Module 01
Module 01
Module 01
Being online in today’s world is nearly a universal assumption. Today you see computers,
smartphones, tablets, printers, automobiles, refrigerators and a growing number of other
devices already able to connect to digital networks. There is almost no limit to what you can
do remotely now.
What is networking?
Taking high-definition pictures from your smartphone is a good thing but it worth nothing if
you cannot share them with the world. The action to move data out of your smartphone is an
example of computing communication.
Computing communication is then the process of sending or receiving data from other
computing entities. Network computing is the engineering that makes this happen.
Network computing is all the infrastructure – both physical hardware and virtual software - all
working together to create bridges, paths, and highways where data is transport.
Humans use implicit rules and procedures to communicate. Consider the following example.
Alice meets Bob for the first time, and starts the conversation by saying “Good morning, my
name is Alice”. Bob replies “Good morning Alice, my name is Bob”
This brief conversation is a procedure. Notice that Alice starts the communication with a
greeting and then she identifies herself. Bob’s reply is also a procedure. He acknowledges
Alice, and then he identifies himself by name.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
1
Absolute Beginners lab guide
Module 01
The implicit rules in this conversation help to establish and maintain a conversation. Likewise
computing devices use rules or protocols to exchange data.
Communication layers
Humans express their ideas when they speak by generating sounds, using tongue and throat
muscles. In this example, you can clearly distinguish two levels or layers. First, the brain
formulates the message, and second the muscles move to create sounds. These two levels
inside your body have a different purpose but they work together as a team to make
communication happen.
This layered concept is powerful because it enables engineers to break down the entire
communication into different phases. It also enables engineers to assign specific tasks that
run only at a certain level. All layers then work together as a team to process a message to
be sent, or to interpret a message that has been received.
The Open Systems Interconnection (OSI model) is a reference model used to define how
data communications occur on computer networks. It is divided into layers that provide
services to layers above and below.
The OSI model is made up of seven complementary but distinctly different layers, each
tasked with carrying out a discrete group of operations.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
2
Absolute Beginners lab guide
Module 01
To explain this reference model, look at this example, where a user attempts to upload a
picture into their social networking account.
• Application Layer – This layer is responsible for interacting with end users. In our
example this is the application itself that runs in the smartphone. The App provides
options to select a picture from your library or maybe to use your camera to take a
new one.
• Presentation Layer – It is responsible for coding data. In the example, this means
that the picture must be modified somehow. Maybe it is reduced in size by applying a
compression technique (such as zip).
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
3
Absolute Beginners lab guide
Module 01
• Transport Layer – This is responsible for breaking data into segments and properly
transmitting them over the network. The picture that you want to share might be a few
Megabytes long, but your smartphone will break down this file into little pieces called
segments, then sends them using the network. The other side receives the pieces
and rebuild the picture - a bit like building a puzzle.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
4
Absolute Beginners lab guide
Module 01
• Network Layer – Provides a logical addressing end to end. The sender and the
receiver must use an address. In the example your smartphone needs an address so
the network will know which device sourced the data. Also, the smartphone must
know the destination address (social network). This information is used by the
network infrastructure so it can make routing decisions - to select the best path. This
is very similar to what the postal service does. Using the address information on the
envelope, the postal service knows the identity of both sender and receiver.
• Data Link Layer – This layer is responsible for transmitting information on computers
connected to the same network. It uses a new type of addressing, different from the
one used in the network layer. This concept of using a second address could be
confusing, so let’s use an analogy to clarify some concepts.
When you send a letter to a different country or city, the postal office is involved. You
must write down the entire address. But to send a note to someone that lives in the
same building as you, there is no need to involve the postal office in the process nor
to use the whole address. You can simply use apartment numbers as source and
destination, this could be an example of local communication.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
5
Absolute Beginners lab guide
Module 01
Similarly this layer uses new addressing to communicate with devices that are part of
the same network. In our example, your smartphone uses this new address to
communicate to your modem since, both devices belong to the same network.
