SlideShare a Scribd company logo
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Version 4.0
OSI Network Layer
2
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives
 Identify the role of the Network Layer, as it describes
communication from one end device to another end device.
 Examine the most common Network Layer protocol, Internet
Protocol (IP), and its features for providing connectionless and
best-effort service.
 Understand the principles used to guide the division or grouping
of devices into networks.
 Understand the hierarchical addressing of devices and how this
allows communication between networks.
 Understand the fundamentals of routes, next hop addresses and
packet forwarding to a destination network.
3
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol (IP)
 Define the basic role of the Network Layer in data
networks
4
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol (IP)
 Identify the basic characteristics and the role of the
IPv4 protocol
5
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol (IP)
 Describe the implications for the use of the IP protocol
as it is connectionless
6
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol (IP)
 Describe the implications for the use of the IP protocol
as it is considered an unreliable protocol
7
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol (IP)
 Describe the implications for the use of the IP as it is
media independent
8
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol (IP)
 Describe the role of framing in the Transport Layer and
explain that segments are encapsulated as packets
9
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol (IP)
 Identify the major header fields in the IPv4 protocol and
describe each field's role in transporting packets
10
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Layer Protocols and Internet Protocol (IP)
 Identify the major header fields in the IPv4 protocol and
describe each field's role in transporting packets
11
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and Hierarchical
Addressing
 List several different reasons for grouping devices into
sub-networks and define several terms used to identify
the sub-networks
12
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and Hierarchical
Addressing
 List several ways in which dividing a large network can
increase network performance
13
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and Hierarchical
Addressing
 List several ways in which dividing a large network can
increase network security
14
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and Hierarchical
Addressing
 Explain the communication problems that emerge when
very large numbers of devices are included in one large
network
15
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and Hierarchical
Addressing
 Describe how hierarchical addressing solves the
problem of devices communicating across networks of
networks
16
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Grouping Devices into Networks and Hierarchical
Addressing
 Describe the purpose of further subdividing networks
into smaller networks
17
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Describe the role of an intermediary gateway device in
allowing devices to communicate across sub-divided
networks
18
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Trace the steps of an IP packet as it traverses
unchanged via routers from sub network to sub-network
19
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Describe the role of a gateway and the use of a simple
route table in directing packets toward their ultimate
destinations
20
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Define a route and its three key parts
21
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Describe the purpose and use of the destination
network in a route
22
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Describe the purpose and use of the next hop in a route
23
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Trace the steps of several IP packets as they are routed
through several gateways from devices on one sub
network to devices on other sub networks
24
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Describe the purpose of routing protocols and the need
for both static and dynamic routes
25
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Explain how routes are manually configured to build
routing table
26
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Fundamentals of Routes, Next Hop Addresses and
Packet Forwarding
 Explain the role of routing protocols in building the
routing table
27
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary
28
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public

More Related Content

Similar to Class I_OSI Network Layer by CISCO.ppt

CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6Irsandi Hasan
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6r82093403
 
CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9Irsandi Hasan
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3Irsandi Hasan
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7Irsandi Hasan
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
Sachii Dosti
 
Exploration network chapter9
Exploration network chapter9Exploration network chapter9
Exploration network chapter9r82093403
 
chapter_5
chapter_5chapter_5
chapter_5
Vero Deg
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3r82093403
 
CCNA Exploration 1 - Chapter 10
CCNA Exploration 1 - Chapter 10CCNA Exploration 1 - Chapter 10
CCNA Exploration 1 - Chapter 10Irsandi Hasan
 
Exploration network chapter10
Exploration network chapter10Exploration network chapter10
Exploration network chapter10r82093403
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
Yaser Rahmati
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
teknetir
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4Irsandi Hasan
 
Exploration network chapter7
Exploration network chapter7Exploration network chapter7
Exploration network chapter7r82093403
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4r82093403
 

Similar to Class I_OSI Network Layer by CISCO.ppt (20)

CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6CCNA Exploration 1 - Chapter 6
CCNA Exploration 1 - Chapter 6
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
Exploration network chapter9
Exploration network chapter9Exploration network chapter9
Exploration network chapter9
 
chapter_5
chapter_5chapter_5
chapter_5
 
Exploration network chapter5
Exploration network chapter5Exploration network chapter5
Exploration network chapter5
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3
 
CCNA Exploration 1 - Chapter 10
CCNA Exploration 1 - Chapter 10CCNA Exploration 1 - Chapter 10
CCNA Exploration 1 - Chapter 10
 
Exploration network chapter10
Exploration network chapter10Exploration network chapter10
Exploration network chapter10
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4CCNA Exploration 1 - Chapter 4
CCNA Exploration 1 - Chapter 4
 
Exploration network chapter7
Exploration network chapter7Exploration network chapter7
Exploration network chapter7
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Class I_OSI Network Layer by CISCO.ppt

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Version 4.0 OSI Network Layer
  • 2. 2 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives  Identify the role of the Network Layer, as it describes communication from one end device to another end device.  Examine the most common Network Layer protocol, Internet Protocol (IP), and its features for providing connectionless and best-effort service.  Understand the principles used to guide the division or grouping of devices into networks.  Understand the hierarchical addressing of devices and how this allows communication between networks.  Understand the fundamentals of routes, next hop addresses and packet forwarding to a destination network.
  • 3. 3 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Define the basic role of the Network Layer in data networks
  • 4. 4 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Identify the basic characteristics and the role of the IPv4 protocol
  • 5. 5 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP protocol as it is connectionless
  • 6. 6 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP protocol as it is considered an unreliable protocol
  • 7. 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the implications for the use of the IP as it is media independent
  • 8. 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Describe the role of framing in the Transport Layer and explain that segments are encapsulated as packets
  • 9. 9 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Identify the major header fields in the IPv4 protocol and describe each field's role in transporting packets
  • 10. 10 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Layer Protocols and Internet Protocol (IP)  Identify the major header fields in the IPv4 protocol and describe each field's role in transporting packets
  • 11. 11 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several different reasons for grouping devices into sub-networks and define several terms used to identify the sub-networks
  • 12. 12 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several ways in which dividing a large network can increase network performance
  • 13. 13 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  List several ways in which dividing a large network can increase network security
  • 14. 14 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Explain the communication problems that emerge when very large numbers of devices are included in one large network
  • 15. 15 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Describe how hierarchical addressing solves the problem of devices communicating across networks of networks
  • 16. 16 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Grouping Devices into Networks and Hierarchical Addressing  Describe the purpose of further subdividing networks into smaller networks
  • 17. 17 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the role of an intermediary gateway device in allowing devices to communicate across sub-divided networks
  • 18. 18 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Trace the steps of an IP packet as it traverses unchanged via routers from sub network to sub-network
  • 19. 19 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the role of a gateway and the use of a simple route table in directing packets toward their ultimate destinations
  • 20. 20 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Define a route and its three key parts
  • 21. 21 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose and use of the destination network in a route
  • 22. 22 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose and use of the next hop in a route
  • 23. 23 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Trace the steps of several IP packets as they are routed through several gateways from devices on one sub network to devices on other sub networks
  • 24. 24 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Describe the purpose of routing protocols and the need for both static and dynamic routes
  • 25. 25 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Explain how routes are manually configured to build routing table
  • 26. 26 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Fundamentals of Routes, Next Hop Addresses and Packet Forwarding  Explain the role of routing protocols in building the routing table
  • 27. 27 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary
  • 28. 28 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public