itn instructorppt chapter3

41
Chapter 3: Network Protocols and Network Protocols and Communications Introduction to Networks © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1

Upload: lumoonaguilar

Post on 17-Dec-2015

64 views

Category:

Documents


15 download

DESCRIPTION

Protocolos net

TRANSCRIPT

  • Chapter 3:Network Protocols andNetwork Protocols and Communications

    Introduction to Networks

    2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1

  • Chapter 3: Objectives

    Students will be able to:

    Explain how rules are used to facilitate communication.E l i th l f t l d t d d Explain the role of protocols and standards organizations in facilitating interoperability in network communicationscommunications.

    Explain how devices on a LAN access resources in a ll t di i d b i t ksmall to medium-sized business network.

    Presentation_ID 2 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Chapter 33 1 R l f C i ti3.1 Rules of Communication3.2 Network Protocols and Standards3.3 Moving Data in the Network3 4 Summary3.4 Summary

    Presentation_ID 3 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • The RulesWhat is Communication?

    Presentation_ID 4 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • The RulesEstablishing the RulesE t bli hi th R lEstablishing the Rules

    An identified sender and receiver An identified sender and receiver Agreed upon method of communicating (face-to-face,

    telephone, letter, photograph)

    Common language and grammarCommon language and grammar Speed and timing of delivery Confirmation or acknowledgement requirements

    Presentation_ID 5 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • The RulesMessage Encoding

    Presentation_ID 6 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • The RulesMessage Formatting and EncapsulationE l P l l tt t i th f ll i l tExample: Personal letter contains the following elements:

    An identifier of the recipientp A salutation or greeting The message content A closing phraseA closing phrase An identifier of the sender

    Presentation_ID 7 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • The RulesMessage SizeTh i t i ti f f i th h t t b kThe size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirementsminimum and maximum size requirements.

    This is known as segmenting.

    Each segment is encapsulated in a separate frame with the address information, and is sent over the network. ,

    At the receiving host, the messages are de-encapsulated and put back together to be processed and interpretedput back together to be processed and interpreted.

    Presentation_ID 8 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • The RulesMessage Timing

    A M th d Access Method Flow Control Response Timeout

    Presentation_ID 9 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • The RulesMessage Delivery Options

    Presentation_ID 10 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • ProtocolsRules that Govern Communications

    Presentation_ID 11 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • ProtocolsNetwork Protocols

    H th i f tt d t t d How the message is formatted or structured The process by which networking devices share information p y g

    about pathways with other networks

    How and when error and system messages are passedHow and when error and system messages are passed between devices

    Th t d t i ti f d t t f i The setup and termination of data transfer sessions

    Presentation_ID 12 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • ProtocolsInteraction of Protocols

    A li ti P t l H t t T f P t l (HTTP) Application Protocol Hypertext Transfer Protocol (HTTP) Transport Protocol Transmission Control Protocol (TCP)p ( ) Internet Protocol Internet Protocol (IP) Network Access Protocols Data Link & Physical layers

    Presentation_ID 13 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Protocol SuitesProtocol Suites and Industry Standards

    Presentation_ID 14 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Protocol SuitesCreation of Internet, Development of TCP/IP

    Presentation_ID 15 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Protocol SuitesTCP/IP Protocol Suite and Communication

    Presentation_ID 16 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Network Protocols and StandardsStandards Organizations

    Presentation_ID 17 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Standards OrganizationsOpen Standards

    Th I t t S i t (ISOC) The Internet Society (ISOC) The Internet Architecture Board (IAB)( ) The Internet Engineering Task Force (IETF) Institute of Electrical and Electronics Engineers (IEEE) The International Organization for Standards (ISO)The International Organization for Standards (ISO)

    Presentation_ID 18 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Standards OrganizationsISOC, IAB, and IETF

    Presentation_ID 19 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Standards OrganizationsIEEE

    38 i ti 38 societies 130 journalsj 1,300 conferences each year 1,300 standards and projects 400,000 members400,000 members 160 countries IEEE 802.3 IEEE 802 11 IEEE 802.11

    Presentation_ID 20 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Standards OrganizationsISO

    Presentation_ID 21 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Standards OrganizationsOther Standards Organization

    Th El t i I d t i Alli (EIA) The Electronic Industries Alliance (EIA) The Telecommunications Industry Association (TIA)y ( ) The International Telecommunications Union