• Physical Layer – This is responsible for the physical operation of the network. Your
smartphone uses radio frequency to send data wirelessly to the modem. This may be
hard to imagine but wireless tech has been around for decades, Radio, TV and
cellular devices use this “magic medium” to send and receive data. This is not the
only technology used. When copper cables are used, devices translate computer data
into electrical pulses. In the case of fiber optics, it must translate the data into bursts
of light.
Note. The OSI reference model is not the only model that is used to detail computing
communication.
Headers
You have learned that computing communication is broken down into seven layers or
phases, and that each layer has a specific task. This means that each layer generates
information to be shared with the receiver. The receiver uses that information to know how to
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
6
Absolute Beginners lab guide
Module 01
process this received information. To accomplish this, computing devices uses the header
concept.
The next figure illustrates how the header process works.
The communication process starts on Layer 7. The App running in the smartphone selects
the picture to upload into the social networking. Then Layer 6 comes in and appends specific
information using its own header (Layer 6 header). The payload in this phase is referring to
the data computed by the above layer (the picture itself in this case). The next layer does a
similar process, Layer 5 appends specific information using the L5 header. The payload in
this phase refers to the L6 header plus its payload.
As you can infer, the process continues in each layer until it reaches Layer 2. In this layer
your smartphone includes a Layer 2 header and a L2 trailer. This trailer is used to verify if
the information received is complete and was not modified in transit.
Note. The combination of headers and Payload take specific names for Layers 2 through 4.
• Segment is the term that refers to L4 Header and Payload.
• Packet is the term that refers to L3 Header and Payload.
• Frame is the term that refers to L2 header, Payload and L2 trailer.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
7
Absolute Beginners lab guide
Module 01
When the message is received by the destination it will start the decapsulation process,
which refers to header analysis. As opposed to the encapsulation process, decapsulateion
starts from Layer 1 and moves up, through the layers, to Layer 7.
The receiver receives data from the physical media. Then it analyzes the Layer 2 header and
trailer to verify the destination of this information. It also determines if the payload has
changed somehow during transmission. Then Layer 3 analyzes the addressing and accepts
the information if it is the destination. Then Layer 4 reassembles the segments, thus
rebuilding the original photo. Layer 5 keeps track of all the individual messages and
maintains the running session. Layer 6 then knows that this photo has been compressed. It
might perform some decompression process. Finally, Layer 7 could bring up a message
indicating that the transaction has been completed.
The image also includes another important consideration. Layers from 3 to 7 maintain an
end-to-end communication. On the other hand, Layers 1 and 2 are local - the information
that is exchanged is only relative to the network that they are part of.
Important protocols
The previous lab activity introduced some of the most important protocols that are used in
networking. The next figure presents some frequently-used protocols and the associated
layer where each one works.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
8
Absolute Beginners lab guide
Module 01
• Hyper text Transfer Protocol (HTTP) – This protocol is the foundation for the World
Wide Web (www), where hypertexts documents include hyperlinks to other resources
that the user can easily access - for example by a mouse click or by tapping the
screen in a browser. Every time you load a web page from the Internet in your
smartphone, you are using HTTP.
• File Transfer Protocol (FTP) – This is a traditional protocol, used to transfer files
between computing entities in both directions (upload and download). This protocol
is still in use in the networking world, but typical, non-technical people do not use it
anymore1.
• Real Time Protocol (RTP) – This protocol is used to transfer voice and video data
between computing entities. Every time you start a video call with your friend, you are
using RTP to share your voice and your image.
• Trivial File Transfer Protocol (TFTP) – This is considered a light variant of the FTP
protocol; it is used to transfer files. The primary difference between these two
protocols is the Transport protocol that FTP uses TCP while TFTP uses UDP. You will
learn about these two concepts in the next section.
1 Nowadays non-technical people can use other technologies and protocols to transfer files, some
examples include HTTP, HTTPS (secure version of HTTP) and Bluetooth.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
9
Absolute Beginners lab guide
Module 01
There are two main protocols used in this Layer - TCP and UDP.
• Transmission Control Protocol (TCP) – This protocol makes sure that the remote
entity receives all the segments (pieces of a file). If one segment is missed, the
receiver can ask to resend that segment.
To understand this concept, the next figure illustrates the TCP message flow.
The figure shows how the picture is broken down into 9 segments. The sender then
starts the process, informing the receiver about how many segments it should expect
to receive - nine in this case. Then the first segment is sent. The receiver processes
the data, but it must respond back to the sender that segment number 1 was
received. This message is known as the acknowledgment message. The sender
then proceeds to send the next segment and the process continues. For each
segment, the receiver must send back an acknowledgement.
You might notice that TCP uses the sequence number to keep track of individual
segments during the communication process.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
10
Absolute Beginners lab guide
Module 01
Assume now that the network experienced a brief problem, and segment number 5
could not reach the receiver. In this case the receiver asks the sender to resend the
missing segment. The sender resends segment number 5, and expects to receive an
acknowledgement, which indicates that this time, the segment was properly received.
Application Protocols such as HTTP and FTP use TCP to make sure that all data is
received.
• User Datagram Protocol (UDP) – Unlike TCP, this protocol does not contain a
mechanism to resend missing segments. You might think that this is an awful
protocol, but there are some communications that take advantage of this behavior.
Consider the following situation. During an online call, the network experienced some
brief problems, and a few segments were lost. For example, the receiver might miss
the word “morning” in the sentence “Good morning everyone, welcome to this
meeting”. Missing that information was not critical to understand what the speaker
said, and as long that a small percentage of segments are lost (typically less than 1
percent) your brain can fill in the gaps.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
11
Absolute Beginners lab guide
Module 01
Let’s analyze what would happen if the voice call used TCP as the transport
mechanism. Your device could ask for missing segments, the word “morning” in this
example. But this action will not help much, because reproducing that missed word in
the wrong time will make the message unintelligible or confusing. For example, “Good
everyone, welcome morning to this meeting”.
Application protocols such as RTP (voice and video) and TFTP use UDP as a
transport mechanism.
Network Protocols
• Internet Protocol (IP) – This protocol provides addressing functions to the network.
In the telephony system, the carrier assigns a unique number to your smartphone.
You share this telephone number to your contacts. Anytime they need to reach you
they simply use that number. Also, when you call a friend, your number is used as the
source for that call. In this system every phone that wants to join the system to send
and receive calls needs a phone number.
Similarly, in the computing world, each connected device requires a unique identifier.
You refer to this number as the IP address. In the figure, you can see how each
device has a unique IP address number.
IP uses two versions - IP version 4 and version 6. The big difference between the two
version is the length of the address. Version 4 (IPv4) uses a 32-bit length which
accommodates 4 billion unique addresses. Meanwhile, version 6 (IPv6) uses a 128-bit
length, for 3.4 x 1038 unique addresses.
Note. In module 4, you will learn more about IP addresses their notation.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
12
Absolute Beginners lab guide
Module 01
Devices that are part of the same local network use the MAC address to locally
request a communication. This is like sending a note to the neighbor that lives next
door. You use apartment numbers as source and destination in that note.
Note: The idea that the MAC address helps you to locally communicate with other
device does not mean that your devices will not need the IP address. Remember that
the communication works in layers and those layers work as a team.
Lab Activity 1
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
13
Absolute Beginners lab guide
Module 01
The Aruba Training Lab environment provides the necessary equipment to reinforce your
understanding of recent topics.
Lab Equipment
Lab Topology
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
14
Absolute Beginners lab guide
Module 01
Objective
In this task you will initiate a computing communication between PC1 and the Server. Then
you will explore the OSI layers using Wireshark.
Steps
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
15
Absolute Beginners lab guide
Module 01
1. After you made your initial remote lab reservation, you should have received an email
from [email protected]. This email contains a unique-to-you link that you
will use to access Aruba Training Lab environment.
