0800 88 24 7 26 0800 88 24 7 26

Call: 9:00 to 20:00 Every Day

Blog - Category: Uncategorised

Cisco to buy IoT firm Sentryo

August 17th, 2019 By

Once again Cisco has gone shopping and this time is has its eye fixed on a French based company call Sentryo which specialises in anomaly detection with real-time threat detection for industrial Internet of Things (IIOT) networks.

Having the ability to network sensors will improve efficiencies and Cisco can offer its control systems to allow better visibility to detect anomalies and better secure networks.

Sentryo was set up back in 2014 and according to Crunchbase has an estimated turnover of £3M annually. Cisco expect to finalise the acquisition by the first Quarter of 2020 but there is little detail on the deal.

This will be Cisco’s second purchase this you when it bought Singularity for its analytics systems in January of 2019. This a lot less than the Six companies which Cisco bought in 2018. Cisco have a history of buying companies for their technologies this is nothing new.

OT or operational networks allow data between sensors to be carried over IT networks. These sensors are used on industrial control systems and could be prone to hacking attempts to shut down or disrupt operations. So, it is important that OT data is kept secure. The normal OT network is made up of thousand of individual components which make them more complex than traditional data networks.

Sentryo’s systems use deep packet inspection which examines the data within the packets to ensure that they do not contain any malicious code. The Deep Packet Inspection engine can be deployed either on existing networks or on Sentryo sensor devices. This means rather than pulling out an existing network it is possible to deploy the sensors on an out-of-band monitoring network.

Having Sentryo folded into Cisco’s portfolio of products will increase their approach to IoT. In January this year Cisco revealed an new family of switches, dev tools and plans to merge industrial networking with IBN (Intent Based network) and traditional IT network security.

All of these new technologies will be handled by Cisco’s DNA center which is used to as a management tool for enterprise networks that has features that can permit automation, policy based segmentation, fabric provisioning to list but a few of DNA’s abilities. This allows user of Cisco’s DNA to provision network resources and apply network policies faster than the traditional manual methods of the past.

There is also Cisco’s IoT field Networks Director that can also manage Ciscos industrial grid routers and endpoints.

Having passive DPI on the network which has the ability to automatically detect new IoT and other OT devices makes the management of network much easier to scale. Also, the DPI element will monitor the traffic between devices to detect any unusual traffic patterns or behaviour.

IoT devices do not have the traditional level of security one would find on mature operating systems such as Windows or Apples OS’es. If hackers could take over or control these IoT in an industrial network it could mean a production line have to shut down.

Will India Follow the USA in banning Huawei kit from its networks?

August 15th, 2019 By

Will India Follow the USA in banning Huawei kit from its networks?

Huawei has had a difficult year so far. The world’s leading telecoms kit maker and the worlds second largest smart phone manufacturer has had to contend with President Trumps ban on the 15th of March 2019 which effectively stopped the Chinese telecoms giant from selling smart phones or any telecoms kit into the US due to national security fear.

There was a little easing of the trade ban in June when Huawei where allowed to sell some if its products in the US although the company remains on the Department of commerce’s blacklist.

The question that Huawei is asking itself no doubt is how many other countries will follow the US lead and ban its equipment from being installed into their national networks.

India has not had the best of relationships in the past with China and views Huawei with a suspicious eye believing in the rumours that the Chinese government had undue influence over Huawei and there are concerns that the Chinese government is using Huawei for spying on foreign networks. This issue now potentially leaves Huawei out of the bidding to supply India with core networking equipment for its new 5G infrastructure.

To compound Huawei’s woes their CFO Meng Wanzhou is still behind bars in a Canadian prison waiting to be extradited to the US. He is being charged by US officials with obstruction of Justice, money laundering and a ream of other offenses. It seems that the US is gunning for Huawei from all quarters.

Although the final decision as to whether to allow Huawei to bid to supply the infrastructure to India’s 5G network there are continuing behind the scene negotiations between Chinese officials and India’s ambassador in Beijing to see if the Indian government would reverse the decision and allow Huawei to bid in a market that is expected to grow to over $103 billion by 2020. India’s telecom minister Ravi Shankar Prasad has still to reveal if Huawei will be invited or not.

