SlideShare a Scribd company logo
Chapter 3: 
Network Protocols and 
Communications 
Introduction to Networks 
© 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
Chapter 3: Objectives 
Students will be able to: 
 Explain how rules are used to facilitate communication. 
 Explain the role of protocols and standards 
organizations in facilitating interoperability in network 
communications. 
 Explain how devices on a LAN access resources in a 
small to medium-sized business network. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 3 
3.1 Rules of Communication 
3.2 Network Protocols and Standards 
3.3 Moving Data in the Network 
3.4 Summary 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
The Rules 
What is Communication? 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
The Rules 
Establishing the Rules 
Establishing the Rules 
 An identified sender and receiver 
 Agreed upon method of communicating (face-to-face, 
telephone, letter, photograph) 
 Common language and grammar 
 Speed and timing of delivery 
 Confirmation or acknowledgement requirements 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
The Rules 
Message Encoding 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
The Rules 
Message Formatting and Encapsulation 
Example: Personal letter contains the following elements: 
 An identifier of the recipient 
 A salutation or greeting 
 The message content 
 A closing phrase 
 An identifier of the sender 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
The Rules 
Message Size 
The size restrictions of frames require the source host to break 
a long message into individual pieces that meet both the 
minimum and maximum size requirements. 
This is known as segmenting. 
Each segment is encapsulated in a separate frame with the 
address information, and is sent over the network. 
At the receiving host, the messages are de-encapsulated and 
put back together to be processed and interpreted. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
The Rules 
Message Timing 
 Access Method 
 Flow Control 
 Response Timeout 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
The Rules 
Message Delivery Options 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Protocols 
Rules that Govern Communications 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Protocols 
Network Protocols 
 How the message is formatted or structured 
 The process by which networking devices share information 
about pathways with other networks 
 How and when error and system messages are passed 
between devices 
 The setup and termination of data transfer sessions 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Protocols 
Interaction of Protocols 
 Application Protocol – Hypertext Transfer Protocol (HTTP) 
 Transport Protocol – Transmission Control Protocol (TCP) 
 Internet Protocol – Internet Protocol (IP) 
 Network Access Protocols – Data Link & Physical layers 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Protocol Suites 
Protocol Suites and Industry Standards 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Protocol Suites 
Creation of Internet, Development of TCP/IP 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Protocol Suites 
TCP/IP Protocol Suite and Communication 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Network Protocols and Standards 
Standards Organizations 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Standards Organizations 
Open Standards 
 The Internet Society (ISOC) 
 The Internet Architecture Board (IAB) 
 The Internet Engineering Task Force (IETF) 
 Institute of Electrical and Electronics Engineers (IEEE) 
 The International Organization for Standards (ISO) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Standards Organizations 
ISOC, IAB, and IETF 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Standards Organizations 
IEEE 
 38 societies 
 130 journals 
 1,300 conferences each year 
 1,300 standards and projects 
 400,000 members 
 160 countries 
 IEEE 802.3 
 IEEE 802.11 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Standards Organizations 
ISO 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Standards Organizations 
Other Standards Organization 
 The Electronic Industries Alliance (EIA) 
 The Telecommunications Industry Association (TIA) 
 The International Telecommunications Union – 
Telecommunications Standardization Sector (ITU-T) 
 The Internet Corporation for Assigned Names and Numbers 
(ICANN) 
 The Internet Assigned Numbers Authority (IANA) 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Reference Models 
The Benefits of Using a Layered Model 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Reference Models 
The OSI Reference Model 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Reference Models 
The TCP/IP Reference Model 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Reference Models 
Comparing the OSI and TCP/IP Models 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Data Encapsulation 
Communicating the Messages 
 Segmenting message benefits 
Different conversations can be interleaved 
Increased reliability of network communications 
 Segmenting message disadvantage 
Increased level of complexity 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Data Encapsulation 
Protocol Data Units (PDUs) 
 Data 
 Segment 
 Packet 
 Frame 
 Bits 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Data Encapsulation 
Encapsulation 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Data Encapsulation 
De-encapsulation 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Moving Data in the Network 
Accessing Local Resources 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Accessing Local Resources 
Network Addresses & Data Link addresses 
 Network Address 
Source IP address 
Destination IP address 
 Data Link Address 
Source data link address 
Destination data link address 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Accessing Local Resources 
Communicating with Device / Same Network 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Accessing Local Resources 
MAC and IP Addresses 
PC1 
192.168.1.110 
AA-AA-AA-AA-AA-AA 
PC2 
192.168.1.111 
BB-BB-BB-BB-BB-BB 
11-11-11-11-11-11 
S1 R1 
FTP Server 
192.168.1.9 
R1 
192.168.1.1 
CC-CC-CC-CC-CC-CC 
ARP 
Request 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Accessing Remote Resources 
Default Gateway 
PC 1 
192.168.1.110 
AA-AA-AA-AA-AA-AA 
PC 2 
192.168.1.111 
BB-BB-BB-BB-BB-BB 
R1 
192.168.1.1 
11-11-11-11-11-11 
FTP Server 
192.168.1.9 
CC-CC-CC-CC-CC-CC 
R2 
172.16.1.99 
22-22-22-22-22-22 
Web Server 
172.16.1.99 
AB-CD-EF-12-34-56 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Accessing Remote Resources 
Communicating Device / Remote Network 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Accessing Remote Resources 
Using Wireshark to View Network Traffic 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Network Protocols and Communications 
Summary 
In this chapter, you learned: 
 Data networks are systems of end devices, intermediary 
devices, and the media connecting the devices. For 
communication to occur, these devices must know how to 
communicate. 
 These devices must comply with communication rules and 
protocols. TCP/IP is an example of a protocol suite. 
 Most protocols are created by a standards organization such 
as the IETF or IEEE. 
 The most widely-used networking models are the OSI and 
TCP/IP models. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Network Protocols and Communications 
Summary 
In this chapter, you learned: 
 Data that passes down the stack of the OSI model is 
segmented into pieces and encapsulated with addresses and 
other labels. The process is reversed as the pieces are de-encapsulated 
and passed up the destination protocol stack. 
 The OSI model describes the processes of encoding, 
formatting, segmenting, and encapsulating data for 
transmission over the network. 
 The TCP/IP protocol suite is an open standard protocol that 
has been endorsed by the networking industry and ratified, or 
approved, by a standards organization. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Network Protocols and Communications 
Summary 
In this chapter, you learned: 
 The Internet Protocol Suite is a suite of protocols required for 
transmitting and receiving information using the Internet. 
 Protocol Data Units (PDUs) are named according to the 
protocols of the TCP/IP suite: data, segment, packet, frame, 
and bits. 
 Applying models allows individuals, companies, and trade 
associations to analyze current networks and plan the 
networks of the future. 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41

