame delimiter
fcs : Frame check Sequence
type ; code define the protocol layout 3 is it ipv4 (0800) or ipv6 (86DD)

Ethernet addresses MAC MEDIA ACCESS CONTROL 48 BITE 12 HEXADECIMAL *6 FOR


OUI(organisation unique identifier) AND 6 FOR

Error Detection with FCS


FCS: gives the receiving node a way to compare results with the sender,The sender
applies a complex math formula to the frame
before sending it, storing the result of the formula in the FCS field. The receiver
applies the same math formula to
the received frame. The receiver then compares its own results with the sender’s
results
if it is the same then ok . if not it will make a discion if its tcp or udb

Sending in Modern Ethernet LANs Using Full Duplex

Half duplex: The device must wait to send if


it is currently receiving a frame; in other
words, it cannot send and receive at the same
time.
Full duplex: The device does not have to wait
before sending; it can send and receive at the
same time.
Using Half Duplex with LAN Hubs

Collision Occurring Because of LAN Hub


Behavior
note that the hub floods
each frame out all other ports (except the incoming port)
resume of halfduplix why !!
halfduplex we use it just with nodes that connected with hub because the hub
floods
each frame out all other ports (except the incoming port). so if tow nodes
comunicate with the same hub
the collesion will be happen . therefor we dont use hub anymore in Ethernet Lan .
we use switch with fullduplix with algoritme CMSA/CD to prevent collection

-*******************-
***********************************************************************************
*************************************************
Chapter 3. Fundamentals of WANs:
--------------------------------

With LANs, you


buy the cables and LAN switches and install them in
spaces you control

WANs physically pass through other


people’s property, and you do not have the right to put
your cables and devices there

Leased-Line WANs

a leased line WAN works a


lot like an Ethernet crossover cable connecting two
routers, but with few distance limitations. Each router can
send at any time (full duplex) over the leased line, for
tens, hundreds, or even thousands of miles
The leased line uses two pairs of wires, one pair for each
direction of sending data, which allows full-duplex
operation.

leased lines have had many


names. Table 3-2 lists some of those names : leased circuit . circuit . serial link
. serial line . point to point link/line . T1(speciel type of leased line that
transmit
data at 1544 mbps) . wan link . Privat link/line

Leased-Line Cabling
To create a leased line, Telcos put
their equipment in buildings called central offices (CO).
The telco installs cables from the CO to most every other
building in the city, expecting to sell services to the people
in those buildings one day. The telco would then configure
its switches to use some of the capacity on each cable to
send data in both directions, creating the equivalent of a
crossover cable between the two routers.

each site has customer premises equipment (CPE),


which includes the router, serial interface card, and
CSU/DSU.channel service unit/data service unit The CSU/DSU can either be integrated
into
the serial interface card in the router or sit outside the
router as an external device

we connecte router with csu/dsu by serial link there are manye type of serial
cables
and we conecte the leased line directly woth csu/dcu using RJ48 CONNECTOR

Telcos offer a wide variety of speeds for leased lines.


However, you cannot pick the exact speed you want;
instead, you must pick from a long list of predefined
speeds. Slower-speed links run at multiples of 64 kbps
(kilobits per second), while faster links run at multiples of
about 1.5 Mbps (megabits per second).

Building a WAN Link in a Lab

Serial Cabling Uses a DTE Cable and a DCE Cable


DTE DCE
R1--------------------||||-----------------------R2
Serial serial
CABLE CABLE
-------------------||||----\/------------------
-------------------||||----/\------------------

the serial cables normally used between a router and


an external CSU/DSU are called data terminal equipment
(DTE) cablesTo create a physical WAN link in a lab, you
need two serial cables: one serial DTE cable, plus a
similar but slightly different matching data
communications equipment (DCE) cable. The DCE cable
has a female connector, while the DTE cable has a male
connector, which allows the two cables to be attached
directly. The DCE cable also does the equivalent task of
an Ethernet crossover cable by swapping the transmit and
receive wire pairs

Finally, to make the link work, the router with the DCE
cable installed must do one function normally done by the
CSU/DSU. The CSU/DSU normally provides a function
called clocking, in which it tells the router exactly when
to send each bit through signaling over the serial cable. A
router serial interface can provide clocking,
USING Clock rate commande

Data-Link Details of Leased Lines

Because leased lines define only the Layer 1 transmission


service, many companies and standards organizations have
created data-link protocols to control and use leased lines.
Today, the two most popular data link layer protocols used
for leased lines between two routers are High-Level Data
Link Control (HDLC) and Point-to-Point Protocol (PPP).

