Ccna1 CH3
Ccna1 CH3
1
2
Confirmation or acknowledgement requirement & understand – Ok •
.understood 5
Speed and timing of delivery - slowly • 4
Common language and grammar - English • 3
.Agreed upon method of communicating- phone • 2
An identified sender and receiver • 1
followed in order for the message to be successfully delivered and understood
Before starting communication with each other, rules, or protocols, must be
1. Communication over human network
Rule Establishment
Protocols must account for the
following requirements:
• An identified sender and receiver
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment
requirements
3
Rule Establishment
”Rules that govern Communication “ Protocols
4
Protocols - Message Encoding
5
Protocols - Message Formatting and Encapsulation
6
Protocols - Message size
• Frames that are too long or too short are not delivered , the size of the
message sent depends on the type of the media.
• The sender might break the message into parts called segments so that it meets
the requirements and limits determined by the media.
• Each segment should be encapsulated as a frame that contains the address of the
source and destination.
• At the destination , frames are decapsulated , segments are put back together and
the message is built.
7
Protocols - Message Timing
These are the rules of engagement for message timing.
Access Method
Access method determines when someone is able to send a message. If
two people talk at the same time, a collision of information occurs and it is
necessary for the two to back off and start again. Hosts on a network need
an access method to know when to begin sending messages and how to
respond when collisions occur.
Flow Control
Timing also affects how much information can be sent and the speed that it
can be delivered. If one person speaks too quickly, it is difficult for the
other person to hear and understand the message. In network
communication, source and destination hosts use flow control methods to
negotiate correct timing for successful communication.
Response Timeout
If a person asks a question and does not hear a response within an
acceptable amount of time, the person assumes that no answer is coming
and reacts accordingly. The person may repeat the question, or may go on
with the conversation. Hosts on the network also have rules that specify
how long to wait for responses and what action to take if a response
timeout occurs.
8
Protocols – Message delivery options
9
Rules that Govern Communications
Defines what should that data be at the end of each layer but not how to “ It
does not dictate how to accomplish specific layer functions”.
Protocols are implemented in software and hardware that is loaded on each host
and network device. Example: TCP/IP protocol suite.
11
Network Protocols
Networking protocols define a common format and set of rules for
exchanging messages between devices. Some common
networking protocols are Hypertext Transfer Protocol (HTTP),
Transmission Control Protocol (TCP), and Internet Protocol (IP).
networking protocols describe the following processes:
• How the message is formatted or structured.
• The process by which networking devices share information about
pathways with other networks.
• How and when error and system messages are passed between
devices.
• The setup and termination of data transfer sessions.
Note: IP in this course refers to both the IPv4 and IPv6 protocols.
IPv6 is the most recent version of IP and the replacement for the
more common IPv4.
12
Protocol Interaction
Communication between a web server and web client is an
example of an interaction between several protocols. The
protocols shown in the figure include:
HTTP - is an application
protocol that governs the way
a web server and a web client
interact. HTTP defines the
content and formatting of the
requests and responses that
are exchanged between the
client and server. Both the
client and the web server
software implement HTTP as
part of the application. HTTP
relies on other protocols to
govern how the messages are
transported between the
client and server.
13
Protocol Interaction
Communication between a web server and web client is an
example of an interaction between several protocols. The
protocols shown in the figure include:
15
Protocol Interaction
Communication between a web server and web client is an
example of an interaction between several protocols. The
protocols shown in the figure include:
Ethernet - is a network
access protocol that describes
two primary functions:
communication over a data
link and the physical
transmission of data on the
network media. Network
access protocols are
responsible for taking the
packets from IP and
formatting them to be
transmitted over the media.
16
Message uses Multiple protocols (encapsulation)
HTTP Example :
Protocols Header Data Web data
IP TCP App
Frame Header Header Data Frame Trailer
Header Header
209.67.102.55
107.16.4.21
18
Putting It all Together
.Converted to Binary .1
19
Putting It all Together
20
Putting It all Together
21
Putting It all Together
6 7
1 2 3 4
22
Protocol Suites and Industry
Standards
A protocol suite is a set of protocols that work together to provide
comprehensive network communication services. A protocol suite may be
specified by a standards organization or developed by a vendor. Protocol
suites, can be a bit overwhelming. However, this course will only cover the
protocols of the TCP/IP protocol suite.
The TCP/IP protocol suite is an open standard, meaning these protocols
are freely available to the public, and any vendor is able to implement
these protocols on their hardware or in their software.
A standards-based protocol is a process that has been endorsed by the
networking industry and approved by a standards organization. The use of
standards in developing and implementing protocols ensures that products
from different manufacturers can interoperate successfully.
If a protocol is not rigidly observed by a particular manufacturer, their
equipment or software may not be able to successfully communicate with
products made by other manufacturers.
23
Protocol Suites and Industry
Standards
Some protocols are proprietary which means one company or vendor controls the
definition of the protocol and how it functions. Examples of proprietary protocols are
AppleTalk and Novell Netware, which are legacy protocol suites. It is not uncommon
for a vendor (or group of vendors) to develop a proprietary protocol to meet the
needs of its customers and later assist in making that proprietary protocol an open
standard.
24
Development of TCP/IP
The first packet switching network and
predecessor to today’s Internet was the
Advanced Research Projects Agency Network
(ARPANET), which came to life in 1969 by
connecting mainframe computers at four
locations. ARPANET was funded by the U.S.
Department of Defense for use by universities
and research laboratories.
25
Getting protocol to the right layer ( TCP/IP Model)
• Now – Industry standards exist and ensure protocols and products from
different manufacturers can work together for efficient communications
27
Standards
Organizations
29
IAB
30
IETF
31
IEEE
32
Cisco IOS
Purpose of OS
ISO is not an acronym but based on the Greek word ISOS, meaning equal.
ISO is best known for its Open Systems Interconnection (OSI) reference model.
ISO published the OSI reference model in 1984 to develop a layered framework
33
Other Standards Organizations
standards related to
wiring, connectors, Developing standards in a
racks variety of areas cellular
towers, Voice over IP (VoIP)
34
2 types of networking Model
35
The (TCP/IP – OSI) model Comparison
36
The OSI model
37
38
OSI – The Application Layer
Interface users to network services and applications.
Synchronize dialogue between presentation layers on the two hosts and manages
their data exchange.
39
OSI – The Transport Layer
Ensures that the data arrive completely by adding functions for reliable
transfer. Functions include acknowledgement, error recovery, and sequencing.
Transmission Control Protocol “TCP” and User Datagram Protocol (UDP) provide
the necessary functionality.
40
OSI – The Data Link Layer
Detect errors that may occur in the Physical layer using the (CRC).
41
Communicating the Messages
I have to
wait…
001010
Segmentation
Better approach – segmentation and multiplexing.
43
Message Segmentation
Segmenting messages has two primary benefits:
• By sending smaller individual pieces from source to destination, many
different conversations can be interleaved on the network, called
multiplexing.
• Segmentation can increase the efficiency of network communications.
If part of the message fails to make it to the destination, due to failure
in the network or network congestion, only the missing parts need to
be retransmitted.
44
Segmentation and interleaving – Better reliability
Advantages : Reliability : Same message segments need not travel the same
pathway across the network from source to destination
• Different paths .
• Alternate path.
• Only the missing segments need to be retransmitted.
46
The Communication Process
Segment and
Encapsulate to a
packet source
Decapsulate and
and destination
Reassemble
logical
addresses.
Email Message
Header Data
Header Data
0010100111011001010000011111010100010101
48
Protocol Data Units and Encapsulation
Email Message
Header Data
Header Data
0010100111011001010000011111010100010101
49
Putting It All Together
Port
Logical
MAC MAC
Layer 3 Header
Getting Data to the End Device
Layer 2 source and destination addresses of the frame are concerned with the
delivery of messages on a single local network. “Whose next”
Layer 2 address is unique on the local network and represents the address of the
end device on the physical media called the Media Access Control (MAC) address.
Once a frame is successfully received by the destination host, the Layer 2 address
information is removed as the data is decapsulated and moved up the protocol
stack to Layer 3.
The layer 2 trailer address supports error detection using the CRC.
51
Getting the Data Through the Internetwork
Layer 3 protocols are used to move data from one local network to another local
network within an internetwork.
Layer 3 headers contain the Source and the destination IP addresses, also called
the logical address that helps to identify the source and destination.
Routers use the network identifier portion of this address to determine which path
to use to reach the destination host.
52
Two Address Types
• Physical (MAC):
• The physical address uniquely identifies the host from all other hosts all over
the network at Layer 2. “ who is next address”
54
The MAC Address
55
Ethernet MAC Address
48 bits in length.
Expressed as
12 hexadecimal
digits.
The first 6 hexadecimal digits are administered by the IEEE, identify the
manufacturer Organizational Unique Identifier (OUI).
56
Ethernet MAC Address
The OUI and the sequential number ensure that the assigned MAC
addresses remain unique.
00-60-2F-3A-07-BC 00-20-E0-6B-17-62
00:60:2F:3A:07:BC 00:20:E0:6B:17:62
0060.2F3A.07BC 0020.E06B.1762
57
What is the Address on my NIC?
58
Each Host Has Two Addresses
• Logical (IP):
• The logical address uniquely identifies the host and the network to which it
belongs at Layer 3.
59
Getting Data to the Right Application
The port number identifies the processes or services that are communicating
within the end devices.
When the data is received at the host, Layer 4 (TCP/UDP) port number is
examined to determine which application or process is the correct destination
for the data
60
Getting Data to the Right Application
61
Getting Data to the Right Application
Destination port number tells the OS (TCP/IP) stack which application to hand
the data to.
Examples:
• 80 = HTTP (www)
• 23 = Telnet
• 20, 21 = FTP
• 25 = SMTP
62
ARP
63
Default gateway
Hosts doesn’t know the address of every device on the Internet it might
communicate to.
