Chapter 1 Part II
Chapter 1 Part II
Part II
Module Objectives
Module Objective: Explain how network protocols enable devices to access local and remote
network resources.
Reference Models Explain how the TCP/IP model and the OSI model are used to facilitate
standardization in the communication process.
Data Encapsulation Explain how data encapsulation allows data to be transported across the
network.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
1.2 Explain how network protocols enable
devices to access local and remote network
resources
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Communication Fundamentals
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
The Rules
Communications Fundamentals
Networks can vary in size and complexity. It is not enough to have a connection,
devices must agree on “how” to communicate.
There are three elements to any communication:
• There will be a source (sender).
• There will be a destination (receiver).
• There will be a channel (media) that provides for the path of communications to
occur.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Communication Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
The Rules
Communications Protocols
• All communications are governed by protocols.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
The Rules
Rule Establishment
• Individuals must use established rules or agreements to govern the conversation.
• The first message is difficult to read because it is not formatted properly. The second shows
the message properly formatted
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
The Rules
Rule Establishment (Cont.)
Protocols must account for the following requirements:
• An identified sender and receiver
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Network Protocol Requirements
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
The Rules
Network Protocol Requirements
Common computer protocols must be in agreement and include the following
requirements:
• Message encoding
• Message formatting and encapsulation
• Message size
• Message timing
• Message delivery options
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
The Rules
Message Encoding
• Encoding is the process of converting information into another acceptable
form for transmission.
• Messages sent across the network are first converted into bits by the sending
host
• Each bit is encoded into a pattern of voltages on copper wires, infrared light in
optical fibers, or microwaves for wireless systems.
• The destination host receives and decodes
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
The Rules
Message Formatting and Encapsulation
• When a message is sent, it must use a specific format or structure.
• Message formats depend on the type of message and the channel that is used to
deliver the message.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
The Rules
Message Size
Encoding between hosts must be in an appropriate format for the medium.
• Messages sent across the network are converted to bits
• The bits are encoded into a pattern of light, sound, or electrical impulses.
• The destination host must decode the signals to interpret the message.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
The Rules
Message Size
• A long message is sent from one host to another over a network, it is necessary to break
the message into smaller pieces.
• At the receiving host, the individual pieces of the message are reconstructed into the
original message.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
The Rules
Message Timing
Message timing includes the following:
Flow Control – Manages the rate of data transmission and defines how much information
can be sent and the speed at which it can be delivered.
Response Timeout – Manages how long a device waits when it does not hear a reply from
the destination.
Access method - Determines when someone can send a message.
• There may be various rules governing issues like “collisions”. This is when more than one
device sends traffic at the same time and the messages become corrupt.
• Some protocols are proactive and attempt to prevent collisions; other protocols are
reactive and establish a recovery method after the collision occurs.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
The Rules
Message Delivery Options
Message delivery may one of the following methods:
• Unicast – one to one communication
• Multicast – one to many, typically not all
• Broadcast – one to all
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
The Rules
A Note About the Node Icon
• Documents may use the node icon , typically a circle, to represent all devices.
• The figure illustrates the use of the node icon for delivery options.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Protocols
Network Protocol Overview
Network protocols define a
Protocol Type Description
common set of rules.
• Protocol can be
Network enable two or more devices to communicate over
implemented on devices Communications one or more networks
in:
• Software Network Security secure data to provide authentication, data
integrity, and data encryption
• Hardware
• Both
Routing enable routers to exchange route information,
• Protocols have their own: compare path information, and select best path
• Function
Service used for the automatic detection of devices or
• Format Discovery services
• Rules
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Protocols
Network Protocol Functions
• Devices use agreed-upon protocols
to communicate .
• Protocols may have may have one
or functions.
Function Description
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
Flow Control Ensures data flows at an efficient rate
Sequencing Uniquely labels each transmitted segment of data
Error Detection Determines if data became corrupted during transmission
Application Interface Process-to-process communications between network applications
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Protocols
Protocol Interaction
• Networks require the use of several
protocols.
• Each protocol has its own function and
format.
Protocol Function
Hypertext Transfer Governs the way a web server and a web client interact
Protocol (HTTP) Defines content and format
Transmission Control Manages the individual conversations
Protocol (TCP) Provides guaranteed delivery
Manages flow control
Internet Protocol (IP) Delivers messages globally from the sender to the receiver
Ethernet Delivers messages from one NIC to another NIC on the same Ethernet
Local Area Network (LAN)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Reference Models
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Reference Models
The Benefits of Using a Layered Model
Complex concepts such as how a
network operates can be difficult to
explain and understand. For this
reason, a layered model is used.