2. In your lab reservation email, click on the text that says “Use this link to access the lab
at your scheduled date/time”
3. Once your lab time has begun, your link will take you to the following screen.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
16
Absolute Beginners lab guide
Module 01
Note. Be patient the first time you open this desktop, it could take a minute to completely
load the operating system.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
17
Absolute Beginners lab guide
Module 01
10. On PC1, open a web browser, on the URL field type: “http://10.250.1.21”
11. Hit Enter, a web page should load.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
18
Absolute Beginners lab guide
Module 01
12. Click on stop capture button, but do not close the Wireshark window.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
19
Absolute Beginners lab guide
Module 01
TIP: You can use the magnifying glass to increase the size of the packets.
13. Move back to Wireshark, select the entry that lists “GET / HTTP/1.1” in the info column.
In the “Packet Details” section you should see five entries, these entries represent four
communication layers and there is one that is used in Wireshark for summary purposes.
Your first impression of the capture would be that there are three layers that are missed in
the output, but the information presented is collapsed. Let’s analyze each entry.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
20
Absolute Beginners lab guide
Module 01
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
21
Absolute Beginners lab guide
Module 01
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
22
Absolute Beginners lab guide
Module 01
Note. The Transmission Control Protocol (TCP) uses sequence numbers to keep a
record of all the segments exchanged between endpoints.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
23
Absolute Beginners lab guide
Module 01
Layers 5 to 7 work very close together. Typically the information of these three layers is
collapsed and presented on Wireshark in a single entry.
The only Layer that is not included in the Wireshark capture is the Physical Layer.
Remember that Layer 1 handles how data physically travels from device to device. The
software limitation to display this layer does not mean that you are not using it. Packets listed
in Wireshark are proof that Layer 1 has been used by your PC1 to send and receive data.
22. Close the Wireshark capture on PC1.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
24
Absolute Beginners lab guide
Module 01
23. A new window will ask to save the capture. Select Quit without Saving option.
In this task you will learn how to obtain the IP address (Layer 3 address) and MAC address
(Layer 2 address) from a Windows device.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
25
Absolute Beginners lab guide
Module 01
Note: PC1 uses three adapters named Do Not Touch!, Lab NIC, and Direct Server
NIC. Each adapter uses its own IP and MAC address.
Informational: In Unix and Linux operating systems you will use the ifconfig
command.
5. Scroll down and locate the information for the Direct Server NIC adapter.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
26
Absolute Beginners lab guide
Module 01
8. Scroll down and locate the information for the Direct Server NIC adapter.
9. Answer the following questions:
What is the Physical Address (MAC address) of the Direct Server NIC adapter?
__________________________________________________________________
In this task you will analyze a TCP connection - downloading a file from an FTP server.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
27
Absolute Beginners lab guide
Module 01
4. On PC1 open a web browser, and in the URL field type: “ftp://10.250.1.21”
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
28
Absolute Beginners lab guide
Module 01
9. Pay attention to the following messages, and answer the following questions:
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
29
Absolute Beginners lab guide
Module 01
Do you see any Acknowledgment (look for [ACK]) message listed? (Y/N)
________________________________________________________________
In any Acknowledgment message, what is the source IP address?
________________________________________________________________
Is this PC1 IP address? (Y/N)
________________________________________________________________
Remember that in a TCP connection, PC1 (10.250.1.1) responds back to the server
(10.250.1.21) that the information was successfully received.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
30
Absolute Beginners lab guide
Module 01
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
31
Absolute Beginners lab guide
Module 01
In this task you will analyze a UDP connection - downloading a file from a TFTP server.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
32
Absolute Beginners lab guide
Module 01
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
33
Absolute Beginners lab guide
Module 01
7. Move to Wireshark.
8. Open the first TFTP packet (Read Request).
9. Select and expand the “User Datagram Protocol” entry in the Packet details section.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
34
Absolute Beginners lab guide
Module 01
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
35
Absolute Beginners lab guide
Module 01
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
36
Absolute Beginners lab guide
Module 01
Note. The acknowledgement is not contained in the UDP header. Instead, it is in the
Application layer header. TFTP compensates for UDP’s lack of reliability by using its own
acknowledgement messages in Layer 7.
Rev 20.41 | © Copyright 2020 Hewlett Packard Enterprise Development LP | Confidential – For Training Purposes Only
37