SlideShare a Scribd company logo
1 of 41
Chapter 3:
Network Protocols and
Communications
Introduction to Networks
Chapter 3: Objectives
Students will be able to:
 Explain how rules are used to facilitate communication.
 Explain the role of protocols and standards organizations
in facilitating interoperability in network communications.
 Explain how devices on a LAN access resources in a small
to medium-sized business network.
Chapter 3
3.1 Rules of Communication
3.2 Network Protocols and Standards
3.3 Moving Data in the Network
3.4 Summary
The Rules
What is Communication?
The Rules
Establishing the Rules
Establishing the Rules
 An identified sender and receiver
 Agreed upon method of communicating (face-to-face,
telephone, letter, photograph)
 Common language and grammar
 Speed and timing of delivery
 Confirmation or acknowledgement requirements
The Rules
Message Encoding
The Rules
Message Formatting and Encapsulation
Example: Personal letter contains the following elements:
 An identifier of the recipient
 A salutation or greeting
 The message content
 A closing phrase
 An identifier of the sender
The Rules
Message Size
The size restrictions of frames require the source host to break
a long message into individual pieces that meet both the
minimum and maximum size requirements.
This is known as segmenting.
Each segment is encapsulated in a separate frame with the
address information, and is sent over the network.
At the receiving host, the messages are de-encapsulated and
put back together to be processed and interpreted.
The Rules
Message Timing
 Access Method
 Flow Control
 Response Timeout
The Rules
Message Delivery Options
Protocols
Rules that Govern Communications
Protocols
Network Protocols
 How the message is formatted or structured
 The process by which networking devices share information
about pathways with other networks
 How and when error and system messages are passed
between devices
 The setup and termination of data transfer sessions
Protocols
Interaction of Protocols
 Application Protocol – Hypertext Transfer Protocol (HTTP)
 Transport Protocol – Transmission Control Protocol (TCP)
 Internet Protocol – Internet Protocol (IP)
 Network Access Protocols – Data Link & Physical layers
Protocol Suites
Protocol Suites and Industry Standards
Protocol Suites
Creation of Internet, Development of TCP/IP
Protocol Suites
TCP/IP Protocol Suite and Communication
Network Protocols and Standards
Standards Organizations
Standards Organizations
Open Standards
 The Internet Society (ISOC)
 The Internet Architecture Board (IAB)
 The Internet Engineering Task Force (IETF)
 Institute of Electrical and Electronics Engineers (IEEE)
 The International Organization for Standards (ISO)
Standards Organizations
ISOC, IAB, and IETF
Standards Organizations
IEEE
 38 societies
 130 journals
 1,300 conferences each year
 1,300 standards and projects
 400,000 members
 160 countries
 IEEE 802.3
 IEEE 802.11
Standards Organizations
ISO
Standards Organizations
Other Standards Organization
 The Electronic Industries Alliance (EIA)
 The Telecommunications Industry Association (TIA)
 The International Telecommunications Union –
Telecommunications Standardization Sector (ITU-T)
 The Internet Corporation for Assigned Names and Numbers
(ICANN)
 The Internet Assigned Numbers Authority (IANA)
Reference Models
The Benefits of Using a Layered Model
Reference Models
The OSI Reference Model
Reference Models
The TCP/IP Reference Model
Reference Models
Comparing the OSI and TCP/IP Models
Data Encapsulation
Communicating the Messages
 Segmenting message benefits
Different conversations can be interleaved
Increased reliability of network communications
 Segmenting message disadvantage
Increased level of complexity
Data Encapsulation
Protocol Data Units (PDUs)
 Data
 Segment
 Packet
 Frame
 Bits
Data Encapsulation
Encapsulation
Data Encapsulation
De-encapsulation
Moving Data in the Network
Accessing Local Resources
Accessing Local Resources
Network Addresses & Data Link addresses
 Network Address
Source IP address
Destination IP address
 Data Link Address
Source data link address
Destination data link address
Accessing Local Resources
Communicating with Device / Same Network
Accessing Local Resources
MAC and IP Addresses
PC1
192.168.1.110
AA-AA-AA-AA-AA-AA
PC2
192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
R1
192.168.1.1
11-11-11-11-11-11
ARP
Request
S1 R1
Accessing Remote Resources
Default Gateway
PC 1
192.168.1.110
AA-AA-AA-AA-AA-AA
PC 2
192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
R1
192.168.1.1
11-11-11-11-11-11
R2
172.16.1.99
22-22-22-22-22-22
Web Server
172.16.1.99
AB-CD-EF-12-34-56
Accessing Remote Resources
Communicating Device / Remote Network
Accessing Remote Resources
Using Wireshark to View Network Traffic
Network Protocols and Communications
Summary
In this chapter, you learned:
 Data networks are systems of end devices, intermediary
devices, and the media connecting the devices. For
communication to occur, these devices must know how to
communicate.
 These devices must comply with communication rules and
protocols. TCP/IP is an example of a protocol suite.
 Most protocols are created by a standards organization such
as the IETF or IEEE.
 The most widely-used networking models are the OSI and
TCP/IP models.
Network Protocols and Communications
Summary
In this chapter, you learned:
 Data that passes down the stack of the OSI model is
segmented into pieces and encapsulated with addresses and
other labels. The process is reversed as the pieces are de-
encapsulated and passed up the destination protocol stack.
 The OSI model describes the processes of encoding,
formatting, segmenting, and encapsulating data for
transmission over the network.
 The TCP/IP protocol suite is an open standard protocol that
has been endorsed by the networking industry and ratified, or
approved, by a standards organization.
Network Protocols and Communications
Summary
In this chapter, you learned:
 The Internet Protocol Suite is a suite of protocols required for
transmitting and receiving information using the Internet.
 Protocol Data Units (PDUs) are named according to the
protocols of the TCP/IP suite: data, segment, packet, frame,
and bits.
 Applying models allows individuals, companies, and trade
associations to analyze current networks and plan the
networks of the future.
КЛМ_Урок 2