HDLC Basics
hdlc header didn t have addresse source just desination address because we donn t
need to know the source and we have point to point networkk so it s loogique the
the source is the other node
hdlc field ethernet equivakent description
flag preamble / sfd bit show mean that the new fram is
coming
addresse destination addd
control no no longer is ised today
type type identifier the type of layer 3
packet encapsulation inside the frame
fcs fcs detection erreur

hdcl Cisco
HDLC exists today as a standard of the International
Organization for Standardization (ISO), the same
organization that brought us the OSI model. However, ISO
standard HDLC does not have a Type field, and routers
need to know the type of packet inside the frame. So,
Cisco routers use a Cisco-proprietary variation of HDLC

avantage and disavantage of leased lines

These lines
are simple for the customer, are widely available, are of
high quality, and are private. However, they do have some
negatives as well compared to newer WAN technologies,
including a higher cost and typically longer lead times to
get the service installed.

Ethernet as a WAN Technology


For the first several decades of the existence of Ethernet,
Ethernet was only appropriate for LANs. and not a wan because The restrictions on
cable lengths and
As time passed, the IEEE improved Ethernet standards in
ways that made Ethernet a reasonable WAN technology.
For example, the 1000BASE-LX standard uses singlemode
fiber cabling, with support for a 5-km cable length;
the 1000BASE-ZX standard supports an even longer 70-
km cable length. As time went by, and as the IEEE
improved cabling distances for fiber Ethernet links,
Ethernet became a reasonable WAN technology.
The one Ethernet WAN service goes by two names:
Ethernet emulation and Ethernet over MPLS (EoMPLS).
Ethernet emulation is a general term, meaning that the
service acts like one Ethernet link. EoMPLS refers to
Multiprotocol Label Switching (MPLS), which is one
technology that can be used inside the SP’s cloud

the EoMPLS service provides


A point-to-point connection between two customer
devices
Behavior as if a fiber Ethernet link existed between
the two devices

The EoMPLS link uses Ethernet for both Layer 1 and


Layer 2 functions. That means the link uses the same
familiar Ethernet header and trailer

Internet Access
IP packets can flow from every
customer of every ISP to every other customer of every
other ISP.

Consumers often use technologies like DSL and cable for


Internet access links. These technologies use cabling that
is already installed in most homes, making these services
somewhat inexpensive for home users. DSL uses the
analog phone lines that are already installed in homes,
while cable Internet uses the cable TV (CATV) cable.
$

internet using phone


line-------------------------------------------------------------------------------
-------------
Digital subscriber line (DSL):
it uses the
same single-pair telephone line used for a typical home
phone line ; DSL instead just provides
a short physical link from a home to the telco’s network,
allowing access to the Internet.
PSTN.: public switched telephone network
DSLAM : DSL access multiplexer
the teleco use a DSLAM to splito out the voice and data . voice over the PSTN
and data over The internet
costumer should use a filter with tow port . one for phone and second for dsl
modem (the dsl modem tranfer signla analogique to numirique ) . this dslmodem
connected directyl
with router
DSL gives telcos a useful high-speed Internet service to
offer their customers
DSL supports
asymmetric speeds, meaning that the transmission speed
from the ISP toward the home (downstream) is much faster
than the transmissions toward the ISP (upstream).
why ?
because clicking a web page sends
only a few hundred bytes upstream into the Internet, but
can trigger many megabytes of data to be delivered

internet using catv


line-------------------------------------------------------------------------------
-------------
Cable internet :
Cable Internet also uses the same basic in-home cabling
concepts as does DSL
but with the DSL details
replaced with cable Internet details. The telephone line
has been replaced with coaxial cable from the CATV
company, and the DSL modem has been replaced by a
cable modem.
cable Internet An Internet access technology that uses a
cable TV (CATV) cable, normally used for video, to send
and receive data.
catv company use a machine split out the data over the internet and video video
dishes for distribution

different between cable and dsl connection:

Cable Internet service and DSL directly compete for


consumer and small-business Internet access. Generally
speaking, while both offer high speeds, cable Internet
typically runs at faster speeds than DSL, with DSL
providers keeping their prices a little lower to compete.
Both support asymmetric speeds, and both provide an
“always on” service, in that you can communicate with the
Internet without the need to first take some action to start
the Internet connection.

