Network Layer Overview

Video Activity

Layer 3 Network Layer Overview Next we move on to the Network Layer, Layer 3 of the OSI Model which controls broadcast domains. Module 4 discuss how broadcast are performed, the devices that work at the network layer, then we explain in details what happens to the data that facilitates its transmission over the network. You'll observe a quick diagr...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
27 hours 46 minutes
Difficulty
Intermediate
CEU/CPE
31
Video Description

Layer 3 Network Layer Overview Next we move on to the Network Layer, Layer 3 of the OSI Model which controls broadcast domains. Module 4 discuss how broadcast are performed, the devices that work at the network layer, then we explain in details what happens to the data that facilitates its transmission over the network. You'll observe a quick diagram on the layer 3 process and a discussion on how the process of routing works. You'll also learn what the protocol data unit is for layer 3 called, and you'll observe from a detailed diagram of its structure, and we'll introduce the concept of IP addressing.

Video Transcription
00:04
next, we're gonna move on
00:06
to the next layer in our side. Leered model stock, which is your network, lier or Lear three. The network clear controls communication
00:18
between broadcast domains. So if you want to go from one broadcast domain to another broadcast domain, you need layer three,
00:29
specifically, the device that works at the network clear.
00:34
You need a router.
00:36
So to draw out an example, let's say you have a switch here
00:41
with two hosts or to PC sitting on it,
00:44
and you know that a switch is one broadcast domain by default. So let's say we only have the land one here. This isn't the line one.
00:53
This is villain one,
00:56
and then you have another switch and this is in this. PC
01:03
three is in Villain 50 for example, on P C four is also in veal and 50.
01:11
So if you want PC one, which is in villain, want to communicate with PC Tree, which is in villain 50. You need to use layer three or more specifically, you need a router. You cannot connect these two switches back to back with each other because
01:27
BC ones just simply not gonna talk to PC three
01:30
because doulas are two separate broadcast to means now granted villains earlier to broadcast domains. And in a little bit we're gonna cover Lear three broadcast domains. But the concept remains the same. To go from one broadcast in this case, Vienna one to another broadcast domains,
01:49
which is in this case, villain 50. You need the process of routing, which is a layer three function, and the device that provides the process of routing is called a router. So the device that works at Lear three
02:05
is a router,
02:07
and the function of layer tree is to send data between broadcast domains.
02:15
Now, the protocol data unit at layer to was called a frame.
02:21
The protocol data unit at Layer three is called a packet.
02:27
Before I draw the packet structure
02:30
on the board,
02:32
just like at layer to you needed some sort of add racing scream.
02:38
So just like it later to you needed some sort of address ing scheme to send
02:44
frames between devices. So you needed a source Mac address and a destination Mac address. So the address in scheme at Lear to was Mac addresses
02:53
at Lear three. The addresses that are used are called I P Addresses.
02:59
So let's begin with I p addresses and I. P Address is 32 bits in length, and it's written in four fields off eight bits, each separated by a dot
03:17
This is called the dotted decimal
03:21
format. So four fields of a bits each.
03:25
Let's find out what it looks like. So ex dot x dot exe
03:31
dot x equals 32 bits
03:38
Exes. A number X is a variable. I put X Instead of putting a number, we'll discuss what goes in the place off exit in a second.
03:46
Now, each one of these fields is eight bits,
03:50
so eight
03:52
plus eight plus eight plus eight times four equals 32.
03:57
So let's take this first field and expanded out into its constituent bits.
04:03
One,
04:04
2345678 So I'm basically taking this first field,
04:15
also known as an octet. Not really
04:19
hard to think about how they came by that Eight bits octet, octopus.
04:25
And once again, we're gonna number these bits
04:29
which, with specific values
04:31
So you started one.
04:33
You double it, you go to to you double it four. Double it 8 16
04:40
32 64 on 1 28 So 1248 16 32 64 1 28
04:48
Once again, I'm drawing out this first octet or this force field.
04:54
If I turn all these bits
04:58
off and I put zeros on top,
05:00
then I get a value totaling zero.
05:04
However, if I turn all these bits on
05:09
which is a value one,
05:11
then I need to add all these numbers up to get what value
05:15
I would yield.
05:16
So 1 28 plus 64 is 1 92 plus 32 is to 24 plus 16 is to 40 plus eight is to 48
05:26
plus fours. 2 52 plus two is to 54 plus one is 2 55 each. One of these values, each one of these field or octet can very arranged between zero and +255 the maximum value being +255 the minimum value being zero.
05:45
So an I p address, which looks something
05:47
like so
05:48
Tenn 0.0 dot 1 28 dot
05:54
50
05:55
depending on which bits are turned on
05:59
and which bits are turned off within each successive field or each successive octet.
06:05
So, for example, over here.
06:08
Only the 1 28 value is turned on and the rest of them are off
06:13
on the first octet. The eight bit value and the two bit value are turned on
06:17
and the rest of them are turned off because a plus two is
06:21
so back in the day when the Internet was young and I p address ng was brand new
06:28
I p address ng was broken down into class is called class ful I p addressing
06:34
And there are certain rules that must be followed with costal I p address ng Nowadays
06:42
I p addresses are not broken down
06:45
class Feli. They're broken down past Leslie.
06:48
However, to understand class less I p address ing. You must have somewhat of a grass or a firm grasp Off class full I p address ing where I p addresses are broken down into classes.
07:00
So the first class we have this class for classy addresses. The next field I'm supposed to fill out is the value of the first.
07:10
So, for example, in the ex dot x dot x dot
07:15
ex example, this is your first octet. This is your second octet. This is your third octet. and this is your fourth doctor, So I'm only going to put the value of the first octet
07:27
for classy addresses. The value of the first octet has to be a number between one and 1 26
07:36
It has to be.
07:39
If it's not, then it's not a classy address. So in this case, this number has to be a number between one and 1 26
07:48
Now there's something called the sub Net mask.
07:50
I'm going to explain what a sub net mask is in a little bit right now. Just take it for face value.
07:58
The subnet mask for a classy address,
08:01
has to be 255
08:03
000 So the first octet, as you saw, is all ones.
08:11
It's all full.
08:13
The 3rd 4th and fifth octet are set to zero.
08:18
Now, what is this cider notation or stress? Less inter dumaine routing notation.
08:22
This is basically a way for us to be a little lazy
08:26
instead of writing to 55000
08:30
If I were to ask you how many bits in the sub net mask are on at this point,
08:35
there are eight bits on
08:37
since all the bits in the first octet, which is eight bits
08:43
are on. You get the value to 55
08:46
so I can simply denote this whole thing as slash eight
08:52
h being the number of bits that are on in the sub net mask.
08:58
As an example for a classy address,
09:01
I can save 10.10 abduction
09:05
that 10 slash eight,
09:09
which would be the same as seeing 10 dot Tenn dot Tenn 10.0.0.10 to 55000
09:16
The next class we have is Class B
09:20
for Class B. The value of the first octet must be a number between 1 28 and 1 91 I haven't forgotten the number 1 27 I'll get get to it in a minute.
09:35
So for Class B, the value of the first octet has to be a number between 1 28 and 1 91
09:43
The sub net mask is 255.2550 dot zero. So now
09:50
would would the classless inter domain routing notation be or decider notation be
09:56
the first octane is all ones, which is eight bits.
10:00
The second octave is also all ones, which is another eight bits so eight plus eight is 16.
10:05
The third and fourth op ed are off. You get slash 16
10:11
An example
10:13
off a Class B address would be
10:16
1 51 No. One, not 45 not 45
10:22
slash 16.
10:26
Next, you have Class C for class. See the value of the first octet again. Keep in mind this is just the value off the first number, the first field for the first octet.
10:43
So the value of the first octet has to be a number between 1 92 and 2 23 and the sub net mask is through 55.255 dot 255.0.
11:01
What would decider notation being? Well, The first octet is all on,
11:05
which is eight bits. So is the second doctor, which is again eight bits. So is the third doctor, which is again eight bits eight times three is 24 24 total on bits in the sub net. Mask. So I can say slash 20
11:20
four
11:22
as an example,
11:24
I can say 200
11:26
0.0 dot zero got
11:30
30
11:31
slash 24.
11:35
Then there's also a Class D Class D. Addresses range between 2 24 and 2 39 class. The addresses do not have a sub net mask and they are used in multi casting.
11:52
Now we all know what a unique Castor's. A unique *** is 1 to 1 transmission.
11:58
We know what a broadcast this.
12:01
It's like junk mail, one to everybody transmission.
12:03
You're gonna get it, whether you want to or not.
12:07
Ah, monthly cast is like a magazine subscription. It is a one too many transmission. But the hosts
12:13
have to be subscribed to the feed.
12:16
So
12:18
ah, monthly cast is a magazine
12:20
subscription. Like unless you subscribed to it, you're not going to receive it.
12:26
Ah, broadcast is like junk mail. You're gonna receive it whether you want to or not. Then there is a Class E. I believe it goes from to 40 all the way to 255 And this is experimental. So experimental and unused.
12:43
You noticed that I left the number 1 27 out.
12:46
1 27 is not in this range. The whole range 1 27.0 dot 0.0
12:54
is reserved for testing.
12:58
The 1 27
13:01
0.0 dot 0.1 address
13:05
is called the local loop back
13:07
if you can. Ping Ping is a testing utility utility. If you can reach this address,
13:16
okay, or if you can ping this address now, we'll go into more detail what Ping is and what protocol that uses later on. But if you can, for now, if you can reach this address
13:26
or test for this address using a command a utility called Ping,
13:31
then that means that the TCP I P parochial stack was properly installed on your machine.
13:37
If you cannot bring this address,
13:39
take your PC back to Best Buy.
Up Next