itn instructorppt chapter3
DESCRIPTION
Protocolos netTRANSCRIPT
-
Chapter 3:Network Protocols andNetwork Protocols and Communications
Introduction to Networks
2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
-
Chapter 3: Objectives
Students will be able to:
Explain how rules are used to facilitate communication.E l i th l f t l d t d d Explain the role of protocols and standards organizations in facilitating interoperability in network communicationscommunications.
Explain how devices on a LAN access resources in a ll t di i d b i t ksmall to medium-sized business network.
Presentation_ID 2 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Chapter 33 1 R l f C i ti3.1 Rules of Communication3.2 Network Protocols and Standards3.3 Moving Data in the Network3 4 Summary3.4 Summary
Presentation_ID 3 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
The RulesWhat is Communication?
Presentation_ID 4 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
The RulesEstablishing the RulesE t bli hi th R lEstablishing the Rules
An identified sender and receiver An identified sender and receiver Agreed upon method of communicating (face-to-face,
telephone, letter, photograph)
Common language and grammarCommon language and grammar Speed and timing of delivery Confirmation or acknowledgement requirements
Presentation_ID 5 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
The RulesMessage Encoding
Presentation_ID 6 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
The RulesMessage Formatting and EncapsulationE l P l l tt t i th f ll i l tExample: Personal letter contains the following elements:
An identifier of the recipientp A salutation or greeting The message content A closing phraseA closing phrase An identifier of the sender
Presentation_ID 7 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
The RulesMessage SizeTh i t i ti f f i th h t t b kThe size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirementsminimum and maximum size requirements.
This is known as segmenting.
Each segment is encapsulated in a separate frame with the address information, and is sent over the network. ,
At the receiving host, the messages are de-encapsulated and put back together to be processed and interpretedput back together to be processed and interpreted.
Presentation_ID 8 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
The RulesMessage Timing
A M th d Access Method Flow Control Response Timeout
Presentation_ID 9 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
The RulesMessage Delivery Options
Presentation_ID 10 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
ProtocolsRules that Govern Communications
Presentation_ID 11 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
ProtocolsNetwork Protocols
H th i f tt d t t d How the message is formatted or structured The process by which networking devices share information p y g
about pathways with other networks
How and when error and system messages are passedHow and when error and system messages are passed between devices
Th t d t i ti f d t t f i The setup and termination of data transfer sessions
Presentation_ID 12 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
ProtocolsInteraction of Protocols
A li ti P t l H t t T f P t l (HTTP) Application Protocol Hypertext Transfer Protocol (HTTP) Transport Protocol Transmission Control Protocol (TCP)p ( ) Internet Protocol Internet Protocol (IP) Network Access Protocols Data Link & Physical layers
Presentation_ID 13 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Protocol SuitesProtocol Suites and Industry Standards
Presentation_ID 14 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Protocol SuitesCreation of Internet, Development of TCP/IP
Presentation_ID 15 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Protocol SuitesTCP/IP Protocol Suite and Communication
Presentation_ID 16 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Network Protocols and StandardsStandards Organizations
Presentation_ID 17 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Standards OrganizationsOpen Standards
Th I t t S i t (ISOC) The Internet Society (ISOC) The Internet Architecture Board (IAB)( ) The Internet Engineering Task Force (IETF) Institute of Electrical and Electronics Engineers (IEEE) The International Organization for Standards (ISO)The International Organization for Standards (ISO)
Presentation_ID 18 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Standards OrganizationsISOC, IAB, and IETF
Presentation_ID 19 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Standards OrganizationsIEEE
38 i ti 38 societies 130 journalsj 1,300 conferences each year 1,300 standards and projects 400,000 members400,000 members 160 countries IEEE 802.3 IEEE 802 11 IEEE 802.11
Presentation_ID 20 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Standards OrganizationsISO
Presentation_ID 21 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Standards OrganizationsOther Standards Organization
Th El t i I d t i Alli (EIA) The Electronic Industries Alliance (EIA) The Telecommunications Industry Association (TIA)y ( ) The International Telecommunications Union