Chapter 4. Fundamentals of IPv4 Addressing and Routing -------------------------

The TCP/IP network layer (Layer 3) defines how to deliver IP packets from the
original
device that creates the packet to the device that needs to receive the packet

IP routing : The process of hosts and routers forwarding IP packets (Layer 3


protocol data
units [PDU]), while relying on the underlying LANs and WANs to forward the bits.

IP addressing: Addresses used to identify a packet’s source and destination host


computer.
Addressing rules also organize addresses into groups, which greatly assists the
routing
process.

IP routing protocol: A protocol that aids routers by dynamically learning about the
IP
address groups so that a router knows where to route IP packets so that they go to
the right
destination host.

Other utilities: The network layer also relies on other utilities. For TCP/IP,
these utilities
include Domain Name System (DNS), Address Resolution Protocol (ARP), and ping.

1:a.c
2:d
3:baset
df
c
c
c
cd

1 A and C 2 B 3 D
4 D and F 5 A 6 C 7 B and C 8 A and 9 C

The host always sends packets to its default


gateway.

The host always sends packets to its default


gateway.Which of the following does a router normally use
when making a decision about routing TCP/IP
packets?
a. Destination MAC address
b. Source MAC address
c. Destination IP address
d. Source IP address
e. Destination MAC and IP addresses
7. Which of the following are true about a LANconnected
TCP/IP host and its IP routing
(forwarding) choices? (Choose two answers.)
a. The host always sends packets to its default
gateway.
b. The host sends packets to its default gateway if
the destination IP address is in a different class of
IP network than the host.
c. The host sends packets to its default gateway if
the destination IP address is in a different subnet
than the host.
d. The host sends packets to its default gateway if
the destination IP address is in the same subnet as
the host.
8. Which of the following are functions of a routing
protocol? (Choose two answers.)
a. Advertising known routes to neighboring routers
b. Learning routes for subnets directly connected to
the router
c. Learning routes, and putting those routes into the
routing table, for routes advertised to the router
by its neighboring routers
d. Forwarding IP packets based on a packet’s
destination IP address
9. A company implements a TCP/IP network, with
PC1 sitting on an Ethernet LAN. Which of the
following protocols and features requires PC1 to
learn information from some other server device?
a. ARP
b. ping
c. DNS
d. None of these answers is correct.
*----------------------------------------------------------
CHAPTER 4 .

path selection / how routing protocols


select the best route among the competing
routes to the same destination

Host Forwarding Logic: Send the Packet to the


Default Router

IF pc 1 WANT TO SEND a packet to an other hosts did't exist in his subnet it will
send it directly to default getway
using data link layer (layer é° ADDRESSING *using mac addressing *

The default router is also referred to as the


default gateway

each router build his ip table This table


lists IP address groupings, called IP networks and IP
subnets. so when hi reciver a packett . he compare the ip distination of this
packet with his table then hi take and select best path to send it .

it router want to send a packet to a pc 2 . he de-encapsulate the packet and sent


it direcly to pc2 using mac addresing (layer 2 )

the router determines which data-link address to use


is the IP Address Resolution Protocol (ARP). ARP
dynamically learns the data-link address of an IP host
connected to a LAN

Routing as covered so far has two main concepts:


The process of routing forwards Layer 3 packets,
also called Layer 3 protocol data units (L3 PDU),
based on the destination Layer 3 address in the
packet.
The routing process uses the data link layer to
encapsulate the Layer 3 packets into Layer 2 frames
for transmission across each successive data link.

IP network = IP subnet
Any device that has at least one
interface with an IP address can send and receive IP
packets and is called an IP host

IP addresses consist of a 32-bit number, usually written in


dotted-decimal notation (DDN).

168.1.1.1 is an IP
address written in dotted-decimal

Appendix A,
“Numeric Reference Tables,” to easily convert from DDN
to binary or vice versa.)
Classes A, B, and C define unicast IP addresses,
meaning that the address identifies a single host interface.
Class D defines multicast addresses, used to send one
packet to multiple hosts. Class E originally defined
experimental addresses. (Class E addresses are no longer
defined as experimental, and are simply reserved for
future use.)

Network Numbers Host per network


class A 126 16.777.214
Class B 16384 65534
Class C 2.097.152 254

The term classful IP network refers to any


Class A, B, or C network, because it is
defined by Class A, B, and C rules.

IP Subnetting
Like IP addressing, IP subnetting is also one of the most
important topics for the CCENT and CCNA R&S
certifications.

the name subnet is just shorthand for


subdivided network.

Subnetting defines methods of further subdividing the IPv4


address space into groups that are smaller than a single IP
network.

Summary of Router Forwarding Logic

First, when a router receives a data-link frame addressed


to that router’s data-link address, the router needs to think
about processing the contents of the frame. When such a
frame arrives, the router uses the following logic on the
data-link frame:

Step 1. Use the data-link Frame Check Sequence (FCS)


field to ensure that the frame had no errors; if
errors occurred, discard the frame.
Step 2. Assuming that the frame was not discarded at
Step 1, discard the old data-link header and
trailer, leaving the IP packet.
Step 3. Compare the IP packet’s destination IP address
to the routing table, and find the route that best
matches the destination address. This route
identifies the outgoing interface of the router, and
possibly the next-hop router IP address.
Step 4. Encapsulate the IP packet inside a new data-link
header and trailer, appropriate for the outgoing
interface, and forward the frame...
.

how the routing protocol works:

To dynamically learn and fill the routing table with a


route to each subnet in the internetwork.
If more than one route to a subnet is available, to
place the best route in the routing table.
To notice when routes in the table are no longer
valid, and to remove them from the routing table.
If a route is removed from the routing table and
another route through another neighboring router is
available, to add the route to the routing table.
(Many people view this goal and the preceding one
as a single goal.)
To work quickly when adding new routes or
replacing lost routes. (The time between losing the
route and finding a working replacement route is
called convergence time.)
To prevent routing loops.

the goals of a routing protocol:


To dynamically learn and fill the routing table with a
route to each subnet in the internetwork.
If more than one route to a subnet is available, to
place the best route in the routing table.
To notice when routes in the table are no longer
valid, and to remove them from the routing table.
If a route is removed from the routing table and
another route through another neighboring router is
available, to add the route to the routing table.
(Many people view this goal and the preceding one
as a single goal.)
To work quickly when adding new routes or
replacing lost routes. (The time between losing the
route and finding a working replacement route is
called convergence time.)
To prevent routing loops.

many routing protocols use the same


general steps for learning routes:

Step 1. Each router, independent of the routing protocol,


adds a route to its routing table for each subnet
directly connected to the router.
Step 2. Each router’s routing protocol tells its neighbors
about the routes in its routing table, including the
directly connected routes and routes learned from
other routers.
Step 3. After learning a new route from a neighbor, the
router’s routing protocol adds a route to its IP
routing table, with the next-hop router of that route
typically being the neighbor from which the route
was learned.

Re: Requests For Comments (RFC),

The Address Resolution Protocol:

Note that hosts remember the ARP results, keeping the


information in their ARP cache or ARP table. A host or
router only needs to use ARP occasionally, to build the
ARP cache the first time. Each time a host or router needs
to send a packet encapsulated in an Ethernet frame, it first
checks its ARP cache for the correct IP address and
matching MAC address. Hosts and routers will let ARP
cache entries time out to clean up the table, so occasional
ARP Requests can be seen.

You can see the contents of the ARP cache on


most PC operating systems by using the arp -
a command from a command prompt

ICMP Echo and the ping Command:

Ping (Packet Internet Groper) uses the Internet Control


Message Protocol (ICMP), sending a message called an
ICMP echo request to another IP address The computer
with that IP address should reply with an ICMP echo
reply.
ICMP
does not rely on any application, so it really just tests
basic IP connectivity—Layers 1, 2, and 3 of the OSI
model

Chapter 5. Fundamentals of TCP/IP Transport and Applications :


Transmission Control Protocol
(TCP) and User Datagram Protocol (UDP).

TCP/IP Layer 4 Protocols: TCP and UDP


The OSI transport layer (Layer 4) defines several
functions, the most important of which are error recovery
and flow control
The key difference between TCP and UDP is that TCP
provides a wide variety of services to applications,
whereas UDP does not. For example, routers discard
packets for many reasons, including bit errors, congestion,
and instances in which no correct routes are known. As
you have read already, most data-link protocols notice
errors (a process called error detection) but then discard
frames that have errors. TCP provides retransmission
(error recovery) and helps to avoid congestion (flow
control), whereas UDP does not. As a result, many
application protocols choose to use TCP.
However, do not let UDP’s lack of services make you
think that UDP is worse than TCP. By providing fewer
services, UDP needs fewer bytes in its header compared
to TCP, resulting in fewer bytes of overhead in the
network. UDP software does not slow down data transfer
in cases where TCP can purposefully slow down. Also,
some applications, notably today Voice over IP (VoIP) and
video over IP, do not need error recovery, so they use
UDP. So, UDP also has an important place in TCP/IP
networks today.

Multiplexing Using Port in Tcp And Udp

Multiplexing relies on a concept called a socket. A socket


consists of three things:
An IP address
A transport protocol
A port number
exemple of socket in clien and server :
(10.1.1.2, TCP, port 80)
(10.1.1.1, TCP, 1030)
re:
dynamic port numbers starting at 1024 because the ports
below 1024 are reserved for well-known applications
Multiplexing, based on sockets, ensures that the data is delivered to the correct
applications

Port numbers are a vital part of the socket concept


application give a service to clients like ftp web telnet . use a well-know port
number and open a socket then it listen for cnx request of clients who whant
their service
and the client must include the source and destination port in thier connection
request

On client machines, where the requests originate, any


locally unused port number can be allocated. The result is
that each client on the same host uses a different port
number, but a server uses the same port number for all
connections (i mean here the web server for exemple)

Cisco supplies a large


variety of network management products, many of them in
the Cisco Prime network management software product
family. They can be used to query, compile, store, and
display information about a network’s operation. To query
the network devices, Cisco Prime software mainly uses
SNMP protocols.
Cisco used Trivial File Transfer Protocol (TFTP). TFTP
defines a protocol for basic file transfer—hence the word
trivial

Some of these applications use TCP, and some use UDP.


For example, Simple Mail Transfer Protocol (SMTP) and
Post Office Protocol version 3 (POP3), both used for
transferring mail, require guaranteed delivery, so they use
TCP.

Port number Protocol Applications


20 tcp ftp data
21 tcp ftp control
22 tcp ssh
23 tcp telnet
25 tcp smtp
53 tcp/udp dns
67 udp dhcp server
68 udp dhcp client
69 udp tftp
80 udb web
110 tcp pop3
161 udp snmp
443 tcp ssl
514 udp syslog

Connection Establishment and Termination


syn >>>>
ack syc<<<<
ack>>>>>>
This three-way connection establishment flow (also called
a three-way handshake) must complete before data transfer
can begin.
for termination of the connection
ack-fin>>>>
ack<<<<<<<
ack-fin<<<<<<
ack>>>>>>

TCP establishes and terminates connections between the


endpoints, whereas UDP does not. Many protocols operate
under these same concepts, so the terms connectionoriented
and connectionless are used to refer to the
general idea of each. More formally, these terms can be
defined as follows:

Connection-oriented protocol: A protocol that


requires an exchange of messages before data
transfer begins, or that has a required preestablished
correlation between two endpoints.
Connectionless protocol: A protocol that does not
require an exchange of messages and that does not
require a pre-established correlation between two
endpoints.
Error Recovery and Reliability - mawto9iya

TCP provides for reliable data transfer, which is also


called reliability or error recovery
To accomplish reliability, lita79i9 mawto9ia - TCP
numbers data bytes using the Sequence and
Acknowledgment fields in the TCP header.