More Related Content

What's hot (20)

Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
CCNA
CCNACCNA
CCNA
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Chapter8
Chapter8 Chapter8
Chapter8
 
Chapter5
Chapter5Chapter5
Chapter5
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Ip Address
Ip AddressIp Address
Ip Address
 
Mod8
Mod8Mod8
Mod8
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
INTRODUCTION TO BASICS OF DATA COMMUNICATION"S
INTRODUCTION TO BASICS OF DATA COMMUNICATION"SINTRODUCTION TO BASICS OF DATA COMMUNICATION"S
INTRODUCTION TO BASICS OF DATA COMMUNICATION"S
 
IP & MAC Addressing
IP & MAC Addressing IP & MAC Addressing
IP & MAC Addressing
 
Protocol
ProtocolProtocol
Protocol
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
IP and MAC Address
IP and MAC AddressIP and MAC Address
IP and MAC Address
 

Viewers also liked

ЦБББ-представяне
ЦБББ-представянеЦБББ-представяне
ЦБББ-представянеRaynaITSTEP
 
Permutation and combination
Permutation and combinationPermutation and combination
Permutation and combinationSadia Zareen
 
Counting Technique, Permutation, Combination
Counting Technique, Permutation, CombinationCounting Technique, Permutation, Combination
Counting Technique, Permutation, CombinationChie Pegollo
 
Permutations & Combinations
Permutations & CombinationsPermutations & Combinations
Permutations & Combinationsrfant
 
Probability Powerpoint
Probability PowerpointProbability Powerpoint
Probability Powerpointspike2904
 

Viewers also liked (6)

ЦБББ-представяне
ЦБББ-представянеЦБББ-представяне
ЦБББ-представяне
 
Identity2
Identity2Identity2
Identity2
 
Permutation and combination
Permutation and combinationPermutation and combination
Permutation and combination
 
Counting Technique, Permutation, Combination
Counting Technique, Permutation, CombinationCounting Technique, Permutation, Combination
Counting Technique, Permutation, Combination
 
Permutations & Combinations
Permutations & CombinationsPermutations & Combinations
Permutations & Combinations
 
Probability Powerpoint
Probability PowerpointProbability Powerpoint
Probability Powerpoint
 

Similar to КЛМ_Урок 2

ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3John Mathias
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
Tutorial&info,networks basics
Tutorial&info,networks basicsTutorial&info,networks basics
Tutorial&info,networks basicsIT Tech
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overviewscooby_doo
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdfMiftaNurFarid2
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-pShuo Zhang
 
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxCCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxBabarYunus1
 
Protocol
ProtocolProtocol
ProtocolShi Na
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptKristopher Hefner
 
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesCisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesAhmed Gad
 
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3Tutorials Tips Tricks
 
Discovery Home S B Chapter 3
Discovery  Home  S B  Chapter  3Discovery  Home  S B  Chapter  3
Discovery Home S B Chapter 3tinwerf
 

Similar to КЛМ_Урок 2 (20)

ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
Tutorial&info,networks basics
Tutorial&info,networks basicsTutorial&info,networks basics
Tutorial&info,networks basics
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-p
 
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxCCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Protocol
ProtocolProtocol
Protocol
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.ppt
 
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesCisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3CCNA Discovery Networking for Home and Small Businesses - Chapter 3
CCNA Discovery Networking for Home and Small Businesses - Chapter 3
 
Discovery Home S B Chapter 3
Discovery  Home  S B  Chapter  3Discovery  Home  S B  Chapter  3
Discovery Home S B Chapter 3
 

More from RaynaITSTEP

Project management professional
Project management professionalProject management professional
Project management professionalRaynaITSTEP
 
Project management it step
Project management it stepProject management it step
Project management it stepRaynaITSTEP
 
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)RaynaITSTEP
 
monitoring and diagnostics
monitoring and diagnosticsmonitoring and diagnostics
monitoring and diagnosticsRaynaITSTEP
 
network security
network securitynetwork security
network securityRaynaITSTEP
 
configuring disk sand drivers
configuring disk sand driversconfiguring disk sand drivers
configuring disk sand driversRaynaITSTEP
 
install update and migration to windows 10
install update and migration to windows 10install update and migration to windows 10
install update and migration to windows 10RaynaITSTEP
 
Фотошоп за деца_4
Фотошоп за деца_4Фотошоп за деца_4
Фотошоп за деца_4RaynaITSTEP
 
Структурни кабелни системи
Структурни кабелни системиСтруктурни кабелни системи
Структурни кабелни системиRaynaITSTEP
 
Android introduction
Android introductionAndroid introduction
Android introductionRaynaITSTEP
 
Adobe Illustrator - Урок 2
Adobe Illustrator - Урок 2Adobe Illustrator - Урок 2
Adobe Illustrator - Урок 2RaynaITSTEP
 
Adobe Illustrator - Обобщение
Adobe Illustrator - ОбобщениеAdobe Illustrator - Обобщение
Adobe Illustrator - ОбобщениеRaynaITSTEP
 

More from RaynaITSTEP (20)

Project management professional
Project management professionalProject management professional
Project management professional
 
Project management it step
Project management it stepProject management it step
Project management it step
 
Lean startup
Lean startupLean startup
Lean startup
 
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
РАБОТА С ОБЕКТА „ЗАЯВКА“ (2)
 
DBT_3
DBT_3DBT_3
DBT_3
 
DBT_2
DBT_2DBT_2
DBT_2
 
DBT_1
DBT_1DBT_1
DBT_1
 
monitoring and diagnostics
monitoring and diagnosticsmonitoring and diagnostics
monitoring and diagnostics
 
network security
network securitynetwork security
network security
 
networking
networkingnetworking
networking
 
data security
data securitydata security
data security
 
configuring disk sand drivers
configuring disk sand driversconfiguring disk sand drivers
configuring disk sand drivers
 
boot process
boot process  boot process
boot process
 
install update and migration to windows 10
install update and migration to windows 10install update and migration to windows 10
install update and migration to windows 10
 
virtualization
virtualizationvirtualization
virtualization
 
Фотошоп за деца_4
Фотошоп за деца_4Фотошоп за деца_4
Фотошоп за деца_4
 
Структурни кабелни системи
Структурни кабелни системиСтруктурни кабелни системи
Структурни кабелни системи
 
Android introduction
Android introductionAndroid introduction
Android introduction
 
Adobe Illustrator - Урок 2
Adobe Illustrator - Урок 2Adobe Illustrator - Урок 2
Adobe Illustrator - Урок 2
 
Adobe Illustrator - Обобщение
Adobe Illustrator - ОбобщениеAdobe Illustrator - Обобщение
Adobe Illustrator - Обобщение
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

КЛМ_Урок 2

  • 1. Chapter 3: Network Protocols and Communications Introduction to Networks
  • 2. Chapter 3: Objectives Students will be able to:  Explain how rules are used to facilitate communication.  Explain the role of protocols and standards organizations in facilitating interoperability in network communications.  Explain how devices on a LAN access resources in a small to medium-sized business network.
  • 3. Chapter 3 3.1 Rules of Communication 3.2 Network Protocols and Standards 3.3 Moving Data in the Network 3.4 Summary
  • 4. The Rules What is Communication?
  • 5. The Rules Establishing the Rules Establishing the Rules  An identified sender and receiver  Agreed upon method of communicating (face-to-face, telephone, letter, photograph)  Common language and grammar  Speed and timing of delivery  Confirmation or acknowledgement requirements
  • 7. The Rules Message Formatting and Encapsulation Example: Personal letter contains the following elements:  An identifier of the recipient  A salutation or greeting  The message content  A closing phrase  An identifier of the sender
  • 8. The Rules Message Size The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. This is known as segmenting. Each segment is encapsulated in a separate frame with the address information, and is sent over the network. At the receiving host, the messages are de-encapsulated and put back together to be processed and interpreted.
  • 9. The Rules Message Timing  Access Method  Flow Control  Response Timeout
  • 11. Protocols Rules that Govern Communications
  • 12. Protocols Network Protocols  How the message is formatted or structured  The process by which networking devices share information about pathways with other networks  How and when error and system messages are passed between devices  The setup and termination of data transfer sessions
  • 13. Protocols Interaction of Protocols  Application Protocol – Hypertext Transfer Protocol (HTTP)  Transport Protocol – Transmission Control Protocol (TCP)  Internet Protocol – Internet Protocol (IP)  Network Access Protocols – Data Link & Physical layers
  • 14. Protocol Suites Protocol Suites and Industry Standards
  • 15. Protocol Suites Creation of Internet, Development of TCP/IP
  • 16. Protocol Suites TCP/IP Protocol Suite and Communication
  • 17. Network Protocols and Standards Standards Organizations
  • 18. Standards Organizations Open Standards  The Internet Society (ISOC)  The Internet Architecture Board (IAB)  The Internet Engineering Task Force (IETF)  Institute of Electrical and Electronics Engineers (IEEE)  The International Organization for Standards (ISO)
  • 20. Standards Organizations IEEE  38 societies  130 journals  1,300 conferences each year  1,300 standards and projects  400,000 members  160 countries  IEEE 802.3  IEEE 802.11
  • 22. Standards Organizations Other Standards Organization  The Electronic Industries Alliance (EIA)  The Telecommunications Industry Association (TIA)  The International Telecommunications Union – Telecommunications Standardization Sector (ITU-T)  The Internet Corporation for Assigned Names and Numbers (ICANN)  The Internet Assigned Numbers Authority (IANA)
  • 23. Reference Models The Benefits of Using a Layered Model
  • 24. Reference Models The OSI Reference Model
  • 25. Reference Models The TCP/IP Reference Model
  • 26. Reference Models Comparing the OSI and TCP/IP Models
  • 27. Data Encapsulation Communicating the Messages  Segmenting message benefits Different conversations can be interleaved Increased reliability of network communications  Segmenting message disadvantage Increased level of complexity
  • 28. Data Encapsulation Protocol Data Units (PDUs)  Data  Segment  Packet  Frame  Bits
  • 31. Moving Data in the Network Accessing Local Resources
  • 32. Accessing Local Resources Network Addresses & Data Link addresses  Network Address Source IP address Destination IP address  Data Link Address Source data link address Destination data link address
  • 33. Accessing Local Resources Communicating with Device / Same Network
  • 34. Accessing Local Resources MAC and IP Addresses PC1 192.168.1.110 AA-AA-AA-AA-AA-AA PC2 192.168.1.111 BB-BB-BB-BB-BB-BB FTP Server 192.168.1.9 CC-CC-CC-CC-CC-CC R1 192.168.1.1 11-11-11-11-11-11 ARP Request S1 R1
  • 35. Accessing Remote Resources Default Gateway PC 1 192.168.1.110 AA-AA-AA-AA-AA-AA PC 2 192.168.1.111 BB-BB-BB-BB-BB-BB FTP Server 192.168.1.9 CC-CC-CC-CC-CC-CC R1 192.168.1.1 11-11-11-11-11-11 R2 172.16.1.99 22-22-22-22-22-22 Web Server 172.16.1.99 AB-CD-EF-12-34-56
  • 36. Accessing Remote Resources Communicating Device / Remote Network
  • 37. Accessing Remote Resources Using Wireshark to View Network Traffic
  • 38. Network Protocols and Communications Summary In this chapter, you learned:  Data networks are systems of end devices, intermediary devices, and the media connecting the devices. For communication to occur, these devices must know how to communicate.  These devices must comply with communication rules and protocols. TCP/IP is an example of a protocol suite.  Most protocols are created by a standards organization such as the IETF or IEEE.  The most widely-used networking models are the OSI and TCP/IP models.
  • 39. Network Protocols and Communications Summary In this chapter, you learned:  Data that passes down the stack of the OSI model is segmented into pieces and encapsulated with addresses and other labels. The process is reversed as the pieces are de- encapsulated and passed up the destination protocol stack.  The OSI model describes the processes of encoding, formatting, segmenting, and encapsulating data for transmission over the network.  The TCP/IP protocol suite is an open standard protocol that has been endorsed by the networking industry and ratified, or approved, by a standards organization.
  • 40. Network Protocols and Communications Summary In this chapter, you learned:  The Internet Protocol Suite is a suite of protocols required for transmitting and receiving information using the Internet.  Protocol Data Units (PDUs) are named according to the protocols of the TCP/IP suite: data, segment, packet, frame, and bits.  Applying models allows individuals, companies, and trade associations to analyze current networks and plan the networks of the future.

Editor's Notes

  1. Cisco Networking Academy program Introduction to Networks Chapter 3: Network Protocols and Communications
  2. Chapter 3 Sections
  3. Section 3.1.1.1
  4. Section 3.1.1.2
  5. Section 3.1.1.3
  6. Section 3.1.1.4
  7. Section 3.1.1.5
  8. Section 3.1.1.6
  9. Section 3.1.1.7
  10. Section 3.2.1.1
  11. Section 3.2.1.2
  12. Section 3.2.1.3
  13. Section 3.2.2.1
  14. Section 3.2.2.2
  15. Section 3.2.2.3
  16. Section 3.1.3
  17. Section 3.2.3.1
  18. Section 3.2.3.2
  19. Section 3.2.3.3
  20. Section 3.2.3.4
  21. Section 3.2.3.5
  22. Section 3.2.4.1
  23. Section 3.2.4.2
  24. Section 3.2.4.3
  25. Section 3.2.4.4
  26. Section 3.3.1.1
  27. Section 3.3.1.2
  28. Section 3.3.1.3
  29. Section 3.3.1.4
  30. Section 3.3.2
  31. Section 3.3.2.1
  32. Section 3.3.2.2
  33. Section 3.3.2.3
  34. Section 3.3.3.1
  35. Section 3.3.3.2
  36. Section 3.3.3.4
  37. Section 1.5 & 1.5.1
  38. Section 1.5 & 1.5.1
  39. Section 1.5 & 1.5.1