Vous êtes sur la page 1sur 21

Network OSI Model

Defining the Communications


Subnetwork

1
What to do in follow ?
In the following exercises, you will:
Define the Physical layer by showing a
data transfer.
Define the Data Link layer by showing
the MAC address of a network adapter.
Define the Network Layer by using
ipconfig, ping, and protocol analyzers.
Define Layer 2 and Layer 3 switches.

2
Define the Physical Layer

Go to SpeedTest.net

Download speed and upload speed

3
Define the Physical Layer
Fig show the data
transfer

4
Define the Data Link layer
Type cmd in windows
Type the ipconfig/all command and press Enter
 we get IP addressee not MAC addressee
Type arp –a to see « Mac add of connected
devices »
The Data Link layer is where networking
standards such as Ethernet (802.3) and Token
Ring (802.5) reside

5
Define the Data Link layer
Configuration IP de Windows
 Nom de l’hôte . . . . . . . . . . : DESKTOP-TVA0B4M
 Suffixe DNS principal . . . . . . :
 Type de noeud. . . . . . . . . . : Hybride
 Routage IP activé . . . . . . . . : Non
 Proxy WINS activé . . . . . . . . : Non
Carte Ethernet Ethernet :
 Statut du média. . . . . . . . . . . . : Média déconnecté
 Suffixe DNS propre à la connexion. . . :
 Description. . . . . . . . . . . . . . : Intel(R) Ethernet Connection (3) I218-LM
 Adresse physique . . . . . . . . . . . : 70-5A-0F-8B-21-87
 DHCP activé. . . . . . . . . . . . . . : Oui
 Configuration automatique activée. . . : Oui

6
Define the Data Link layer
Carte réseau sans fil Connexion au réseau local* 1 :
 Statut du média. . . . . . . . . . . . : Média déconnecté
 Suffixe DNS propre à la connexion. . . :
 Description. . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
 Adresse physique . . . . . . . . . . . : 64-80-99-D1-98-78
 DHCP activé. . . . . . . . . . . . . . : Oui
 Configuration automatique activée. . . : Oui
Carte réseau sans fil Connexion au réseau local* 10 :
 Statut du média. . . . . . . . . . . . : Média déconnecté
 Suffixe DNS propre à la connexion. . . :
 Description. . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2
 Adresse physique . . . . . . . . . . . : 66-80-99-D1-98-77
 DHCP activé. . . . . . . . . . . . . . : Oui
 Configuration automatique activée. . . : Oui

7
Define the Data Link layer
Carte réseau sans fil Wi-Fi :
 Suffixe DNS propre à la connexion. . . :
 Description. . . . . . . . . . . . . . : Intel(R) Dual Band Wireless-N 7265
 Adresse physique . . . . . . . . . . . : 64-80-99-D1-98-77
 DHCP activé. . . . . . . . . . . . . . : Non
 Configuration automatique activée. . . : Oui
 Adresse IPv6 de liaison locale. . . . .: fe80::c400:cc49:99f8:f8f2%21(préféré)
 Adresse IPv4. . . . . . . . . . . . . .: 10.0.0.6(préféré)
 Masque de sous-réseau. . . . . . . . . : 255.255.255.0
 Passerelle par défaut. . . . . . . . . : 10.0.0.1
 IAID DHCPv6 . . . . . . . . . . . : 224690329
 DUID de client DHCPv6. . . . . . . . : 00-01-00-01-26-D2-F6-7B-70-5A-0F-8B-
21-87
 Serveurs DNS. . . . . . . . . . . . . : 8.8.8.8
 4.4.4.4
 NetBIOS sur Tcpip. . . . . . . . . . . : Activé

8
Define Layer 2 Switching

The Data Link layer is also where Layer 2 switches reside


A Layer 2 switch - the most common type of switch - used on a LAN
They are hardware-based + they use
the MAC address of “each host computer’s network adapter” when
deciding where to direct frames of data
every port on the switch is mapped to the specific MAC address of
the computer that physically connects to it
Layer 2 switches do not normally modify frames
as they pass through the switch on their way from one computer to
another
Each port on a switch is its own segment This means that every
computer connected to a Layer 2 switch
has its own usable bandwidth—whatever the switch is rated at: 10
Mbps, 100 Mbps, 1Gbps, and so on.

9
Define Layer 2 Switching
Switches have memory that is set aside to
store the MAC address to a port translation table, known as the
MAC table or Content Addressable Memory table (CAM table)
This table can be compromised with a MAC flood attack
MAC flood attack fill up the memory space on the switch - If
this is successful, the switch changes state to what is known as
failopen mode - At this point, the switch broadcasts data on all
ports the way a hub does
This means two things:
First, the network
bandwidth is dramatically reduced, and second,
a mischievous person could now use a protocol analyzer, running in promiscuous
mode, to capture data from any other computer on the network.

10
Define Layer 2 Switching
Layer 2 switching can also allow for a virtual LAN (VLAN) to be implemented
A VLAN is implemented to segment the network, reduce collisions, organize the
network, boost performance, and, hopefully, increase security.
It is important to place physical network jacks in secure locations, when it comes
to VLANs that have access to confidential data
There are also logical types of VLANs, such as the protocol-based VLAN and
the MAC address-based VLAN, which have a separate set of security
precautions
The most common standard associated with VLANs is IEEE 802.1Q, which
modifi es Ethernet frames by “tagging” them with the appropriate VLAN
information
VLANs are used to restrict access to network resources, but this can be
bypassed using VLAN hopping.
VLAN hopping can be avoided by upgrading fi rmware or software, picking an
unused VLAN as the default VLAN for all trunks, and redesigning the VLAN if
multiple 802.1Q switches are being used

11
Define Layer 2 Switching
Wireless access points,
bridges,
Layer 2 switches, and network
adapters all reside on : - the Data Link
layer.

12
Define the Network Layer

The Network layer governs IP addresses,


routers/Layer 3 switches, and the core
communications of TCP/IP.
In the following exercise, you’ll see the
Network layer in action by analyzing IP
addresses, pinging other computers, and
capturing Network layer data with a protocol
analyzer.
Afterward, we’ll define a Layer 3 switch.

13
Define the Network Layer LAB
1. Open the Command Prompt window
2. Execute ipconfig. This displays your IP address, for example, 192.168.1.1. The IP
address is developed from the Internet Protocol (IP), which resides on Layer 3 of the
OSI model
3. Ping the other computer’s IP address by executing the ping [ip address] command
(for example, ping 192.168.1.2). Make sure you can get replies from the other
computer. Ping utilizes the Internet Control Message Protocol (ICMP) to send test
packets to other computers Network layer protocol. Notice the size of the replies you
receive; by default, they should be 32 bytes each
4. Execute arp – a to view the IP address to MAC address table.
This table should now show the IP address you just pinged.
This table is known as the Address Resolution Protocol table, or ARP table. The
Address Resolution Protocol is another Layer 3 protocol that resolves or translates IP
addresses to MAC addresses, allowing the connectivity between the Layer 3 IP
system and the Layer 2 Ethernet system.

14
Define the Network Layer LAB
5.Use Wireshark to capture and analyze
ICMP packets:

15
Define the Network Layer LAB
Understanding Layer 3 Switching

Switches also reside on the Network layer. A Layer 3 switch differs from a
Layer 2 switch in that it determines paths for data using logical addressing (IP
addresses) instead of
physical addressing (MAC addresses)
Layer 3 switches are very similar to routers; it’s how a network engineer
implements the switch that makes them different.
Layer 3 switches forward packets, whereas Layer 2 switches forward frames.
Layer 3 switches are usually managed switches; they can be managed via the
network engineer by utilizing the Simple Network Management Protocol
(SNMP), among other tools.
This allows the network engineer to analyze all the packets that pass through
the switch, which can’t be done with a Layer 2 switch.
A Layer 2 switch is more like an advanced version of
a bridge, whereas a Layer 3 switch is more like a router.
Layer 3 switches are used in busy
environments where multiple IP networks need to be connected together.

16
Define the Network Layer LAB
Understanding Characteristics of Switches

When selecting the type of switches, you should


consider the following:
■■ Number and types of ports and their transmission
speed
■■ Number and speed of uplink ports
■■ Expandability capabilities
■■ Managed or unmanaged
■■ VLAN capabilities
■■ Hardware redundancy
■■ Security options
■■ Routing/Layer 3 capabilities

17
Define the Network Layer LAB
Understanding Characteristics of Switches
The more devices that you have, the faster backplane and processing
required to handle the traffic and process the packets
Uplink ports are used to connect different types of Ethernet devices to
each other, such as connecting a small switch to a larger switch, or a
switch to a router
An uplink port resembles any other port on a hub or switch but it is
normally labeled as an uplink port
Switches can be divided into unmanaged and managed switches.
Unmanaged switches are the least expensive and are used in homes and
Small Office/Home Office environments. With unmanaged switches, you
just connect AC power to the switch and connect your network devices.
Smart switches are more advanced switches that include a command-
line interface or web interface to configure the switch.
Managed switches include more advanced features, including
supporting Spanning Tree Protocol, port mirroring, setting port
bandwidth, and creating and modifying virtual LANs.
18
Define the Network Layer LAB
Understanding Characteristics of Switches
The Spanning Tree Protocol (STP) and LOOP

The Spanning Tree Protocol (STP) is a network protocol that prevents


bridge loops when connecting multiple switches.
If a loop is created and the switches do not use STP, looping traffic can
take a local area network down.
STP also allows you to use redundant links between switches without
causing a loop.
Hardware redundancy is a method used in cases where critical hardware
components fail and another system is available to take over.
If one component fails the network will continue to function because
another piece of physical hardware takes over the load.
Hardware redundancy is achieved by providing two or more physical
copies of a hardware
component.
Thus, hardware redundancy brings a number of disadvantages including
increased size, power consumption, and cost. Consequently, the choices
need to be weighed prior to incorporating hardware redundancy.
19
Define the Network Layer LAB
Understanding Characteristics of Switches
Virtual Switch (vSwitch)
A virtual switch (vSwitch) is a software application that allows
communication between
virtual machines.
It allows one virtual machine to communicate with another. It does more
than just forward data packets, it directs network communication by
checking the data packets.
 A virtual switch provides a mechanism
to reduce the complexity of a network’s configuration by reducing the
number of physical
switches needed
A virtual switch is usually embedded into installed software, but they
may also be included in a server’s hardware as part of its firmware.
A virtual switch is completely virtual and can connect to a network
interface card (NIC).
The vSwitch merges physical switches into a single logical switch.

20
Define the Network Layer LAB
Understanding Characteristics of Switches
Virtual Switch (vSwitch)
Virtual switches help ease the deployment and
migration of virtual servers.
Virtual switches allows network :

administrators to manage virtual switches


deployed:
by using a hypervisor. A hypervisor or virtual
machine monitor (VMM) is computer software
that creates and runs the virtual machines.
It is easier to set up a virtual switch compared
to installing a physical switch
21

Vous aimerez peut-être aussi