ICS26014 Module03
ICS26014 Module03
Models
Standards Organizations Explain the role of standards organizations in establishing protocols for network
interoperability.
Reference Models Explain how the TCP/IP model and the OSI model are used to facilitate
standardization in the communication process.
Data Encapsulation Explain how data encapsulation allows data to be transported across the
network.
Data Access Explain how local hosts access local resources on a network.
3.1 The Rules
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
The Rules
Communications Fundamentals
Networks can vary in size and complexity. It is not enough to have a connection,
devices must agree on “how” to communicate.
There are three elements to any communication:
• There will be a source (sender).
• There will be a destination (receiver).
• There will be a channel (media) that provides for the path of communications
to occur.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
The Rules
Communications Protocols
The Rules
Rule Establishment (Cont.)
The Rules
Message Size
Encoding between hosts must be in an appropriate format for the medium.
• Messages sent across the network are converted to bits
• The bits are encoded into a pattern of light, sound, or electrical impulses.
• The destination host must decode the signals to interpret the message.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
The Rules
Message Timing
Note: Broadcasts are used in IPv4 networks, but are not an option for IPv6. Later we will also
see “Anycast” as an additional delivery option for IPv6.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
The Rules
A Note About the Node Icon
• Documents may use the node icon , typically a circle, to represent all devices.
• The figure illustrates the use of the node icon for delivery options.
3.2 Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Protocols
Network Protocol Overview
Function Description
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
Flow Control Ensures data flows at an efficient rate
Sequencing Uniquely labels each transmitted segment of data
Error Detection Determines if data became corrupted during transmission
Application Interface Process-to-process communications between network applications
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Protocols
Protocol Interaction
Protocol Function
Hypertext Transfer ▪ Governs the way a web server and a web client interact
Protocol (HTTP) ▪ Defines content and format
Transmission ▪ Manages the individual conversations
Control Protocol ▪ Provides guaranteed delivery
(TCP) ▪ Manages flow control
Internet Protocol Delivers messages globally from the sender to the receiver
(IP)
Ethernet Delivers messages from one NIC to another NIC on the same
Ethernet Local Area Network (LAN)
3.3 Protocol Suites
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Protocol Suites
Network Protocol Suites
Protocols must be able to work with other
protocols.
Protocol suite:
• A group of inter-related protocols
necessary to perform a
communication function
• Sets of rules that work together to
help solve a problem
The protocols are viewed in terms of layers:
• Higher Layers
• Lower Layers- concerned with moving
data and provide services to upper
layers
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Protocol Suites
Evolution of Protocol Suites
• A web server encapsulating and sending a • A client de-encapsulating the web page for
web page to a client. the web browser
3.4 Standards Organizations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Standards Organizations
Open Standards
Open standards encourage:
• interoperability
• competition
• innovation
Standards organizations are:
• vendor-neutral
• non-profit organizations
• established to develop and promote the
concept of open standards.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Standards Organizations
Internet Standards • Internet Society (ISOC) - Promotes the
open development and evolution of
internet
• Internet Architecture Board (IAB) -
Responsible for management and
development of internet standards
• Internet Engineering Task Force
(IETF) - Develops, updates, and
maintains internet and TCP/IP
technologies
• Internet Research Task Force (IRTF) -
Focused on long-term research related
to internet and TCP/IP protocols
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Standards Organizations
Internet Standards (Cont.)
Standards organizations involved with the
development and support of TCP/IP
• Internet Corporation for Assigned
Names and Numbers (ICANN) -
Coordinates IP address allocation,
the management of domain names,
and assignment of other information
• Internet Assigned Numbers
Authority (IANA) - Oversees and
manages IP address allocation,
domain name management, and
protocol identifiers for ICANN
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Standards Organizations
Electronic and Communications Standards
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Reference Models
The Benefits of Using a Layered Model
5 - Session Provides services to the presentation layer and to manage data exchange.
Defines services to segment, transfer, and reassemble the data for individual
4 - Transport
communications.
3 - Network Provides services to exchange the individual pieces of data over the network.
2 - Data Link Describes methods for exchanging data frames over a common media.
TCP/IP Model
Description
Layer
Application Represents data to the user, plus encoding and dialog control.
Network Access Controls the hardware devices and media that make up the network.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Reference Models
OSI and TCP/IP Model Comparison
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Data Encapsulation
Segmenting Messages
Segmenting is the process of breaking up
messages into smaller units. Multiplexing is
the processes of taking multiple streams of
segmented data and interleaving them
together.
Segmenting messages has two primary
benefits:
• Increases speed - Large amounts of data
can be sent over the network without tying
up a communications link.
• Increases efficiency - Only segments
which fail to reach the destination need to
be retransmitted, not the entire data
stream.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Data Encapsulation
Sequencing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Data Access
Addresses
Both the data link and network layers use addressing to deliver data from source to
destination.
Network layer source and destination addresses - Responsible for delivering the IP
packet from original source to the final destination.
Data link layer source and destination addresses – Responsible for delivering the data
link frame from one network interface card (NIC) to another NIC on the same network.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Data Access
Layer 3 Logical Address
• Notice that the packet is not modified, but the frame is changed, therefore the L3 IP
addressing does not change from segment to segment like the L2 MAC addressing.
• The L3 addressing remains the same since it is global and the ultimate destination is still the
Web Server.
Data Access
Lab – Use Wireshark COLLEGE
to INSTITUTE
View Network TrafficAND AND
OF INFORMATION
OF INFORMATION COMPUTING
COMPUTING SCIENCES
SCIENCES
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Module Practice and Quiz
What did I learn in this module?
The Rules
• Protocols must have a sender and a receiver.
• Each network protocol has its own function, format, and rules for communications.
Protocol Suites
• A protocol suite is a group of inter-related protocols.
Standards Organizations
• Open standards encourage interoperability, competition, and innovation.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Module Practice and Quiz
What did I learn in this module? (Cont.)
Reference Models
• The two models used in networking are the TCP/IP and the OSI model.
• The TCP/IP model has 4 layers and the OSI model has 7 layers.
Data Encapsulation
• The form that a piece of data takes at any layer is called a protocol data unit (PDU).
• There are five different PDUs used in the data encapsulation process: data, segment,
packet, frame, and bits
Data Access
• The Network and Data Link layers are going to provide addressing to move data through
the network.
• Layer 3 will provide IP addressing and layer 2 will provide MAC addressing.
• The way these layers handle addressing will depend on whether the source and the
destination are on the same network or if the destination is on a different network from the
source.
INSTITUTE
COLLEGE OF INFORMATION
OF INFORMATION AND AND COMPUTING
COMPUTING SCIENCES
SCIENCES
Let’s play