Each host contain a routing table that contains at the minimum a “gateway”.
• Default gateway IP address to reach all devices outside its own network
Eng. Ashraf Sabha PSUT Cisco
Academy Training Center 2014. 64
TCP/IP and ARP
ARP is a layer 3 protocol, one of many protocols within the TCP/IP suite of protocols.
03-0D-17-
8A-F1-32
IP addresses:
• Original source address of the sending device
• Final destination address of the intended recipient.
• do not change
Data Link addresses, such as Ethernet MAC addresses are used to get the IP
packet from one hop to the next, within the same network.
• Next hop is either:
A router on this network
By doing the AND operation, the IP Address and Subnet tells the host what
network/subnet it belongs to.
All devices in the same LAN have in common
• Host IP address on the same network.
• Same Subnet Mask.
68
Destination
MAC Address
00-0C-04-
38-44-AA
Same network
What would the Destination MAC address be for IP packets sent within the same
LAN, network?
• The Destination MAC address would be that of the device that we are sending
the IP packet to.
• The device’s Destination MAC address would be associated with the
Destination IP address.
69
Destination
MAC Address
00-0D-17-
8A-F1-32
Different network
What would the Destination MAC address for IP packets sent outside the LAN,
on a different network?
• The destination MAC address will be the MAC address associated with the
IP Address of the Default Gateway.
• The host must know the IP address of the Default Gateway to communicate
with devices outside its own network.
70
Router’s IP
Address
The Default Gateway, Router, will have an IP address and subnet mask that is
on the same network as the hosts on that network.
If the gateway doesn’t exist , users can only contact hosts within their LANs
71
Destination MAC Address?
Same network?
How does the sending host know if the Source IP Address and Destination IP
Address are on the same network?
Hints:
72
Destination MAC Address?
?Same network
AND AND
Since they are on the same network, the Destination MAC Address will be the MAC
Address of the host with the Destination IP Address.
Where does the sending host look for this information?
73
The ARP Table or ARP Cache
74
Same
network
00-0C-04- 00-0C-04-
38-44-AA 17-91-CC
ARP Table
IP Address M AC Add ress
172.16.10.3
00-0C-04-38-44- 00-0C-04-32-14-A 1
172.16.10.25
172.16.10.19 00-0C-14-02-00-19
172.16.10.33
AA
00-0C -A 6-19-46-C 1
S ou rce
D estination
172.16.10.0/24
R outer A
E thernet 0
172.16.10.1
255.255.255.0
M A C 03-0D -17-8A -F1-32
75
Does the receiver of the ARP Request need to do its
own ARP Request?
ARP Table
192.168.1.10/24 192.168.1.100/24 initially empty,
ARP Table initially
adds sender’s
empty, so will first need
IP address to
to do an ARP Request
ARP Table
before doing
Echo Request ARP Reply
Echo Reply
Destination IP Source IP
000001 102 192.168.1.100 192.168.1.10 ICMP Echo Request
This is dependent on the operating system. With most host operating systems, the receiver
(target) of the ARP Request will add the IP address of the sender of this ARP Request to its ARP
Table. However, some devices will not do record the sender of the ARP Request’s IP and MAC
address and will need to do an ARP Request of its own.
76
Same
network
00-0C-04-
17-91-CC
S ou rce
D estination
172.16.10.0/24
R outer A
E thernet 0
172.16.10.1
255.255.255.0
M A C 03-0D -17-8A -F1-32
77
D estination M AC Address???
Ethernet 0
172.16.10.1
255.255.255.0
MA C 03-0D -17-8A -F1-32
172.16.10.0/24
R outer A
Ethernet 0
172.16.10.1
255.255.255.0
MA C 03-0D -17-8A -F1-32
00-0C-04- 00-0C-04-
38-44-AA 17-91-CC 172.16.10.10 172.16.10.25
!Here it is 79
What if the hosts are on different networks?
H ost P erlm an
Host S tevens
172.16.20.12
172.16.10.10
255.255.255.0
255.255.255.0
M A C 00-0C -22-A 3-14-01
M A C 00-0C -04-17-91-CC
172.16.10.0/24 172.16.20.0/24
R outer A
Ethernet 0
172.16.10.1
255.255.255.0
M AC 03-0D -17-8A -F1-32
00-0C-04-
? 17-91-CC 172.16.10.10 172.16.20.12
80
Review: Destination MAC Address?
Same network?
AND AND
!Same network? NO
In this case both the Source IP Address and the Destination IP Address are on
different networks.
81
Review: Destination MAC Address?
Different networks
Since they are on different networks, the Destination MAC Address will be the
MAC Address of the device with the Default Gateway IP Address.
The IP Address of the Default Gateway must be known by the sending host in
order to commincate with devices outside its own network.
The host look for this information in the ARP table or ARP request again if not
known.
82
OSI Network Layer
83
IP Packets: Carrying Data End to End
B111
A111 A222
H111 192.168.4.10
192.168.4.10 192.168.1.10