    Telecommunications Standardization Sector (ITU-T)Telecommunications Standardization Sector (ITU T)

    The Internet Corporation for Assigned Names and Numbers (ICANN)(ICANN)

    The Internet Assigned Numbers Authority (IANA)g y ( )

    Presentation_ID 22 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Reference ModelsThe Benefits of Using a Layered Model

    Presentation_ID 23 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Reference ModelsThe OSI Reference Model

    Presentation_ID 24 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Reference ModelsThe TCP/IP Reference Model

    Presentation_ID 25 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Reference ModelsComparing the OSI and TCP/IP Models

    Presentation_ID 26 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Data EncapsulationCommunicating the Messages

    S ti b fit Segmenting message benefitsDifferent conversations can be interleavedIncreased reliability of network communications

    Segmenting message disadvantageIncreased level of complexityIncreased level of complexity

    Presentation_ID 27 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Data EncapsulationProtocol Data Units (PDUs)

    D t Data Segmentg Packet Frame BitsBits

    Presentation_ID 28 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Data EncapsulationEncapsulation

    Presentation_ID 29 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Data EncapsulationDe-encapsulation

    Presentation_ID 30 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Moving Data in the NetworkAccessing Local Resources

    Presentation_ID 31 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Accessing Local ResourcesNetwork Addresses & Data Link addresses

    N t k Add Network AddressSource IP addressDestination IP address

    Data Link AddressSource data link addressSource data link addressDestination data link address

    Presentation_ID 32 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Accessing Local ResourcesCommunicating with Device / Same Network

    Presentation_ID 33 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Accessing Local ResourcesMAC and IP Addresses

    R1R1192.168.1.1

    11-11-11-11-11-11ARP

    RequestPC1

    192.168.1.110AA-AA-AA-AA-AA-AA

    qS1 R1

    PC2192 168 1 111192.168.1.111

    BB-BB-BB-BB-BB-BB

    FTP Server192.168.1.9

    CC-CC-CC-CC-CC-CC

    Presentation_ID 34 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Accessing Remote ResourcesDefault Gateway

    PC 1 R2PC 1192.168.1.110

    AA-AA-AA-AA-AA-AA

    R1192.168.1.1

    11-11-11-11-11-11

    172.16.1.9922-22-22-22-22-22

    Web Server172.16.1.99

    AB-CD-EF-12-34-56

    PC 2 FTP Server192 168 1 9192.168.1.111

    BB-BB-BB-BB-BB-BB192.168.1.9

    CC-CC-CC-CC-CC-CC

    Presentation_ID 35 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Accessing Remote ResourcesCommunicating Device / Remote Network

    Presentation_ID 36 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Accessing Remote ResourcesUsing Wireshark to View Network Traffic

    Presentation_ID 37 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Network Protocols and CommunicationsSummaryI thi h t l dIn this chapter, you learned:

    Data networks are systems of end devices, intermediary y ydevices, and the media connecting the devices. For communication to occur, these devices must know how to communicate.

    These devices must comply with communication rules and p yprotocols. TCP/IP is an example of a protocol suite.

    Most protocols are created by a standards organization such Most protocols are created by a standards organization such as the IETF or IEEE.

    The most widely-used networking models are the OSI and TCP/IP models.

    Presentation_ID 38 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Network Protocols and CommunicationsSummaryI thi h t l dIn this chapter, you learned:

    Data that passes down the stack of the OSI model is psegmented into pieces and encapsulated with addresses and other labels. The process is reversed as the pieces are de-encapsulated and passed up the destination protocol stack.

    The OSI model describes the processes of encoding, p g,formatting, segmenting, and encapsulating data for transmission over the network.

    The TCP/IP protocol suite is an open standard protocol that has been endorsed by the networking industry and ratified orhas been endorsed by the networking industry and ratified, or approved, by a standards organization.

    Presentation_ID 39 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Network Protocols and CommunicationsSummaryI thi h t l dIn this chapter, you learned:

    The Internet Protocol Suite is a suite of protocols required for p qtransmitting and receiving information using the Internet.

    Protocol Data Units (PDUs) are named according to theProtocol Data Units (PDUs) are named according to the protocols of the TCP/IP suite: data, segment, packet, frame, and bits.

    Applying models allows individuals, companies, and trade associations to analyze current networks and plan theassociations to analyze current networks and plan the networks of the future.

    Presentation_ID 40 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

  • Presentation_ID 41 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential