SlideShare a Scribd company logo
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer
Network Fundamentals – Chapter 5
2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives
 Identify the role of the Network Layer, as it describes
communication from one end device to another end device
 Examine the most common Network Layer protocol, Internet
Protocol (IP), and its features for providing connectionless and
best-effort service
 Understand the principles used to guide the division or grouping
of devices into networks
 Understand the hierarchical addressing of devices and how this
allows communication between networks
 Understand the fundamentals of routes, next hop addresses and
packet forwarding to a destination network
3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Define the basic role of the Network Layer in data
networks
4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Identify the basic characteristics and the role of the
IPv4 protocol
5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Describe the implications for the use of the IP protocol
as it is connectionless
6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Describe the implications for the use of the IP protocol
as it is considered an unreliable protocol
7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Describe the implications for the use of the IP as it is
media independent
8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Describe the role of framing in the Transport Layer and
explain that segments are encapsulated as packets
9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol
(IP)
 Identify the major header fields in the IPv4 protocol and
describe each field's role in transporting packets
10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 List several different reasons for grouping devices into
sub-networks and define several terms used to identify
the sub-networks
11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 List several ways in which dividing a large network can
increase network performance
12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 List several ways in which dividing a large network can
increase network security
13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 Explain the communication problems that emerge when
very large numbers of devices are included in one large
network
14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 Describe how hierarchical addressing solves the
problem of devices communicating across networks of
networks
15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and
Hierarchical Addressing
 Describe the purpose of further subdividing networks
into smaller networks
16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the role of an intermediary gateway device in
allowing devices to communicate across sub-divided
networks
17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Trace the steps of an IP packet as it traverses
unchanged via routers from sub network to sub-network
18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the role of a gateway and the use of a simple
route table in directing packets toward their ultimate
destinations
19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Define a route and its three key parts
20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the purpose and use of the destination
network in a route
21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the purpose and use of the next hop in a route
22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Trace the steps of several IP packets as they are
routed through several gateways from devices on one
sub network to devices on other sub networks
23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Describe the purpose of routing protocols and the need
for both static and dynamic routes
24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Explain how routes are manually configured to build
routing table
25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses
and Packet Forwarding
 Explain the role of routing protocols in building the
routing table
26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary
27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

More Related Content

What's hot

CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2Irsandi Hasan
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3Irsandi Hasan
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
Sachii Dosti
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2Irsandi Hasan
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
Sachii Dosti
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
Irsandi Hasan
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2Raghu nath
 
CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1Irsandi Hasan
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Carmelo de Jesús
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Carmelo de Jesús
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
Irsandi Hasan
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
Vuz Dở Hơi
 

What's hot (20)

CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
 
Exploration network chapter11
Exploration network chapter11Exploration network chapter11
Exploration network chapter11
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1CCNA Exploration 3 - Chapter 1
CCNA Exploration 3 - Chapter 1
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3
 
MyNFChapter5
MyNFChapter5MyNFChapter5
MyNFChapter5
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 

Viewers also liked

Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
Rutwik Jadhav
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7Irsandi Hasan
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
Abdelkhalik Mosa
 
Chapter3
Chapter3Chapter3
Chapter3
Nagarajan
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 

Viewers also liked (6)

Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Chapter3
Chapter3Chapter3
Chapter3
 
Data link layer
Data link layer Data link layer
Data link layer
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 

Similar to CCNA Exploration 1 - Chapter 5

Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.ppt
NukriTskvitaia
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5r82093403
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
Sachii Dosti
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.ppt
ssuser7c54e61
 
CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6Irsandi Hasan
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2r82093403
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3Irsandi Hasan
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6r82093403
 
chapter_5
chapter_5chapter_5
chapter_5
Vero Deg
 
Exploration network chapter9
Exploration network chapter9Exploration network chapter9
Exploration network chapter9r82093403
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3Irsandi Hasan
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4Irsandi Hasan
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3r82093403
 
Exploration network chapter10
Exploration network chapter10Exploration network chapter10
Exploration network chapter10r82093403
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4r82093403
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IRJET Journal
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10Irsandi Hasan
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
Chaing Ravuth
 

Similar to CCNA Exploration 1 - Chapter 5 (20)

Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.ppt
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.ppt
 
CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
chapter_5
chapter_5chapter_5
chapter_5
 
Exploration network chapter9
Exploration network chapter9Exploration network chapter9
Exploration network chapter9
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3
 
Exploration network chapter10
Exploration network chapter10Exploration network chapter10
Exploration network chapter10
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 

More from Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Irsandi Hasan
 

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

CCNA Exploration 1 - Chapter 5

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5
  • 2. 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives  Identify the role of the Network Layer, as it describes communication from one end device to another end device  Examine the most common Network Layer protocol, Internet Protocol (IP), and its features for providing connectionless and best-effort service  Understand the principles used to guide the division or grouping of devices into networks  Understand the hierarchical addressing of devices and how this allows communication between networks  Understand the fundamentals of routes, next hop addresses and packet forwarding to a destination network
  • 3. 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Define the basic role of the Network Layer in data networks
  • 4. 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Identify the basic characteristics and the role of the IPv4 protocol
  • 5. 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP protocol as it is connectionless
  • 6. 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP protocol as it is considered an unreliable protocol
  • 7. 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP as it is media independent
  • 8. 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the role of framing in the Transport Layer and explain that segments are encapsulated as packets
  • 9. 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Identify the major header fields in the IPv4 protocol and describe each field's role in transporting packets
  • 10. 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several different reasons for grouping devices into sub-networks and define several terms used to identify the sub-networks
  • 11. 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several ways in which dividing a large network can increase network performance
  • 12. 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several ways in which dividing a large network can increase network security
  • 13. 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Explain the communication problems that emerge when very large numbers of devices are included in one large network
  • 14. 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Describe how hierarchical addressing solves the problem of devices communicating across networks of networks
  • 15. 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Describe the purpose of further subdividing networks into smaller networks
  • 16. 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the role of an intermediary gateway device in allowing devices to communicate across sub-divided networks
  • 17. 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Trace the steps of an IP packet as it traverses unchanged via routers from sub network to sub-network
  • 18. 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the role of a gateway and the use of a simple route table in directing packets toward their ultimate destinations
  • 19. 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Define a route and its three key parts
  • 20. 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose and use of the destination network in a route
  • 21. 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose and use of the next hop in a route
  • 22. 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Trace the steps of several IP packets as they are routed through several gateways from devices on one sub network to devices on other sub networks
  • 23. 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose of routing protocols and the need for both static and dynamic routes
  • 24. 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Explain how routes are manually configured to build routing table
  • 25. 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Explain the role of routing protocols in building the routing table
  • 26. 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary
  • 27. 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public