0 ratings0% found this document useful (0 votes) 376 views41 pagesProtocols and Reference Models - CCNAv7-1
This ppt covers the basics related to Protocols, Reference Models, Data Access of Computer Networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
CCNAv7-1
Introduction to Networks
Module 3: Protocols and Models
*
eet Mukesh Chinta &
Assistant Professor
Rownar Deptof CSE, VRSEC
Pig isconstrcednaructer aModule Objectives
Module Title: Protocols and Models
Module Objective: Explain how network protocols enable devices to access local and
remote network resources.
Describe the types of rules that are necessary to successfully communicate.
Explain why protocols are necessary in network communication.
Explain the purpose of adhering to a protocol suite.
Explain the role of standards organizations in establishing protocols for
network interoperability
Explain how the TCP/IP model and the OSI model are used to facilitate
standardizationin the communication process.
Explain how data encapsulationallows data to be transported across the
network.
Explain how local hosts access local resources on a network.To watch this lecture on Youtube,
Subscribe to my Channel @
https://youtube.com/channel/UCqQ6FQ62fpld40Jp9BFHtDg
Or type in MUKESH CHINTAin youtube..
If you like the content that | am discussing, Click Like. If you have
any issues related to the content, feel free to contact me.
Good suggestions are always welcome!!!
@.
PEThe Rules
Communications Fundamentals
Networks can vary in size and complexity. It is not enough to have a connection,
devices must agree on “how” to communicate.
There are three elements to any communication:
= Message source (sender) - Message sources are people, or electronic devices,
that need to send a message to other individuals or devices.
= Message Destination (receiver) - The destination receives the message and
interprets it.
= Channel - This consists of the media that provides the pathway over which the
message travels from source to destination.
shal Transmitter >} Channel >| ReceiverThe Rules
Network Protocol Requirements
Common computer protocols must be in agreement and include the following
requirements:
© Message encoding - Encoding is the process of converting information into another
acceptable form for transmi
ion.
YW Message formatting and encapsulation - Message formats depend on the type of
message and the channel that is used to deliver the message.
© Message size - when a long message is sent from one host to another over a network, it is
necessary to break the message into smaller pieces
W Message timing - Message timing includes Flow Control, Response Timeout & Access
method.
YW Message delivery options - Three types of data communications include Unicast,
Multicast & Broadcast3.2 ProtocolsNetwork Protocol Overview
Network protocols define a common format and set of rules for exchanging messages
between devices. Protocols are implemented by end devices and intermediary devices in
software, hardware, or both. Each network protocol has its own function, format, and rules
for communications.
Protocol Type errors Cay
| Network | enable two or more devices to communicate over |
| Communications _/ one or more networks |
|
iE
se
secure data to provide authentication, data |
|
| Network Security
compare path information, and select best path
Fused for the automatic detection of devices or
Service Discovery nan =Functions
agreed-upon
communicate .
may have may have
one or functions.
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
Flow Control Ensures data flows atan efficient rate
Sequencing Uniquely labels each transmitted segment of data
Error Detection Determines if data became corrupted during transmission
Application Interface _Process-to-process communications between network applicationsProtocols
Protocol Interaction
|
« A message sent over a computer network typically requires the use of several
protocols, each one with its own functions and format.
_ Hypertext Transfer Governs the way a web server and a web client interact
= Provides guaranteed delivery
amis Manages flow control_
| Protocol (TCP) |
|
is Internet I Protocol 1(1P)_ i Delivers messages ¢ globally from the sender tc ‘tot there receiver
|
| Ethernet _ Delivers messages from one NIC to another NIC on the same
L Ethernet Local Area Network (LAN) |3.3 Protocol SuitesProtocol Suites
Network Protocol Suites
Protocols must be able to work with other
protocols.
Protocol suite:
+ A group of inter-related protocols necessary to
perform a communication function
+ Sets of rules that work together to help solve a | cum
problem Hse sini
The protocols are viewed in terms of layers:
+ Higher Layers
== |} —.
+ Lower Layers- concemed with moving data
and provide services to upper layers
0 ies ae as fe at wre oer lp oe 3 DeProtocol Suites
Evolution of Protocol Suites
There are several protocol suites.
+ Internet Protocol Suite or TCP/IP- The most
common protocol suite and is maintained by
the Internet Engineering Task Force (IETF)
+ Open Systems Interconnection (OSI)
protocols- Developed by the International
Organization for Standardization (ISO) and the
International ‘Telecommunications Union
aru)
+ AppleTalk- Proprietary suite release by Apple
Inc.
+ Novell NetWare- Proprietary suite developed
by Novell Inc.Protocol Suites
TCP/IP Protocol Suite
Teomm tae
+ TCP/IP is the protocol suite used by
the internet and includes many
protocols.
+ TCPAP is:
+ An open standard protocol suite that
is freely available to the public and
can be used by any vendor
* A standards-based protocol suite that
is endorsed by the networking
industry and approved by a standards
organization to ensure
interoperability.Protocol Suites
TCP/IP Communication Process
A web server encapsulating and = -A client _de-encapsulating the
sending a web page to a client. web page for the web browser
User Data
TCP Segment
1P Packet
Web Server Web cient3.4 Standards Organizations‘Standards Organizations
Open Standards
IEEE
@
Internet Assigned Numbers Authority
yn
ET F
Open standards encourage:
+ interoperability
+ competition
+ innovation
Standards organizations are:
+ vendor-neutral
+ non-profit organizations
+ established to develop and promote
the concept of open standardsStandards Organizations
Internet Standards
7 + Internet Society (ISOC) - Promotes the
"BEER IE ore moves open development and evolution of internet
- Internet Architecture Board (IAB) -
I
Demme Responsible for management and
TAB
development of internet standards
oe a + Internet Engineering Task —_ Force
saree” ees | tattoe i) (IETF) - Develops, updates, and maintains
internet and TCP/IP technologies
+ Internet Research Task Force (IRTF) -
Focused on long-term research related to
internet and TCP/IP protocols‘Standards Organizations
Internet Standards (Cont.)
-
Standards organizations involved with the
development and support of TCP/IP
LE —— ESC; Internet Corporati
a | ; Names and Ni
Coordinates IP a cation, the
management of dot
Acree {eo} Pot bers assignment of ‘other infe
ye’ “+ Internet. Assigne r
Authority (IANA) -
manages IP address allocation, domain
name management, and __ protocol
eee ~~ id iers for ICANN. :
ois ‘dateStandards Organizations
Electronic and Communications Standards
+ Institute of Electrical and Electronics Engineers (IEEE, pronounced “I-triple-E”) -
dedicated to creating standards in power and energy, healthcare, telecommunications,
and networking
+ Electronic Industries Alliance (EIA) - develops standards relating to electrical wiring,
connectors, and the 19-inch racks used to mount networking equipment
+ Telecommunications Industry Association (TIA) - develops communication
standards in radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite
communications, and more
+ International Telecommunications Union-Telecommunication Standardization
Sector (ITU-T) - defines standards for video compression, Internet Protocol Television
(IPTV), and broadband communications, such as a digital subscriber line (DSL)3.5 Reference ModelsReference Models
The Benefits of Using a Layered Model
Answering model ony 3
sv
Complex concepts such as how a
network operates can be difficult to
explain and understand. For this
reason, a layered model is used.
Two layered models describe
network operations:
+ Open System Interconnection (OSI)
Reference Model
+ TCP/IP Reference ModelReference Models
The Benefits of Using a Layered Model (Cont.)
These are the benefits of using a layered model:
Assist in protocol design because protocols that operate at a specific layer have
defined information that they act upon and a defined interface to the layers above
and below
‘Foster competition because products from different vendors can work together
‘Prevent technology or capability changes in one layer from affecting other layers
above and below
Provide a common language to describe networking functions and capabilities7- Application
Contains protocols used for process-to-process communications.
6 - Presentation
Provides for common representation of the data transferred between
application layer services.
5 - Session
Provides services to the presentation layer and to manage data exchange.
4- Transport
Defines services to segment, transfer, and reassemble the data for individual
communications.
3 - Network
Provides services to exchange the individual pieces of data over the
network,
2-Data Link
Describes methods for exchanging data frames over a common media.
1 - Physical
Describes the means to activate, maintain, and de-activate physical
connections.Reference Models
The TCP/IP Reference Model
TCP/IP Model
Laget Description
Application Represents data to the user, plus encoding and dialog control.
Supports communication between various devices across
diverse networks.
‘Transport
Pitta Determines the best path through the network.
Controls the hardware devices and media that make up the
Dra ae Cae
network.Reference Models
OSI and TCP/IP Model Comparison
051 Model
TCP/IP Model
> The OSI model divides the network
access layer and the application layer
eee of the TCP/IP model into multiple
layers.
> The TCP/IP protocol suite does not
specify which protocols to use when
transmitting over a physical medium.
OSI Layers 1 and 2 discuss the
necessary procedures to access the
media and the physical means to
send data over a network.3.6 Data EncapsulationData Encapsulation
Segmenting Messages
Segmenting is the process of breaking up
messages into smaller units. Multiplexing is the
processes of taking multiple streams of
segmented data and interleaving them
together.
; Segmenting messages has two primary
benefits:
+ Increases speed - Large amounts of data
can be sent over the network without tying
up a communications link.
+ Increases efficiency - Only segments which
fail to reach the destination need to be
le retransmitted, not the entire data stream.Sequencing messages Bee
process of numbering the segments
so that the message may be
reassembled at the destination.
TCP is responsible for sequencing
the individual segments.Data Encapsulation
Protocol Data Units
Encapsulation is the process where protocols add
their information to the data.
+ At each stage of the process. a PDU has a different,
name to reflect its new functions.
PDUs passing down the stack are as follows:
1. Data Data Stream)
Segment
Packet
Frame
Bits (Bit Stream)
BT nis a aeicteetyrocers
+ The level above does its process and then passes it
down to the next level of the model. This process is
repeated by each layer until it is sent out as a bit
stream.
yey3.7 Data AccessData Access
Addresses
Both the data link and network layers use addressing to deliver data from source to
destination.
© Network layer source and destination addresses - Responsible for delivering the IP
packet from original source to the final destination.
© Data link layer source and destination addresses — Responsible for delivering the data
link frame from one network interface card (NIC) to another NIC on the same network.
(—Piysicat—) (Datalink) (Network) (Transport) (Upper Layers)Data Access
Layer 3 Logical Address
The IP packet contains two IP addresses:
+ Source IP address - The IP address of the
sending device, original source of the packet.
+ Destination IP address - The IP address of
the receiving device, final destination of the
packet.
An IP address contains two parts:
@ Networkportion (IPv4) or Prefix (IPv6)
* The left-most part of the address indicates the network group which the IP
member. a
= Each LAN or WAN will have the same network portion.
© Hostportion (IPv4) or Interface ID (IPv6)
= The remaining part of the address identifies a specific device within .
4s, .This portion is unique for each device on the network iData Access
Devices on the Same Network
When devices are on the same
network the source and destination
will have the same number in
network portion of the address.
+ PC1- 110
+ FTP Server — 9
a UE TaeData Access
Role of the Data Link Layer Addresses: Same IP Network
When devices are on the same Ethernet
network the data link frame will use the
actual MAC address of the destination NIC.
MAC addresses are physically embedded
into the Ethernet NIC and are local
addressing,
+ The Source MAC address will be that of the
originator on the link.
+ The Destination MAC address will always
be on the same link as the source, even if
the ultimate destination is remote. pres.Data Access
Role of the Network Layer Addresses
When the source and destination have a different network portion, this means they are on different
networks.
‘aa Une Theta ae
Seomeee ace exxoatrane reno JY sr pate Hood 1
+ Web Server ~ 172.16.1 j=
NS”
ie
it
*Data Access
Role of the Data Link Layer Addresses: Different IP Networks
When the final destination is remote, Layer 3
will provide Layer 2 with the local defautt
gateway IP address, also known as the
router address.
The default gateway (DGW) is the router
interface IP address that is part of this LAN
and will be the “door” or “gateway” to all other
remote locations
Alll devices on the LAN must be told about this
address or their traffic will be confined to the
LAN only.
Once Layer 2 on PCI forwards to the default
gateway (Router), the router then can start the
routing process of getting the information to
acttial destination,
Ss
ct
i co
Sze
Note: While the L2 local addressing will change from link to
link or hop to hop, the L3 addressing remains the same.Data Access
Data Link Addresses
+ Since data link addressing is local addressing, it will have a source and destination for each
segment or hop of the journey to the destination
+ The MAC addressing for the first segment is
+ Source — (PC1 NIC) sends frame
+ Destination — (First Router- DGW interface) receives frame
Passe sono
(sl | es ealData Access
Data Link Addresses (Cont.)
The MAC addressing for the last segment is:
+ Source — (Second Router- exit interface) sends frame
+ Destination — (Web Server NIC) receives frame
Origa Source Frat
per
$92.168.1.110
12 Header 13 PacketEee
Data Link Addresses (Cont.)
Notice that the packet is not modified, but the frame is changed, therefore the |
addressing does not change from segment to segment like the L2 MAC addressi
The L3 addressing remains the same since it is global and the ultimate destina
still the Web Server. ‘Ongna SoursTo watch this lecture on Youtube,
Subscribe to my Channel @
https://youtube.com/channel/UCqQ6FQ62fpld40Jp9BFHtDg
Or type in MUKESH CHINTAin youtube..
If you like the content that | am discussing, Click Like. If you have
any issues related to the content, feel free to contact me.
Good suggestions are always welcome!!!
You might also like
Symmetric Encryption, DES, AES, MAC, Hash Algorithms, HMAC
Symmetric Encryption, DES, AES, MAC, Hash Algorithms, HMAC
76 pages