NB InstructorPPT Chapter3

Embed Size (px)

Citation preview

  • 8/14/2019 NB InstructorPPT Chapter3

    1/43

    2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1

    Chapter 3:Network Protocols andCommunications

    Network Basics

  • 8/14/2019 NB InstructorPPT Chapter3

    2/43

    Presentation_ID 2 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Chapter 3: Objectives

    Students will be able to:

    Explain the role protocols and standards organizationsin facilitating interoperability in network

    communications.

    Explain how standards are established using theRequest for Comments (RFC) process.

    Explain how devices on a LAN access resources in asmall to medium-sized business network.

  • 8/14/2019 NB InstructorPPT Chapter3

    3/43

    Presentation_ID 3 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Chapter 3

    3.1 Network Protocols and Standards3.2 Using Requests for Comments

    3.3 Moving Data in the Network

    3.4 Summary

  • 8/14/2019 NB InstructorPPT Chapter3

    4/43

    Presentation_ID 4 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Protocols

    Rules that Govern Communications

  • 8/14/2019 NB InstructorPPT Chapter3

    5/43

    Presentation_ID 5 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Protocols

    Network Protocols

    How the message is formatted or structured

    The process by which networking devices share informationabout pathways with other networks

    How and when error and system messages are passedbetween devices

    The setup and termination of data transfer sessions

  • 8/14/2019 NB InstructorPPT Chapter3

    6/43

    Presentation_ID 6 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Protocols

    Interaction of Protocols

    Application Protocol

    Hypertext Transfer Protocol (HTTP)

    Transport Protocol Transmission Control Protocol (TCP)

    Internet Protocol Internet Protocol (IP)

    Network Access Protocols

    Data Link & Physical layers

  • 8/14/2019 NB InstructorPPT Chapter3

    7/43Presentation_ID 7 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Protocol Suites

    Protocol Suites and Industry Standards

  • 8/14/2019 NB InstructorPPT Chapter3

    8/43Presentation_ID 8 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Protocol Suites

    Creation of Internet, Development of TCP/IP

  • 8/14/2019 NB InstructorPPT Chapter3

    9/43Presentation_ID 9 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Protocol Suites

    TCP/IP Protocol Suite and Communication

  • 8/14/2019 NB InstructorPPT Chapter3

    10/43

  • 8/14/2019 NB InstructorPPT Chapter3

    11/43Presentation_ID 11 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Standards Organizations

    Open Standards

    The Internet Society (ISOC)

    The Internet Architecture Board (IAB)

    The Internet Engineering Task Force (IETF)

    Institute of Electrical and Electronics Engineers (IEEE)

    The International Organization for Standards (ISO)

  • 8/14/2019 NB InstructorPPT Chapter3

    12/43Presentation_ID 12 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Standards Organizations

    ISOC, IAB, and IETF

  • 8/14/2019 NB InstructorPPT Chapter3

    13/43Presentation_ID 13 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Standards Organizations

    IEEE

    38 societies

    130 journals

    1,300 conferences each year

    1,300 standards and projects

    400,000 members

    160 countries

    IEEE 802.3

    IEEE 802.11

  • 8/14/2019 NB InstructorPPT Chapter3

    14/43

  • 8/14/2019 NB InstructorPPT Chapter3

    15/43Presentation_ID 15 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Standards Organizations

    Other Standards Organization

    The Electronic Industries Alliance (EIA)

    The Telecommunications Industry Association (TIA)

    The International Telecommunications Union Telecommunications Standardization Sector (ITU-T)

    The Internet Corporation for Assigned Names and Numbers(ICANN)

    The Internet Assigned Numbers Authority (IANA)

  • 8/14/2019 NB InstructorPPT Chapter3

    16/43Presentation_ID 16 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reference Models

    The Benefits of Using a Layered Model

  • 8/14/2019 NB InstructorPPT Chapter3

    17/43Presentation_ID 17 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reference Models

    The OSI Reference Model

  • 8/14/2019 NB InstructorPPT Chapter3

    18/43Presentation_ID 18 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reference Models

    The TCP/IP Reference Model

  • 8/14/2019 NB InstructorPPT Chapter3

    19/43Presentation_ID 19 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Reference Models

    Comparing the OSI and TCP/IP Models

  • 8/14/2019 NB InstructorPPT Chapter3

    20/43Presentation_ID 20 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Using Requests for Comments

    Why RFCs

    Used for peer review

    Not all RFCs come from IETF

    Some RFCs come from IAB, IRTF, or independentsubmissions

  • 8/14/2019 NB InstructorPPT Chapter3

    21/43Presentation_ID 21 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Why RFCs

    Request for Comments (RFC)

    HTTP

    RFC 2616

    DHCP RFC 2131

    IPv4RFC 791

    IPv6

    RFC 2460

    RFC 1149 delivery of IPv4 packets by carrier pigeons

    RFC 6214

    extension of RFC 1149 using IPv6

  • 8/14/2019 NB InstructorPPT Chapter3

    22/43Presentation_ID 22 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Why RFCs

    History of RFCs

    October 29, 1969 ARPANET sentfirst message (Designed by RFP)

  • 8/14/2019 NB InstructorPPT Chapter3

    23/43Presentation_ID 23 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Why RFCs

    Sample RFC

    RFC 1918 PrivateAddress Space

  • 8/14/2019 NB InstructorPPT Chapter3

    24/43Presentation_ID 24 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    CU Using Requests for Comments