TCP achieves
reliability in both directions, using the Sequence Number
field of one direction combined with the Acknowledgment
field in the opposite direction

Note that this convention of acknowledging by listing the next expected


byte, rather than the number of the last byte received, is
called forward acknowledgment. ( sender safet 3 octet receiver kay9olo finaahya
ocetet4 hadak kaytsama forward ack )

The receipt of an acknowledgment that does not


acknowledge all the data sent so far tells the sending host
to resend the data. The PC on the left may wait a few
moments to make sure no other acknowledgments arrive
(using a timer called the retransmission timer), but will
soon decide that the server means “I really do need 2000
next—resend it.” The PC on the left does so.

Flow Control Using Windowing:


the reciver sent an ack 1000 and also how much window is larger.
then the sender sent a byte selon this windiw . when the first window is finish
the
receipte sent a ack then if he want to make window more larger sent other message
to reciver to send selon the new windiw

if reciver recive the ack before the window is finished . it automaticy send a new
windows .
in oder word ; TCP does not want to make the sending host have to wait
to send data. For instance, if an acknowledgment is
received before the window is exhausted, a new window
begins, and the sender continues sending data until the
current window is exhausted. Often times, in a network
that has few problems, few lost segments, and little
congestion, the TCP windows stay relatively large with
hosts seldom waiting to send.

User Datagram Protocol


UDP provides a service for applications to exchange
messages. Unlike TCP, UDP is connectionless and
provides no reliability, no windowing, no reordering of
the received data, and no segmentation of large chunks of
data into the right size for transmission. However, UDP
provides some functions of TCP, such as data transfer and
multiplexing using port numbers,UDP provides a service for applications to exchange
messages. Unlike TCP, UDP is connectionless and
provides no reliability, no windowing, no reordering of
the received data, and no segmentation of large chunks of
data into the right size for transmission. However, UDP
provides some functions of TCP, such as data transfer and
multiplexing using port numbers,

UDP data transfer differs from TCP data transfer in that no


reordering or recovery is accomplished. Applications that
use UDP are tolerant of the lost data, or they have some
application mechanism to recover lost data. For example
VoIP Also, DNS requests use
UDP because the user will retry an operation if the DNS
resolution fails

header udp :
source port + desteniation port
lenght + checksum

TCP/IP Applications:

Uniform Resource Identifiers: URI : many people use the terms web
address or the similar related term Universal Resource
Locator (URL) instead of URI, but URI is indeed the
correct formal term. URL had been more
commonly used than URI for more than a few years.
However, the IETF (the group that defines TCP/IP), along
with the W3C consortium (W3.org, a consortium that
develops web standards) has made a concerted effort to
standardize the use of URI as the general term

Format :SChema Authority Path


http :// www.cisco.com / blog
Example web Server's Name web page

Figure 5-11 Structure of a URI Used to Retrieve a Web Page

Finding the Web Server Using DNS :


in this part . autor show us how pc send the paquet to the web server then a user
write URI
so the pc contact the Server Dns to know the ip @ of Web server and then it well
contact directly the web server

Transferring Files with HTTP


HTTP defines several commands and responses, with the
most frequently used being the HTTP GET request. To get
a file from a web server, the client sends an HTTP GET
request to the server, listing the filename. If the server
decides to send the file, the server sends an HTTP GET
response, with a return code of 200 (meaning OK), along
with the file’s contents.
THE PAge content many object . so when the page load in the web browser it call the
other objects
client tape http://www.cisco.com/go/ccna.indx
http get request /go/ccna
http get reponse /go/ccna
http get request /graphique/log1.gife
http get rponse /graphique/log1.gife
... etc----etc
Multiple HTTP Get Requests/Responses

How the Receiving Host Identifies the Correct


Receiving Application

the fram content a type field deterime the next header in the case we have type
field = 0x800 so it s ipv4
in the header Network wi have a field ip protocole field .define the tcp our udp
in this case we have 6 for tcp 17 for udp .
after that in transport layer we determine the application by using port number

You might also like