Telecommunications Standardization Sector (ITU-T)Telecommunications Standardization Sector (ITU T)
The Internet Corporation for Assigned Names and Numbers (ICANN)(ICANN)
The Internet Assigned Numbers Authority (IANA)g y ( )
Presentation_ID 22 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Reference ModelsThe Benefits of Using a Layered Model
Presentation_ID 23 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Reference ModelsThe OSI Reference Model
Presentation_ID 24 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Reference ModelsThe TCP/IP Reference Model
Presentation_ID 25 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Reference ModelsComparing the OSI and TCP/IP Models
Presentation_ID 26 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Data EncapsulationCommunicating the Messages
S ti b fit Segmenting message benefitsDifferent conversations can be interleavedIncreased reliability of network communications
Segmenting message disadvantageIncreased level of complexityIncreased level of complexity
Presentation_ID 27 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Data EncapsulationProtocol Data Units (PDUs)
D t Data Segmentg Packet Frame BitsBits
Presentation_ID 28 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Data EncapsulationEncapsulation
Presentation_ID 29 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Data EncapsulationDe-encapsulation
Presentation_ID 30 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Moving Data in the NetworkAccessing Local Resources
Presentation_ID 31 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Accessing Local ResourcesNetwork Addresses & Data Link addresses
N t k Add Network AddressSource IP addressDestination IP address
Data Link AddressSource data link addressSource data link addressDestination data link address
Presentation_ID 32 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Accessing Local ResourcesCommunicating with Device / Same Network
Presentation_ID 33 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Accessing Local ResourcesMAC and IP Addresses
R1R1192.168.1.1
11-11-11-11-11-11ARP
RequestPC1
192.168.1.110AA-AA-AA-AA-AA-AA
qS1 R1
PC2192 168 1 111192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server192.168.1.9
CC-CC-CC-CC-CC-CC
Presentation_ID 34 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Accessing Remote ResourcesDefault Gateway
PC 1 R2PC 1192.168.1.110
AA-AA-AA-AA-AA-AA
R1192.168.1.1
11-11-11-11-11-11
172.16.1.9922-22-22-22-22-22
Web Server172.16.1.99
AB-CD-EF-12-34-56
PC 2 FTP Server192 168 1 9192.168.1.111
BB-BB-BB-BB-BB-BB192.168.1.9
CC-CC-CC-CC-CC-CC
Presentation_ID 35 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Accessing Remote ResourcesCommunicating Device / Remote Network
Presentation_ID 36 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Accessing Remote ResourcesUsing Wireshark to View Network Traffic
Presentation_ID 37 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Network Protocols and CommunicationsSummaryI thi h t l dIn this chapter, you learned:
Data networks are systems of end devices, intermediary y ydevices, and the media connecting the devices. For communication to occur, these devices must know how to communicate.
These devices must comply with communication rules and p yprotocols. TCP/IP is an example of a protocol suite.
Most protocols are created by a standards organization such Most protocols are created by a standards organization such as the IETF or IEEE.
The most widely-used networking models are the OSI and TCP/IP models.
Presentation_ID 38 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Network Protocols and CommunicationsSummaryI thi h t l dIn this chapter, you learned:
Data that passes down the stack of the OSI model is psegmented into pieces and encapsulated with addresses and other labels. The process is reversed as the pieces are de-encapsulated and passed up the destination protocol stack.
The OSI model describes the processes of encoding, p g,formatting, segmenting, and encapsulating data for transmission over the network.
The TCP/IP protocol suite is an open standard protocol that has been endorsed by the networking industry and ratified orhas been endorsed by the networking industry and ratified, or approved, by a standards organization.
Presentation_ID 39 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Network Protocols and CommunicationsSummaryI thi h t l dIn this chapter, you learned:
The Internet Protocol Suite is a suite of protocols required for p qtransmitting and receiving information using the Internet.
Protocol Data Units (PDUs) are named according to theProtocol Data Units (PDUs) are named according to the protocols of the TCP/IP suite: data, segment, packet, frame, and bits.
Applying models allows individuals, companies, and trade associations to analyze current networks and plan theassociations to analyze current networks and plan the networks of the future.
Presentation_ID 40 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
-
Presentation_ID 41 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential