HCIA-Cloud Computing-Chapter4
HCIA-Cloud Computing-Chapter4
Network technologies are the basis for the interconnection of all platforms and services.
What exactly is a network? What are the basic principles of network communication?
And what are the common network technologies? This course will answer these
questions and more.
An IP address has 32 bits and consists of four bytes. For the convenience of reading and
writing, an IP address is usually in the format of dotted decimal notation.
⚫ Dotted decimal notation:
This type of IP address format is commonly used because it is easy to understand.
However, a communication device uses binary digits to calculate the IP address.
Therefore, it is necessary to master the conversion between decimal and binary digits.
⚫ IPv4 address range:
0.0.0.0–255.255.255.255
Public IP addresses are assigned by the Internet Corporation for Assigned Names and
Numbers (ICANN) to ensure that each IP address is unique on the Internet. Public IP
addresses can be used for accessing the Internet.
⚫ Private IP address
Some networks do not need to connect to the Internet, for example, a network in a
closed lab of a university. However, the IP addresses of network devices on the lab
network still need to be unique to avoid conflicts. Some IP addresses of classes A, B, and
C are reserved for this kind of situation. These IP addresses are called private IP
addresses.
Class A: 10.0.0.0–10.255.255.255
Class B: 172.16.0.0–172.31.255.255
Class C: 192.168.0.0–192.168.255.255
bits of a network segment is n, the number of IP addresses on the network segment is 2ⁿ,
and the number of available host addresses is 2ⁿ - 2 (subtracting the network address
and broadcast address).
encapsulates the packet, and sends the packet to different routers based on the
destination address. The packet is transmitted through the gateway and router,
leaves the local network, and is transmitted through the Internet.
⚫ The network cable is the medium for information transmission, and plays the same
role as the highway for item transmission.
4. After the plane arrives at the destination airport, the packages are taken out for
sorting, and the packages destined for the same area are sent to the same distribution
center:
⚫ The packet is transmitted through the Internet and reaches the local network where
the destination address resides. The gateway or router of the local network
decapsulates and encapsulates the packet, and then determines the next-hop router
according to the destination address. Finally, the packet reaches the gateway of the
network where the destination computer resides.
5. The distribution center sorts the packages according to the destination addresses on
the packages. The courier delivers the packages to the receiver. The receiver unpacks the
package, confirms that the items are intact, and signs for the package. The entire express
delivery process is complete:
⚫ After the packet reaches the gateway of the network where the destination
computer resides, the gateway decapsulates and encapsulates the packet, and then
sends the packet to the corresponding computer according to the destination
address. After receiving the packet, the computer verifies the packet. If the packet
passes verification, the computer accepts the packet and sends the data payload to
the corresponding application program for processing. A complete network
communication process is complete.
⚫ When a host (such as a PC, server, router, or firewall) wants to access another
network segment, the gateway is responsible for sending ARP packets, and receiving
and forwarding subsequent data packets.
⚫ After the gateway is configured, the default route is generated on the host, with the
next hop being the gateway.
data link layer of the TCP/IP model. A switch connects end users to a network and
forwards data frames.
A switch can:
⚫ Connect terminals (such as PCs and servers) to the network.
⚫ Isolate collision domains.
⚫ Broadcast unknown packets.
⚫ Learn MAC addresses and maintain the MAC address table.
⚫ Forward packets based on the MAC address table.
Note:
Broadcast domain: a group of nodes, among which a broadcast packet from one node
can reach all the other nodes.
Collision domain: an area where a collision occurs when two devices on the same
network send packets at the same time.
Media Access Control (MAC) address: uniquely identifies a network interface card (NIC)
on a network. Each NIC requires and has a unique MAC address.
MAC address table: exists on each switch and stores the mapping between MAC
addresses and switch interfaces.
⚫ Differences
1. TCP/IP includes the presentation layer and session layer into the application layer.
2. TCP/IP has a simpler structure with fewer layers.
3. TCP/IP standards are established based on practices during the Internet development
and are thereby highly trusted. In comparison, the OSI reference model is based on
theory and serves as a guide.
⚫ After the Ethernet module completes encapsulation, it sends the data to the physical
layer.