Two layered models describe network
operations:
• Open System Interconnection (OSI)
Reference Model
• TCP/IP Reference Model
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Reference Models
The OSI Reference Model
The OSI (Open System Interconnection) model is developed by ISO
in 1984.
Why OSI? as a guidelines how network operating systems
communicate on a network.
Note:
ISO is the organization
OSI is the model
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Reference Models
The Benefits of Using a Layered Model (Cont.)
These are the benefits of using a layered model:
• Assist in protocol design because protocols that operate at a specific layer have
defined information that they act upon and a defined interface to the layers above
and below
• Foster competition because products from different vendors can work together
• Prevent technology or capability changes in one layer from affecting other layers
above and below
• Provide a common language to describe networking functions and capabilities
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Reference Models
The OSI Reference Model
OSI Model Layer Description
7 - Application Contains protocols used for process-to-process communications.
Provides for common representation of the data transferred between application
6 - Presentation
layer services.
5 - Session Provides services to the presentation layer and to manage data exchange.
Defines services to segment, transfer, and reassemble the data for individual
4 - Transport
communications.
3 - Network Provides services to exchange the individual pieces of data over the network.
2 - Data Link Describes methods for exchanging data frames over a common media.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Data is transmitted from (Host A) to (Host B) the data flows down the 7 Layers at Host A and
across the physical media in the form of binary data, when it arrives at Host B the data travels
back up through the seven layers on Host B.
The OSI model defines the communications process into 7 layers, which
divides the tasks involved with moving information between networked
computers into seven smaller, more manageable task groups.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Reference Models
The TCP/IP Reference Model
TCP/IP Model
Description
Layer
Application Represents data to the user, plus encoding and dialog control.
Network Access Controls the hardware devices and media that make up the network.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Reference Models
OSI and TCP/IP Model Comparison
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Data Encapsulation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Data Encapsulation
Segmenting Messages Segmenting is the process of breaking up
messages into smaller units. Multiplexing is
the processes of taking multiple streams of
segmented data and interleaving them
together.
Segmenting messages has two primary
benefits:
• Increases speed - Large amounts of
data can be sent over the network
without tying up a communications link.
• Increases efficiency - Only segments
which fail to reach the destination need to
be retransmitted, not the entire data
stream.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Data Encapsulation
Sequencing
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Data Encapsulation
Encapsulation is the process where protocols
Protocol Data Units add their information to the data.
• At each stage of the process, a PDU has a
different name to reflect its new functions.
• There is no universal naming convention for
PDUs, in this course, the PDUs are named
according to the protocols of the TCP/IP
suite.
• PDUs passing down the stack are as
follows:
1. Data (Data Stream)
2. Segment
3. Packet
4. Frame
5. Bits (Bit Stream)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Data Encapsulation
Encapsulation Example
• Encapsulation is a top down
process.
• The level above does its
process and then passes it
down to the next level of the
model. This process is
repeated by each layer until
it is sent out as a bit stream.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Data Encapsulation
De-encapsulation Example
• Data is de-encapsulated as it moves up
the stack.
• When a layer completes its process,
that layer strips off its header and
passes it up to the next level to be
processed. This is repeated at each
layer until it is a data stream that the
application can process.
1. Received as Bits (Bit Stream)
2. Frame
3. Packet
4. Segment
5. Data (Data Stream)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Quiz !
What is the process of converting information into the proper form for transmission?
A. Formatting
B. Encoding
C. Encapsulation
D. De-encapsulation
Which delivery method is used to transmit information to one or more end devices, but not all
devices on the network?
E. Unicast
F. Multicast
G. Broadcast
H. Anycast
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Quiz !
What is the process of dividing a large data stream into smaller pieces prior to transmission?
A. Sequencing
B. Duplexing
C. Multiplexing
D. Segmentation
E. Segment
F. Packet
G. Bits
H. Frame
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Quiz !
Which protocol stack layer encapsulates data into frames?
A. Data link
B. Transport
C. Network
D. Application
What is the name of the process of adding protocol information to data as it moves down the
protocol stack?
E. De-encapsulation
F. Sequencing
G. Segmentation
H. Encapsulation
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38