Huawei 5G equipment can be found in networks around the far east, in countries like Singapore, Malaysia, Philippines and Thailand. What attracts national 5G providers to Huawei’s kit is generally the cost. The UK in its usual non-committal ways has still to decide whether to follow the US by barring the Chinese company into its networks or open themselves up to the global market and allow Huawei to bid.

There are currently a few network operators in the UK who use Huawei kit in their infrastructure namely EE and Vodafone with O2 planning to follow their competitors into allowing Huawei equipment into their networks.

The intelligence community which makes up the “five eyes” that consists of the US, UK, New Zealand, Australia and Canada are not all in agreement with the ban. Only Canada despite banging up the Huawei CFO has not shut the door completely on Huawei. The UK as mentioned above are procrastinating as usual and will probably fold as is their current default political answer.

The issue here is who should be allowed to spy on their own citizens. After the revelations of Snowden, it seems a little hypocritical for the members of Five Eyes to cry foul of spying when they have been doing much of it themselves. We can only presume that each government feels they have a right to spy on their own sheep and no one else can stare at a given governments property.

India is still on the fence. They are tempted by the cost of the Huawei equipment and one can be in no doubt that the Chinese manufacturer is also dangling larger brown envelopes than their competitors to lubricate the wheels of government to force India off of the fence into Huawei’s open arms (jaws).

For the Indian government has to weigh up the strong possibility that Huawei is strongly influenced and subservient to the Chinese government and is just another cog in the state machine as a front for their spying activities. The Boss and founder Ren Zhengfei is a former member of the People’s Liberation Army raises questions and that fact can’t be very reassuring.

It has been rumoured for many years that all the major venders like Cisco, juniper, H.P etc have always had backdoors and kill switches programmed into them to allow easy access to these devices by government agencies under the guise of national security.

It comes as no surprise then since Huawei got their start in the networking equipment world by stumbling over Cisco operating system “Internetwork Operating System or simply IOS” that they decided to copy the Cisco OS in its entirety including backdoors and all.

These backdoors India claims have been used by the Chinese to access core networking devices. Something which the Chinese deny.

The trouble here is that money talks and when looking at the Huawei price list it becomes difficult to ignore the difference in costs. Plus, Huawei holds about 20% of all 5G patents that has allowed it to dominate the worlds 5G networks.

DON’T MESS WITH CHINA

The issues world governments face is one of having no backbone to stand up to the Chinese. They are afraid of upsetting them for fear of a trade war breaking out. Although to many observer’s the trade seems to be in one direction only straight into the coffers of Chinese firms whilst industry in the west pays the price for the cowardice of their own administrations.

It is possible that the US government have done the right thing by drawing a line in the sand and making a stand to protect their own industries. India as looking at the US as an example to stop the ever-increasing presence of Chinese equipment in sensitive national infrastructure.

Although the UK government in its belief it has found some form of middle ground has conceded to allow Huawei kit to be used in the last mile, such as home equipment and last mile transmitting equipment. This is an interesting proposal since it is much more difficult to repair and replace millions of home modems than it is to replace a few dozen core switches. But such is the stupidity of the UK authorities.

Whatever India decides they will have to live with the fallout of putting all its eggs onto a basket which has potential trapdoors. If India do deploy Huawei equipment and a ban does come, they will be left having to replace all core kit again.

Huawei On The Naughty Step

August 14th, 2019 By

It looks likely that Huawei, everyone’s current favourite bad guy is planning to make a substantial number of people redundant in the United States in the next few weeks.

Huawei, the huge Chinese telecoms and networking manufacturer has been under pressure from the Trump administration which has no started to feel the pinch and has announced that it will be making redundancies at it’s US R&D subsidiary called Futurewei Technologies who employs over 800 people.

The redundancies will affect many hundreds of people working in R&D in Texas, Washington and California.

Huawei, the Chinese manufacturer targeted by a Trump administration trade ban, is expected to dismiss a substantial number of people in the US in the coming weeks.

When Huawei was asked to comment on the pending redundancies Huawai dismissed the requests and declined to substantiate the claims.

Huawei is not alone in having to face the wrath of Trump and it’s foreign trade policies. Huawei are on of nearly one hundred similar firms which has been placed on the US Commerce Department’s Entity List. This does not permit any U.S company from conducting business with firms on the Entity list without having special permissions from the US government.

The Trump administration granted Huawei time for them to allow their customers to setup agreements with other suppliers prior to the Entity list restrictions coming into effect on the 19th of August. This is likely to happen unless the Chinese and U.S governments can reach an agreement.

This all comes from the belief that the US government have that despite Huawei’s claims of independence from the Chinese government that Huawei is heavily influenced to allow access to it’s networking equipment for the purposes of spying on its own citizens and foreign countries too. Although it has been rumour that this has been going on for a while there is no evidence that this is the case.

Some technology experts have often been critical of Huaweis poor system security in comparison to more mature and stable systems produced in the west like Cisco or Juniper.

There have always been rumour of networking equipment from all manufacturers having installed backdoors to allow government agencies to have access to traffic at will. These rumours have never been verified or confirmed and Huawei claim that they have never been requested by their government to install backdoors into their systems.

The redundancies seem to be in line with the fall in profits reported by Huawei. The Founder and CEO of Huawei Ren Zhengfei forecasted that the networking and telecom giant will turnover $100 in 2019 and 2020, which is a third less than they had previously predicted

Although the blacklisting has effected Huawei revenue there were some glimmers of hope when President Trump hinted that some I.T and telecom exports to Huawei could be restarted by did not give any indication as to when that would be and that any resumption of exports will only be on the basis that they do not present a threat to US national security.

How the threats are determined was not made clear. The whole idea seems to be an excuse to keep Huawei and its affiliates locked out of the lucrative US markets where their products are competing against the likes of U.S giant Cisco and other. For the time being Huawei is on the naughty step and time is running out for it in the U.S.

Commerce Secretary Wilbur Ross said the DoC “will issue licenses where there is no threat to US national security.” and “Huawei itself remains on the Entity List, and the announcement does not change the scope of items requiring licenses from the Commerce Department, nor the presumption of denial.”

Reuters, have said that US firms may be allowed to recommence doing business with Huawei shorty ever since President Trump and the Chinese president Xi Jinping meet last month

CCNA Training Course: OSI Model Part 3

October 21st, 2016 By

Physical Flow of data

When the data arrives at its intended destination it will travel up the 7 layers to pop out onto the
Users application as a for example an email or webpage.

osi-p3-one-1024x725

When the user on the left hand machine press the send button on their email program the email is sent down the stack starting at layer 7 and through the layers. There is no way of avoiding passing through a layer. As the data moves through each layer the functions of the layers will determine exactly what happens to the data.

Logical flow of data
The data will move physically down through the layers until the data is placed onto the physical wire as 1’s and 0’s, even though the data moves down the stack for example i.e. layer 4 passes the data to the next layer down to layer 3 the actual communications is logical from peer layer to peer layer.

2

In the diagram above the arrows indicate the logical communication between layers. Layer 3 for instance is only interested in its corresponding peer layer’s information, and layer 4 is only interested in its corresponding peer layers information.

Encapsulation of data
User data moves down the stack from 7 to 1 on the left hand stack, from Layer 4 down to layer 2 the data is packaged or encapsulated in the lower layer data.

3

1. Layer 4 is encapsulated into Layer 3.
2. Layer 3 data is encapsulated into layer 2
3. Layer 2 data is transmitted onto the wire
4. Data arrives at the destination
5. Receiving layer 1 pulls the 1’s and 0’s off of the wire to reconstruct the data and passes it up to layer 2
6. Layer 2 removes it’s peer layer data and passes the remaining data to layer 3
7. Layer 3 removes it’s peer layer data and passes the remaining data to layer 4

The data enters the stack from the top and makes its way from layer 7 down to layer 1. From Layers 7 to 5 the data is encoded and or encrypted, from layer 4 down to layer 2 new fields are added to the data. These fields are for addressing, sequencing, length, type of data, error correction, error detection, flow control to name a few (We will cover all of these terms).

 

Once the data now wrapped up nicely inside all the other information a bit like when you send a parcel in the post you would wrap the parcel and apply a to and from label and maybe a sticker which says “fragile” or “This way up”

De-Encapsulation
On the receiving end, the data is pulled off of the wire and reassembled, the parcel of data is then passed up the stack. Each layer will read and remove and discard its corresponding peer layer data.

4

When layer 2 receives the data parcel from layer 1, it will check the information contained inside the layer 2 header for example at this layer it will check layer 2 hardware addresses, if it is happy with the info it will remove the layer 2 header and tail then pass the rest up to the next layer above.

Each layer will do the same until the data is passed up to layer 7 then presented to the user as an email or webpage etc.

Naming the data parcels
The data parcel otherwise referred to as the PDU (Protocol Data Unit) which is produced at each layer has a specific name and it is important to learn the names so you can become a more efficient fault finding network work engineer.

6

1. The PDU at layer 4 is referred to as a “Segment”
2. The PDU at layer 3 is referred to as a “Packet”
3. The PDU at layer 2 is referred to as a “Frame”
4. The PDU at layer 1 is referred to as a “Bits”

CCNA Training Course: OSI Model Part 2

October 21st, 2016 By

How Layers are used

In a layered system, a layer is considered to be a service provider to the layer above it. The upper layer is considered to be a service user by the lower layer. The service user avails itself of the services of the layer below by sending a transaction to the provider. This transaction informs the provider as to the nature of the service that is to be provided.

osi-model-part-2

A layer cannot be by passed, even if the end user does not require the services of that layer, the user must still “pass though” the layer on the way to the next adjacent layer, this pass though will only invoke a small set of code and therefore translates to some processing overhead.

The OSI Model refers to the layers with the terms N, N+ and N-. The layer with is the focus of attention is designated layer N. The layer above is N+1 and the layer below is N-1.

If the Network layer is the focus of attention then the Network layer is N, the Transport layer is designated N+1, and the data link layer is designated N-1.

osi-model-part-2-3

 

Each layer contains entities that exchange data and provides functions (horizontal communications)

With peer entities at other computers.

For example Layer N in machine A communicates logically with Layer N in machine B, layers N+ communicate logically with one another likewise with layers N-.

At each layer at a transmitting station adds header information to data. The headers are used to establish peer-to-peer sessions across nodes (horizontal communications). At the receiving side, the layer entities use the headers to implement actions created by the peer entity at the transmitting side.

The figure below shows how a machine (a) sends data to another machine (b). Data is passed from the upper layers or the user application to layer N+1. Layer N+1 adds a header to the data (labelled N+1 in the figure). Layer N+1 also performs actions based on the information in the transaction that accompanied the data from the upper layer.

osi-model-part-2-2

Layer N+1 passes the data unit and its header to the layer N. This layer performs some actions based on the information in the transaction, and adds its header N to the incoming traffic. This traffic is passed across the communications line (or through a network) to the receiving machine B.

At ‘B’, the process is reversed. The headers that were created at machine ‘A’ are used by machine ‘B’ to determine what actions are to be taken at the peer layer. As the data and the existing headers are sent up the layers, the respective layer removes its header, performs the defined actions, and passes the traffic on up to the next layer.

The user application at machine ‘B’ is presented only with user data, which was created by the sending user application (machine A). These user applications are unaware of the many operations in each layer that were invoked to support the end-user data transfer.

The headers created and used at the peer layers are not to be altered by any non-peer layer. As a general rule, the headers from one layer are treated as “Transparent data” by any other layer.

There are exceptions to the rules, as examples, data may be altered by a non-peer layer for the purposes of compression, encryption or other forms of syntax alteration. This type of alteration is allowed if the data are restored to the original syntax when presented to the receiving peer layer.

An exception to the exception, the presentation layer may alter the syntax of the data permanently, because the receiving application layer has requested the data in a different syntax (ASCII instead of a bit string)

CCNA Training Course: OSI Model Part 1

October 21st, 2016 By

NETWORK MODELS AND PROTOCOLS

This next chapter will describe two very important concepts in networking known as protocol stacks. There are two very important protocol stacks which as a network engineer you must know the OSI model and the TCP/IP model. Knowledge of both these models will help you understand the role of various devices that go to make up a network also help you design, configure and fault find a network more efficiently.

The OSI model
One of the very first concepts I learnt when I entered this networking arena back in the 90’s was that of the “Protocol Stack”, I still recall how I was a little confused by this term, what was this protocol stack?, where does it live, can I see it?, can I hold it?.

What I would like to do over the course of this section is to explain the purpose of the “Protocol Stack” and in particular the OSI protocol stack long with the IP/TCP protocol stack.

Note: It is a good idea to note terms down. I.T is awash with weird and wonderful TLA (Three letter acronyms) even if right now the terms do not mean anything, just note them down.

Here we go, so what is the OSI model, well to put it in its simplest terms, the OSI model is a conceptual model which determines what should happen to your data when it moves from your “Screen” to the “Wire”. The emphasis is in the “what should happen” since the OSI model is a conceptual model or rather a reference model and not an actual working model

Another way to explain it is like this, imagine you wanted to build a car, how would you do it?, you would learn all the necessary skills required to build the car, from welding the body panels, to stitching the fabric of the seat, building the engine and wiring the electrics, this is going to take a little while as you have to learn all the skills needed, so instead of doing all the work yourself you decide to hire seven (7) people to build the car for you, but rather than teach each person all the skills needed to build a complete car you we teach each person an individual skill, so one person does one job only.

Your car is a huge success so you decide you are going to give up the day job and build cars for a living, for this you need a bigger space like a factory, as you have no experience in setting up a car factory you bring in a “Car factory consultant”, who reports that a car factory will need the following:
1. Goods in
2. Storage and inventory
3. Conveyor system to transport the cars down the production line
4. Robots to do the heavy lifting
5. Paint shop
6. Interior station
7. Goods out

Note I have never built a car let alone built a car factory so these are just guesses

The consultant has not and will not specify where to purchase any of these items but will lay out a design how the factory ought to be laid out, the specifics are up to you, where you get the robots is your decision, the paint shop is your decision, all you have from the consultant is the basic frame work or a reference of what should happen in the car factory and what at which stages certain actions and process ought to occur.

The OSI model is the same as the car factory production line. Your car factory you will have a production line, the basic car frame will be placed at the top of the of the production line and will move down the line, as it moves down the line each of your 7 faithful workers will each perform their individual tasks.

1. Body shop to press the panels
2. Panels are welded together to form the chassis
3. Doors, hood and boot lid are fitted
4. Paint shop
5. Assembly were the electrics and mechanicals are fitted
6. Assembly were the interior is fitted
7. Driven out of the factory into the showroom

Why have a production line? Simple, since we are able to change how any of the individual processes is performed without affecting the process before or the process to follow, therefore if you decided the paint shop process is to be changed what will not affect step 3 or step 5 provided whatever happens are step 3 presents the car to step 4 in a manner that step 4 can perform it’s task. Whatever happens at step 4 is of no concern to step 5 provided step 5 is presented a car with which is recognises and can work with.

Now going back to the OSI model, just like our production line, the OSI model is a layer model which will take our data say for instance an email and move the “1’s and 0’s” that make up our email down through 7 layers of its production line, but unlike our production line the OSI layered model starts at layer 7, layer 7 is the top layer and the lowest layer is referred to as layer 1.

As our email goes down through the layers each layer will perform certain actions on the email, from encoding using ASCII to encryption, placing addresses, sequence numbers, error detection and so on and so forth. When the e-mail now wrapped up in layers and layers of communications information to deliver the email reaches layer 1 it is then transmitted onto the wire.

Having a layered approach like our car production line makes it much easier to fault find as we can narrow problems down to specific layers, it also means that any layer can be changed without affecting the next layer above or the next layer below.

The diagram above shows the 7 layers of the OSI model and their respective names

osi-model-part-1

Part 6: CCNA Training: What is a Network

October 21st, 2016 By

CABLING AND TOPOLOGIES

Topology: Physical Bus
A bus network is a single length of cable to which work Stations, printers, servers, routers etc. connect.

art5_1-1024x333

There have been two major physical bus technologies:
• 10Base5
• 10Base2
• 10Base5

 

This technology capable of 10Mbps and allowed a cable run of 500m with the maximum number of nodes connected to the wire limited to 100 devices at a distance of 2.5meters apart. 2.5 Meters is due to the wavelength of the signal used to transmit the data.

At each end of the cable run there was a terminator (Resistor of 50ohms), if this terminator was removed the network would fail as the AC signal rather than being dissipated would be reflected back down the wire, always a barrel of laughs that one.

Stations would connect to the network by having to pierce the actual cable. This type of connection is referred to as a vampire tap,

10Base2
This technology also referred to as “Thinnet” or “cheapnet”, is capable of 10Mbps and allowed a cable run of 185m with the maximum number of nodes connected to the wire limited to 30 devices per segment, with no more than 5 cable segments separated by 4 repeaters with no more than three of the 5 cable segments being mixing segments.

These mixing segments can either be 10Base2 or 10Base5, a mixing segment is one with connected stations, only a mixing segment can be populated with stations i.e. P.C’s etc.

Two of the segments can be Link segments either 10Base5 or 10Base2, these link segments connect the repeaters together

art5_2-1024x354

The minimum distance for cables between workstations must be at least a half-meter. Drop cables should not be used to connect a BNC connector to the network interface card (NIC) because this will cause signalling problems unless the NIC is terminated. The entire cabling scheme, including all five segments, can’t be longer than 925 meters.

The terminator (Resistor of 50ohms) is built into the connector of the last station on the bus network, if this terminator was removed the network would fail as the AC signal rather than being dissipated would be reflected back down the wire and the reflected signal is impossible to distinguish from a collision.

 

Terminators had a metallic chain used for grounding the network. Only one end of the network needed to be grounded, if both ends were grounded it would result in a “grounding loop” which results in network outages.

 

The Disadvantages of a physical Bus network are:
1. If there is a break anywhere along the cable run the entire network would stop functioning
2. One large broadcast and collision domain, the stations connecting to the wire the slower the network becomes
3. 10Base5 stations need to connect to the network by piercing the cable
4. Lots of collisions on the cable
5. No security
6. The number of work stations and cable length is limited

Part 5: CCNA Training: What is a Network

October 21st, 2016 By

CCNA TRAINING: THE NETWORK INTERFACE CARD AND BIA ADDRESS

There are a few ways to connect to a network for this moment we will concentrate on a wired only connection.

To connect to a network it is common to use a cable attached to a port on your P.C called an Ethernet port using an RJ45 connector.

Every interface has been assigned a unique address called a “Burned in Address” which identifies the interface uniquely on the network.

Every Frame which your device sends will include the unique BIA (Burned in Address) as a source address.

The BIA

The BIA is a 48bit value written in a format called “Hexidecimal” or just “Hex”

The BIA is made of two parts, the OUI (Organisational Unique Identifier) and the Vender Assigned Part. The 48bit BIA is split down the middle 24bits make up the OUI and 24bits define the Vendor assigned part.

The OUI identifies the manufacturer of the interface and is assigned to the maker by global standards body called the IEEE (Institute of Electrical and Electronics Engineers), more on this later.

To discover the MAC address of your own NIC (Network Interface Card) simply type in the following command into the command prompt of your machine:

Step 1: Go to start, type “cmd” in the box indicated by the red arrow, then hit the return key. A new screen will appear

art4_1

Step 2: Type into the command prompt the command “ipconfig /all” following by the return key. A series of messages will appear

art4_2

The machine used in this example has a unique MAC of “68-F7-28-33-2D-67” MAC address is shown is unique to this particular machine, it is expected that no other Ethernet interface in the entire world has the same address as this particular interface.

HEXIDECIMAL
All MAC address are written in HEX.
1. Each character in the MAC address is a HEX character.
2. Each HEX character is composed of 4 binary bits
3. These four bits are sometimes referred to a “Nibble”
4. Each Binary character in the 4 bit nibble has a value. The value of the binary bit is dependent on its position in the nibble.

 

art4_3

 

5. By changing the binary from off “0” to on “1” will cause the corresponding value to take effect
Example One:

art4_4

The binary bits with the values of 2 and 1 have been switched “on”, whilst the binary bits with the values of 8 and 4 have remained in the “off” position. The value of the four bits is 3

 

Example 2:

art4_5

 

The binary bits with the values of 8 and 1 have been switched “on”, whilst the binary bits with the values of 4 and 2 have remained in the “off” position. The value of the four bits is 9

Example 3:

art4_6

 

The binary bits with the values of 8 and 2 have been switched “on”, whilst the binary bits with the values of 4 and 1 have remained in the “off” position. The value of the four bits is 10

In HEX any value from 10 to 15 are not represented as the numerical value but are substituted with a letter, the table below show the correlation between the binary, value and letters

art4_7

Anatomy of a MAC address
Every MAC is made up of 48 bits. Each MAC address has two main parts:
1. The OUI = 24 bits
2. The Vendor assigned part = 24 bits

Say for example you wanted to get into the NIC market one of the very first things you would have to do is get a unique OUI (Organisational Unique Identifier), these are acquired for the IEEE. The IEEE is in charge of ensuring that each NIC card maker has a unique OUI.

The OUI is always the first 24 bits of the MAC address and the Vendor assigned part is always the second 24 bits. Recall that each character is HEX, and each HEX character is composed of 4 binary bits.

 

art4_8

 

It is the responsibility of the NIC manufacturer to ensure that they do not create NIC will duplicate MAC addresses and it is the responsibility of the IEEE to ensure that they do not assign the same OUI to multiple vendors

Part 4: CCNA Training: What is a Network

October 21st, 2016 By

How Binary Works

Imagine this, you and your friend live across the road from each other, at night you wish to communicate using flash lights, you need to have an agreed code of light flashes.

So you agree on the following code, to represent a single binary 1 you will switch the light on for one second and to represent a binary zero you will keep the light off for one second.

Of course this is going to quickly go to the dogs but you understand the premise that we have agreed on a line code that we both understand, now it’s simply a matter of keeping count of the on’s and offs to interpret the code as one and zeros to reconstruct the message.

When one P.C wishes to communicate with another P.C is will tap out on the wire using electrical pulses a series of binary bits, sequences of these binary bits represent letters, numbers and other characters, the most commonly used character coding is known as ASCII. Most modern character-encoding schemes are based on ASCII (American Standard Code for Information Interchange). Codes represent text in computers, communications equipment, and other devices that use text. Most modern character-encoding schemes are based on ASCII, though they support many additional characters.

The letter A is = 1000001

The letter F is = 100 0110

The letter W is = 101 0111

The % is = 010 0101

Can you decode the following message?

NOTE: To convert drop the first binary character using the ASCII encoding

01101001 00100000 01100001 01101101 00100000 01100001 00100000 01100010 01101001 01101110 01100001 01110010 01111001 00100000 01100111 01100101 01100101 01101011

When a P.C communicates with another P.C on the network it will create a parcel of data called a frame, this parcel of data is a up to 1500 bytes in size, a byte Is another way to state 8 bits or an octet, so a byte is an octet and octet is 8 bits. Therefore 1500 byte is 1500 x 8 = 12000 bits per frame of data.

Each frame your P.C creates has the following fields.

  1. Destination Address
  2. Source Address
  3. Length
  4. Data
  5. Frame Check sequence

Data Frame Example

 

figure-9

The frame is pretty much like any parcel which you would send in the post, it has an address where we would like the parcel to be sent to, the address of the interface which transmitted the frame since data communications is generally a bi-directional operation.

The frame also has dimension just like a parcel in the way of length and type of data it is carrying

Part 3: CCNA Training: What is a Network

October 21st, 2016 By

HOW DEVICES COMMUNICATE

When I first started in networking the one thing that I could not get my head around was how does one machine communicate with another?, I understood that P.C’s used binary to communicate but what I could not visualise was how a parcel of data was sent from one interface to another in my mind I used to picture a precession of packets on the wire in line one after the other like in the diagram below.

figure-7

Of course I soon realised that this was not possible, we are talking about a single pair of wires to transmit and receive. The wire can only be in a single state at any one time, like a light bulb can be either off or on, but not both on and off together. On = 1, Off = 0.

It then dawned on me that just like Morse code the wire is carrying a single signal at any one time. Therefore the wire is either on or off, the transmitting interface just like a Morse code operator is “tapping” out the signal one bit at a time, albeit very quickly to achieve the high rates of data throughput we have come to expect.
figure-8
The diagram above shows how data is sent over the wire as single on pulse or off electrical pulses each one lasting 1 second.