⚫ Based on the physical media, the physical layer converts digital signals into electrical
signals, optical signals, or electromagnetic (wireless) signals.
⚫ The converted signals are then transmitted on the network.
⚫ Internet Protocol (IP): encapsulates transport-layer data into data packets and
forwards packets from source sites to destination sites. IP provides a connectionless
and unreliable service.
⚫ Internet Group Management Protocol (IGMP): manages multicast group
memberships. Specifically, IGMP sets up and maintains memberships between IP
hosts and their directly connected multicast routers.
⚫ Internet Control Message Protocol (ICMP): sends control messages based on the IP
protocol and provides information about various problems that may exist in the
communication environment. Such information helps administrators diagnose
problems and take proper measures to resolve the problems.
⚫ Address Resolution Protocol (ARP): a TCP/IP protocol that discovers the data link
layer address associated with a given IP address. It maps IP addresses to MAC
addresses, maintains the ARP table that caches the mapping between IP addresses
and MAC addresses, and detects IP address conflicts on a network segment.
The following sections describe several of these protocols in detail.
4.2.3.2 TCP
segment and does not acknowledge the receipt of the segment. In this case, TCP
starts the retransmission mechanism.
⚫ Flow control: Each party of a TCP connection has a buffer with a fixed size. The
receiver allows the sender to send only the data that can be stored in the receive
buffer, which prevents buffer overflow caused by the high transmission rate of the
sender.
4.2.3.3 UDP
They both have advantages and disadvantages and apply to different scenarios.
4.2.3.5 Telnet
4.2.3.6 SSH
Collisions restrict Ethernet performance. Early Ethernet devices such as hubs work at
the physical layer, and cannot confine collisions to a particular scope. This restricts
network performance improvement.
⚫ Switch networking: Working at the data link layer, switches are able to confine
collisions to a particular scope, thereby helping improve Ethernet performance.
Switches have replaced hubs as mainstream Ethernet devices. However, switches do
not restrict broadcast traffic on the Ethernet. This affects Ethernet performance.
Figure 4-26 shows that a switch processes frames in three ways: flooding, forwarding,
and discarding.
⚫ Flooding: The switch forwards the frames received from an interface to all other
interfaces.
⚫ Forwarding: The switch forwards the frames received from an interface to another
interface.
⚫ Discarding: The switch discards the frames received from an interface.
A switch process a received frame based on the destination MAC address of the frame
and the MAC address table.
⚫ Flooding: If the destination MAC address of the frame received by the switch is a
broadcast MAC address or does not match any entry in the MAC address table, the
switch floods the frame.
⚫ Forwarding: If the destination MAC address of the frame received by the switch is a
unicast MAC address and matches an entry in the MAC address table, and the
interface that receives the frame is different from that of the matched entry, the
switch forwards the frame.
⚫ Discarding: If the destination MAC address of the frame received by the switch is a
unicast MAC address and matches an entry in the MAC address table, and the
interface that receives the frame is the same as that of the matched entry, the switch
discards the frame.
In a word, broadcast packets have a wide-ranging impact on a network, and Ethernet has
no method for forwarding control. The Virtual Local Area Network (VLAN) technology
solves this problem.
⚫ VLAN Identifier (VLAN ID): controls the forwarding of Ethernet frames based on the
VLAN configuration on a switch interface. This field is of 12 bits, with its value
ranging from 0 to 4095.
Since VLAN tags are adopted, Ethernet frames are classified as untagged frames (without
4-byte VLAN tags) or tagged frames (with 4-byte VLAN tags).
Note: In this course, only the VLAN ID field is discussed.
The intermediate node selects the best path from its IP routing table to forward packets.
A routing entry contains a specific outbound interface and next hop, which are used to
forward IP packets to the corresponding next-hop device.
Packets are forwarded hop by hop. Therefore, all the routers along the path from the
source to the destination must have routes destined for the destination.
Data communication is bidirectional. Therefore, both forward and return routes must be
available.
4.5 Quiz
After you run the display ip interface brief on an existing VLANIF interface on a switch,
the command output shows that the physical status and protocol status of the VLANIF
interface are both Down. Why does this occur?