More Related Content

Viewers also liked (20)

PPTX
CCNA RS_NB - Chapter 6
Irsandi Hasan
 
PPTX
CCNA RS_ITN - Chapter 9
Irsandi Hasan
 
PPTX
VMware vShield - Overview
Irsandi Hasan
 
PPT
ITE v5.0 - Chapter 1
Irsandi Hasan
 
PPTX
IPv6 ACL
Irsandi Hasan
 
PPT
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
 
PPTX
IPv6 DHCP
Irsandi Hasan
 
PPTX
CCNA RS_ITN - Chapter 10
Irsandi Hasan
 
PPT
CCNA Exploration 4 - Chapter 4
Irsandi Hasan
 
PPTX
CCNA RS_ITN - Chapter 8
Irsandi Hasan
 
PPT
CCNA Exploration 4 - Chapter 5
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 4
Irsandi Hasan
 
PPT
CCNA Exploration 4 - Chapter 2
Irsandi Hasan
 
PPT
CCNA Exploration 3 - Chapter 7
Irsandi Hasan
 
PPT
CCNA Exploration 4 - Chapter 1
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 1
Irsandi Hasan
 
PPTX
CCNA RS_ITN - Chapter 6
Irsandi Hasan
 
PPT
ITE v5.0 - Chapter 8
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 9
Irsandi Hasan
 
PPT
ITE v5.0 - Chapter 3
Irsandi Hasan
 
CCNA RS_NB - Chapter 6
Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
Irsandi Hasan
 
VMware vShield - Overview
Irsandi Hasan
 
ITE v5.0 - Chapter 1
Irsandi Hasan
 
IPv6 ACL
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
 
IPv6 DHCP
Irsandi Hasan
 
CCNA RS_ITN - Chapter 10
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 4
Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 5
Irsandi Hasan
 
CCNA RS_NB - Chapter 4
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 2
Irsandi Hasan
 
CCNA Exploration 3 - Chapter 7
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 1
Irsandi Hasan
 
CCNA RS_NB - Chapter 1
Irsandi Hasan
 
CCNA RS_ITN - Chapter 6
Irsandi Hasan
 
ITE v5.0 - Chapter 8
Irsandi Hasan
 
CCNA RS_NB - Chapter 9
Irsandi Hasan
 
ITE v5.0 - Chapter 3
Irsandi Hasan
 

Similar to CCNA RS_ITN - Chapter 3 (20)

PPTX
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
PPTX
CCNA RS_NB - Chapter 3
Irsandi Hasan
 
PPTX
Ccna v5-S1-Chapter 3
Hamza Malik
 
PDF
Itn instruction ppt_chapter3
Universitas Teknokrat Indonesia
 
PDF
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
 
PPTX
Chapter 3 : Network protocols and communications
teknetir
 
PPTX
Itn6 instructor materials_chapter3
limenih muluneh
 
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
 
PPTX
CCNA Protocols and Models Lecture Slides
azlinak
 
PPTX
ITN_Module_3.pptx
argost1003
 
PPTX
ITN_ModuleCCNA Course thirdLecture_.pptx
MohamedTagEldeen7
 
PPTX
Chp1 Network protocols and communication.pptx
eliasaraya142
 
PPTX
ITN_Module_3 NETWORKING FOR IT STUDENTS.pptx
crystaljhoyl
 
PPTX
CCNA_ITN_Chp3.pptx
NguyenLe340487
 
PPTX
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
 
PPT
ITE v5.0 - Chapter 6
Irsandi Hasan
 
PDF
Chapter 3 Network Protocol and Communications
newbie2019
 
PPTX
Lecture Notes- Network Services - Copy.pptx
SaqibAhmedKhan4
 
PPTX
NetEss_Instructor Materials_Chapter1.pptx
06740003FERATKRISTAN
 
PDF
ITN_Module_5.pdf.www.org.com.ccna1.wwwww
mweenemweemba88
 
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
CCNA RS_NB - Chapter 3
Irsandi Hasan
 
Ccna v5-S1-Chapter 3
Hamza Malik
 
Itn instruction ppt_chapter3
Universitas Teknokrat Indonesia
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
 
Chapter 3 : Network protocols and communications
teknetir
 
Itn6 instructor materials_chapter3
limenih muluneh
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA Protocols and Models Lecture Slides
azlinak
 
ITN_Module_3.pptx
argost1003
 
ITN_ModuleCCNA Course thirdLecture_.pptx
MohamedTagEldeen7
 
Chp1 Network protocols and communication.pptx
eliasaraya142
 
ITN_Module_3 NETWORKING FOR IT STUDENTS.pptx
crystaljhoyl
 
CCNA_ITN_Chp3.pptx
NguyenLe340487
 
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
 
ITE v5.0 - Chapter 6
Irsandi Hasan
 
Chapter 3 Network Protocol and Communications
newbie2019
 
Lecture Notes- Network Services - Copy.pptx
SaqibAhmedKhan4
 
NetEss_Instructor Materials_Chapter1.pptx
06740003FERATKRISTAN
 
ITN_Module_5.pdf.www.org.com.ccna1.wwwww
mweenemweemba88
 
Ad

More from Irsandi Hasan (17)

PPTX
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 09
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 08
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 06
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
PPTX
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 10
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 8
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 7
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 5
Irsandi Hasan
 
PPTX
CCNA RS_NB - Chapter 2
Irsandi Hasan
 
PPTX
CCNA RS_ITN - Chapter 11
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
CCNA RS_NB - Chapter 10
Irsandi Hasan
 
CCNA RS_NB - Chapter 8
Irsandi Hasan
 
CCNA RS_NB - Chapter 7
Irsandi Hasan
 
CCNA RS_NB - Chapter 5
Irsandi Hasan
 
CCNA RS_NB - Chapter 2
Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
Irsandi Hasan
 
Ad

Recently uploaded (20)

PDF
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
PPTX
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
PDF
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PDF
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
PPTX
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
PDF
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
 
PDF
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
PDF
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
PDF
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
 
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
 
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
Why aren't you using FME Flow's CPU Time?
Safe Software
 