    RFC Processes

  • 8/14/2019 NB InstructorPPT Chapter3

    25/43

    Presentation_ID 25 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    RFC Processes

    RFC Process

    Internet-Draft (ID)

    Proposed standard

    Internet standard

  • 8/14/2019 NB InstructorPPT Chapter3

    26/43

    Presentation_ID 26 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    RFC Processes

    RFC Types

    Internet Standard

    Best Current Practice (BCP)

    Informational

    Experimental

    Historic

  • 8/14/2019 NB InstructorPPT Chapter3

    27/43

    Presentation_ID 27 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Moving Data in the Network

    Data Encapsulation

  • 8/14/2019 NB InstructorPPT Chapter3

    28/43

    Presentation_ID 28 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Data Encapsulation

    Elements of Communication

    Message Source

    Destination or receiver of the message

    Channel

  • 8/14/2019 NB InstructorPPT Chapter3

    29/43

    Presentation_ID 29 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Data Encapsulation

    Communicating the Messages

    Segmenting message benefits

    Different conversations can be interleaved

    Increased reliability of network communications

    Segmenting message disadvantageIncreased level of complexity

  • 8/14/2019 NB InstructorPPT Chapter3

    30/43

    Presentation_ID 30 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Data Encapsulation

    Protocol Data Units (PDUs)

    Data

    Segment

    Packet

    Frame Bits

  • 8/14/2019 NB InstructorPPT Chapter3

    31/43

    Presentation_ID 31 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Data Encapsulation

    Encapsulation

  • 8/14/2019 NB InstructorPPT Chapter3

    32/43

    Presentation_ID 32 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Data Encapsulation

    De-encapsulation

  • 8/14/2019 NB InstructorPPT Chapter3

    33/43

    Presentation_ID 33 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Moving Data in the Network

    Accessing Local Resources

  • 8/14/2019 NB InstructorPPT Chapter3

    34/43

    Presentation_ID 34 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Accessing Local Resources

    Network Addresses & Data Link addresses

    Network Address

    Source IP address

    Destination IP address

    Data Link AddressSource data link address

    Destination data link address

  • 8/14/2019 NB InstructorPPT Chapter3

    35/43

    Presentation_ID 35 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Accessing Local Resources

    Communicating with Device / Same Network

  • 8/14/2019 NB InstructorPPT Chapter3

    36/43

    Presentation_ID 36 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Accessing Local Resources

    MAC and IP Addresses

    PC1192.168.1.110AA-AA-AA-AA-AA-AA

    PC2192.168.1.111

    BB-BB-BB-BB-BB-BB

    FTP Server192.168.1.9

    CC-CC-CC-CC-CC-CC

    R1192.168.1.1

    11-11-11-11-11-11ARP

    Request

    S1 R1

  • 8/14/2019 NB InstructorPPT Chapter3

    37/43

    Presentation_ID 37 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Accessing Remote Resources

    Default Gateway

    PC 1192.168.1.110

    AA-AA-AA-AA-AA-AA

    PC 2192.168.1.111

    BB-BB-BB-BB-BB-BB

    FTP Server192.168.1.9

    CC-CC-CC-CC-CC-CC

    R1192.168.1.1

    11-11-11-11-11-11

    R2172.16.1.99

    22-22-22-22-22-22

    Web Server172.16.1.99

    AB-CD-EF-12-34-56

  • 8/14/2019 NB InstructorPPT Chapter3

    38/43

    Presentation_ID 38 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Accessing Remote Resources

    Communicating Device / Remote Network

  • 8/14/2019 NB InstructorPPT Chapter3

    39/43

    Presentation_ID 39 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Accessing Remote Resources

    Using Wireshark to View Network Traffic

  • 8/14/2019 NB InstructorPPT Chapter3

    40/43

    Presentation_ID 40 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Protocols and Communications

    Summary

    In this chapter, you learned: Data networks are systems of end devices, intermediary

    devices, and the media connecting the devices. Forcommunication to occur, these devices must know how to

    communicate. These devices must comply with communication rules and

    protocols. TCP/IP is an example of a protocol suite.

    Most protocols are created by a standards organization such

    as the IETF or IEEE.

    The most widely-used networking models are the OSI andTCP/IP models.

  • 8/14/2019 NB InstructorPPT Chapter3

    41/43

    Presentation_ID 41 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Protocols and Communications

    Summary

    In this chapter, you learned: Data that passes down the stack of the OSI model is

    segmented into pieces and encapsulated with addresses andother labels. The process is reversed as the pieces are de-

    encapsulated and passed up the destination protocol stack. The OSI model describes the processes of encoding,

    formatting, segmenting, and encapsulating data fortransmission over the network.

    The TCP/IP protocol suite is an open standard protocol thathas been endorsed by the networking industry and ratified, orapproved, by a standards organization.

  • 8/14/2019 NB InstructorPPT Chapter3

    42/43

    Presentation_ID 42 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

    Network Protocols and Communications

    Summary

    In this chapter, you learned: The Internet Protocol Suite is a suite of protocols required for

    transmitting and receiving information using the Internet.

    Protocol Data Units (PDUs) are named according to the

    protocols of the TCP/IP suite: data, segment, packet, frame,and bits.

    Applying models allows individuals, companies, and tradeassociations to analyze current networks and plan the

    networks of the future.

  • 8/14/2019 NB InstructorPPT Chapter3

    43/43