Chapter 3:
Network Protocols and
Communications
Network Basics
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Chapter 3: Objectives
After completing this chapter, you will be able to:
Explain the role protocols and standards organizations in
facilitating interoperability in network communications.
Explain how standards are established using the Request for
Comments (RFC) process.
Explain how devices on a LAN access resources in a small-tomedium-sized business network.
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Chapter 3
3.1
3.2
3.3
3.4
Presentation_ID
Network Protocols and Standards
Using Requests for Comments
Moving Data in the Network
Summary
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3.1 Network Protocols and Standards
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Protocols
Rules that Govern Communications
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Protocols
Network Protocols
How the message is formatted or structured
The process by which networking devices share information about
pathways with other networks
How and when error and system messages are passed between devices
The setup and termination of data transfer sessions
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Protocols
Interaction of Protocols
Application Protocol Hypertext Transfer Protocol (HTTP)
Transport Protocol Transmission Control Protocol (TCP)
Internet Protocol Internet Protocol (IP)
Network Access Protocols data link and physical layers
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Protocol Suites
Protocol Suites and Industry Standards
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Protocol Suites
Creation of Internet TCP/IP Development
The first packet switching network and predecessor to todays Internet
was the Advanced Research Projects Agency Network (ARPANET),
which came to life in 1969 by connecting mainframe computers at four
locations.
ARPANET was funded by the U.S. Department of Defense for use by
universities and research laboratories. Bolt, Beranek and Newman (BBN)
was the contractor that did much of the initial development of the
ARPANET, including creating the first router known as an Interface
Message Processor (IMP).
In 1973, Robert Kahn and Vinton Cerf began work on TCP to develop the
next generation of the ARPANET. TCP was designed to replace
ARPANETs current Network Control Program (NCP).
In 1978, TCP was divided into two protocols: TCP and IP. Later, other
protocols were added to the TCP/IP suite of protocols including Telnet,
FTP, DNS, and many others.
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Protocol Suites
TCP/IP Protocol Suite and Communication
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
Standards Organizations
Open Standards
The Internet Society (ISOC)
The Internet Architecture Board (IAB)
The Internet Engineering Task Force (IETF)
Institute of Electrical and Electronics Engineers (IEEE)
The International Organization for Standards (ISO)
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
Standards Organizations
ISOC, IAB, IETF and IRTF
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Standards Organizations
IEEE
38 societies
130 journals
1,300 conferences each year
1,300 standards and projects
400,000 members
160 countries
IEEE 802.3
IEEE 802.11
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Standards Organizations
ISO Reference Model
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
Standards Organizations
Other Standards Organization
The Electronic Industries Alliance (EIA)
The Telecommunications Industry Association (TIA)
The International Telecommunications Union Telecommunications
Standardization Sector (ITU-T)
The Internet Corporation for Assigned Names and Numbers (ICANN)
The Internet Assigned Numbers Authority (IANA)
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
15
Reference Models
Benefits of Using a Layered Model
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16
Reference Models
OSI Reference Model
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
17
Reference Models
TCP/IP Reference Model
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
18
Reference Models
Comparing the OSI and TCP/IP Models
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
19
3.2 Using Requests for Comments
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
20
Why RFCs
Request for Comments
These are some of the current RFCs for common TCP/IP protocols:
HTTP RFC 2616
DHCP RFC 2131
IPv4 RFC 791
IPv6 RFC 2460
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
21
Why RFCs
History of RFCs
October 29, 1969 ARPANET sent
first message
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
22
Why RFCs
Sample RFC
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
23
CU Using Requests for Comments
RFC Processes
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
24
RFC Processes
RFC Types
Internet Standard
Best Current Practice (BCP)
Informational
Experimental
Historic
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
25
3.3 Moving Data in the Network
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
26
Data Encapsulation
Elements of Communication
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
27
Data Encapsulation
Communicating the Messages
Segmenting message benefits
Different conversations can be interleaved
Increased reliability of network communications
Segmenting message disadvantage
Increased level of complexity
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
28
Data Encapsulation
Protocol Data Units
Data
Segment
Packet
Frame
Bits
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
29
Data Encapsulation
Encapsulation
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
30
Data Encapsulation
De-Encapsulation
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
31
Moving Data in the Network
Network Address and Data Link Addresses
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
32
Accessing Local Resources
Communicating with Device/Same Network
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
33
Accessing Local Resources
MAC and IP Addresses
Address Resolution Protocol
R1
192.168.1.1
11-11-11-11-11-11
ARP
Request
PC1
192.168.1.110
AA-AA-AA-AA-AA-AA
S1
R1
PC2
192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
34
Accessing Remote Resources
Default Gateway
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
35
Accessing Remote Resources
Communicating Device/Remote Network
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
36
Network Protocols and Communications
Summary
In this chapter, you learned:
Data networks are systems of end devices, intermediary devices, and the
media connecting the devices. For communication to occur, these devices
must know how to communicate.
These devices must comply with communication rules and protocols.
TCP/IP is an example of a protocol suite.
Most protocols are created by a standards organization, such as IETF or
IEEE.
The most widely-used networking models are OSI and TCP/IP.
Data that passes down the stack of the OSI model is segmented into
pieces and encapsulated with addresses and other labels. The process is
reversed as the pieces are de-encapsulated and passed up the
destination protocol stack.
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
37
Network Protocols and Communications
Summary (cont.)
In this chapter, you learned:
The OSI model describes the processes of encoding, formatting,
segmenting, and encapsulating data for transmission over the network.
The TCP/IP protocol suite is an open standard protocol that has been
endorsed by the networking industry and ratified, or approved, by a
standards organization.
The Internet Protocol Suite is a suite of protocols required for transmitting
and receiving information using the Internet.
PDUs are named according to the protocols of the TCP/IP suite: data,
segment, packet, frame, and bits.
Applying models allows individuals, companies, and trade associations to
analyze current networks and plan the networks of the future.
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
38
Presentation_ID
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
39