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
 

CCNA RS_ITN - Chapter 3

  • 1. Chapter 3: Network Protocols and Communications Introduction to Networks © 2008 Cisco Systems, Inc. All Presentation_ID rights reserved. Cisco Confidential 1
  • 2. Chapter 3: Objectives Students will be able to:  Explain how rules are used to facilitate communication.  Explain the role of protocols and standards organizations in facilitating interoperability in network communications.  Explain how devices on a LAN access resources in a small to medium-sized business network. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 3 3.1 Rules of Communication 3.2 Network Protocols and Standards 3.3 Moving Data in the Network 3.4 Summary Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. The Rules What is Communication? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. The Rules Establishing the Rules Establishing the Rules  An identified sender and receiver  Agreed upon method of communicating (face-to-face, telephone, letter, photograph)  Common language and grammar  Speed and timing of delivery  Confirmation or acknowledgement requirements Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. The Rules Message Encoding Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. The Rules Message Formatting and Encapsulation Example: Personal letter contains the following elements:  An identifier of the recipient  A salutation or greeting  The message content  A closing phrase  An identifier of the sender Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. The Rules Message Size The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. This is known as segmenting. Each segment is encapsulated in a separate frame with the address information, and is sent over the network. At the receiving host, the messages are de-encapsulated and put back together to be processed and interpreted. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. The Rules Message Timing  Access Method  Flow Control  Response Timeout Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. The Rules Message Delivery Options Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Protocols Rules that Govern Communications Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Protocols Network Protocols  How the message is formatted or structured  The process by which networking devices share information about pathways with other networks  How and when error and system messages are passed between devices  The setup and termination of data transfer sessions Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Protocols Interaction of Protocols  Application Protocol – Hypertext Transfer Protocol (HTTP)  Transport Protocol – Transmission Control Protocol (TCP)  Internet Protocol – Internet Protocol (IP)  Network Access Protocols – Data Link & Physical layers Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Protocol Suites Protocol Suites and Industry Standards Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Protocol Suites Creation of Internet, Development of TCP/IP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Protocol Suites TCP/IP Protocol Suite and Communication Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Network Protocols and Standards Standards Organizations Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Standards Organizations Open Standards  The Internet Society (ISOC)  The Internet Architecture Board (IAB)  The Internet Engineering Task Force (IETF)  Institute of Electrical and Electronics Engineers (IEEE)  The International Organization for Standards (ISO) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Standards Organizations ISOC, IAB, and IETF Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. Standards Organizations IEEE  38 societies  130 journals  1,300 conferences each year  1,300 standards and projects  400,000 members  160 countries  IEEE 802.3  IEEE 802.11 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. Standards Organizations ISO Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. Standards Organizations Other Standards Organization  The Electronic Industries Alliance (EIA)  The Telecommunications Industry Association (TIA)  The International Telecommunications Union – Telecommunications Standardization Sector (ITU-T)  The Internet Corporation for Assigned Names and Numbers (ICANN)  The Internet Assigned Numbers Authority (IANA) Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. Reference Models The Benefits of Using a Layered Model Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
  • 24. Reference Models The OSI Reference Model Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
  • 25. Reference Models The TCP/IP Reference Model Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
  • 26. Reference Models Comparing the OSI and TCP/IP Models Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Data Encapsulation Communicating the Messages  Segmenting message benefits Different conversations can be interleaved Increased reliability of network communications  Segmenting message disadvantage Increased level of complexity Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Data Encapsulation Protocol Data Units (PDUs)  Data  Segment  Packet  Frame  Bits Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
  • 29. Data Encapsulation Encapsulation Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
  • 30. Data Encapsulation De-encapsulation Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
  • 31. Moving Data in the Network Accessing Local Resources Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
  • 32. Accessing Local Resources Network Addresses & Data Link addresses  Network Address Source IP address Destination IP address  Data Link Address Source data link address Destination data link address Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 33. Accessing Local Resources Communicating with Device / Same Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
  • 34. Accessing Local Resources MAC and IP Addresses PC1 192.168.1.110 AA-AA-AA-AA-AA-AA PC2 192.168.1.111 BB-BB-BB-BB-BB-BB 11-11-11-11-11-11 S1 R1 FTP Server 192.168.1.9 R1 192.168.1.1 CC-CC-CC-CC-CC-CC ARP Request Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Accessing Remote Resources Default Gateway PC 1 192.168.1.110 AA-AA-AA-AA-AA-AA PC 2 192.168.1.111 BB-BB-BB-BB-BB-BB R1 192.168.1.1 11-11-11-11-11-11 FTP Server 192.168.1.9 CC-CC-CC-CC-CC-CC R2 172.16.1.99 22-22-22-22-22-22 Web Server 172.16.1.99 AB-CD-EF-12-34-56 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. Accessing Remote Resources Communicating Device / Remote Network Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 37. Accessing Remote Resources Using Wireshark to View Network Traffic Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
  • 38. Network Protocols and Communications Summary In this chapter, you learned:  Data networks are systems of end devices, intermediary devices, and the media connecting the devices. For communication to occur, these devices must know how to communicate.  These devices must comply with communication rules and protocols. TCP/IP is an example of a protocol suite.  Most protocols are created by a standards organization such as the IETF or IEEE.  The most widely-used networking models are the OSI and TCP/IP models. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
  • 39. Network Protocols and Communications Summary In this chapter, you learned:  Data that passes down the stack of the OSI model is segmented into pieces and encapsulated with addresses and other labels. The process is reversed as the pieces are de-encapsulated and passed up the destination protocol stack.  The OSI model describes the processes of encoding, formatting, segmenting, and encapsulating data for transmission over the network.  The TCP/IP protocol suite is an open standard protocol that has been endorsed by the networking industry and ratified, or approved, by a standards organization. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
  • 40. Network Protocols and Communications Summary In this chapter, you learned:  The Internet Protocol Suite is a suite of protocols required for transmitting and receiving information using the Internet.  Protocol Data Units (PDUs) are named according to the protocols of the TCP/IP suite: data, segment, packet, frame, and bits.  Applying models allows individuals, companies, and trade associations to analyze current networks and plan the networks of the future. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 41. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41