SlideShare a Scribd company logo
1 of 60
Download to read offline
Introduction to Networks v5.1
Chapter 3:
Network Protocols and
Communications
Jupriyadi, S.Kom., M.T.
July 2020
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
3.0 Introduction
3.1 Rules of Communication
3.2 Network Protocols and
Standards
3.3 Data Transfer in the Network
3.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Describe the types of rules that are necessary to successfully communicate.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Human Communication
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Computer Communication
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Example: Personal letter contains the following elements:
• An identifier of the recipient
• A salutation or greeting
• The message content
• A closing phrase
• An identifier of the sender
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Human Communication
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Computer Communication
• The source host breaks a long message into individual pieces or frames
that meet both the minimum and maximum size requirements.
• Each frame will also have its own addressing information.
• At the receiving host, the pieces are reconstructed to be processed and
interpreted.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Rules of engagement:
• Access Method
• Flow Control
• Response Timeout
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Upon completion of this section, you should be able to:
• Explain why protocols are necessary in communication.
• Explain the purpose of adhering to a protocol suite.
• Explain the role of standards organizations in establishing protocols for network
interoperability.
• Explain how the TCP/IP model and the OSI model are used to facilitate
standardization in the communication process.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
• The role of protocols
• How the message is formatted or structured
• The process by which networking devices share information about
pathways with other networks
• How and when error and system messages are passed between
devices
• The setup and termination of data transfer sessions
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Interaction of protocols in communication between a web server and web client.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 24
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Protocol Operation - Sending a Message
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Protocol Operation – Receiving a Message
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
ISOC, IAM, IETF, and IRTF
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
IANA and ICANN
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Institute of Electrical and Electronics Engineers (IEEE)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
EIA/TIA Standards
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 36
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Upon completion of this section, you should be able to:
• Explain how data encapsulation allows data to be transported across the
network.
• Explain how local hosts access local resources on a network.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 42
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Communicating the Message
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Communicating the Message
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Segmenting Messages:
• Allows many different conversations to be interleaved
• Increases the efficiency of network communications
• Adds complexity
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Encapsulation
• Data
• Segment
• Packet
• Frame
• Bits
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 49
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Network Addresses and Data Link Addresses
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Layer 3 Network Addresses
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Network Address
• Source IP address
• Destination IP address
• Responsible for delivering the IP packet from the original source to the
final destination, either on the same network or to a remote network.
Data Link Address
• Source data link address
• Destination data link address
• Responsible for delivering the data link frame from one network interface
card (NIC) to another NIC on the same network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Layer 2 Data Link Addresses
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Layer 2 Data Link Addresses
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
• Role of the Network Layer Addresses
Network portion of the IP Address – The left-most part of the address that indicates which
network the IP address is a member.
Host portion – The remaining part of the address that identifies a specific device on the
network.
• Source IP address – The IP address of the sending device
• Destination IP address – The IP address of the receiving device
• Role of the Data Link Layer Addresses
Source MAC address – This is the data link address, or the Ethernet MAC address, of
the sending device.
Destination MAC address – When the receiving device is on the same network as the
sending device, this is the data link address of the receiving device.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Role of the Network Layer Addresses
• The source and destination IP addresses will represent hosts on
different networks indicated by the different network portions of the
source and destination addresses.
Role of the Data Link Layer Addresses
• Destination MAC address - When the receiving device is on a different
network from the sending device, the sending device uses the Ethernet
MAC address of the default gateway or router.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Chapter Objectives:
• Explain how rules are used to facilitate communication.
• Explain the role of protocols and standards organizations in facilitating
interoperability in network communications.
• Explain how devices on a LAN access resources in a small to medium-sized
business network.
Thank you.

More Related Content

What's hot

CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1Irsandi Hasan
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6Irsandi Hasan
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Carmelo de Jesús
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8Chaing Ravuth
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6Irsandi Hasan
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5Waqas Ahmed Nawaz
 
CCNA
CCNACCNA
CCNAniict
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Carmelo de Jesús
 
CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8Chaing Ravuth
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 

What's hot (20)

CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
Cisco CCNA module 2
Cisco CCNA module 2Cisco CCNA module 2
Cisco CCNA module 2
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7CCNA Exploration 3 - Chapter 7
CCNA Exploration 3 - Chapter 7
 
Cisco CCNA module 6
Cisco CCNA module 6Cisco CCNA module 6
Cisco CCNA module 6
 
Cisco CCNA module 4
Cisco CCNA module 4Cisco CCNA module 4
Cisco CCNA module 4
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6CCNA Exploration 3 - Chapter 6
CCNA Exploration 3 - Chapter 6
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
CCNA
CCNACCNA
CCNA
 
Cisco CCNA module 8
Cisco CCNA module 8Cisco CCNA module 8
Cisco CCNA module 8
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2
 
CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 

Similar to Chapter 3 Network Protocol and Communications

It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6newbie2019
 
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7newbie2019
 
It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5newbie2019
 
Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3limenih muluneh
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5Babaa Naya
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10newbie2019
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkJeff Squyres
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11newbie2019
 
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6SalmenHAJJI1
 
Networking Essentials 2.0 Module5.pptx
Networking Essentials 2.0 Module5.pptxNetworking Essentials 2.0 Module5.pptx
Networking Essentials 2.0 Module5.pptxdiegoarmandosanchezf
 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8SalmenHAJJI1
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating Systemnewbie2019
 

Similar to Chapter 3 Network Protocol and Communications (20)

It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
 
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7
 
It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5
 
Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3
 
Itn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernetItn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernet
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
 
Cisco CCNA module 9
Cisco CCNA module 9Cisco CCNA module 9
Cisco CCNA module 9
 
Ch10
Ch10Ch10
Ch10
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
Itn instruction ppt_chapter3
Itn instruction ppt_chapter3Itn instruction ppt_chapter3
Itn instruction ppt_chapter3
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11
 
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6
 
Networking Essentials 2.0 Module5.pptx
Networking Essentials 2.0 Module5.pptxNetworking Essentials 2.0 Module5.pptx
Networking Essentials 2.0 Module5.pptx
 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating System
 

More from newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injectionnewbie2019
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web securitynewbie2019
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information Systemnewbie2019
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018newbie2019
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutannewbie2019
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptographynewbie2019
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)newbie2019
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principalsnewbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 

More from newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Chapter 3 Network Protocol and Communications

  • 1. Introduction to Networks v5.1 Chapter 3: Network Protocols and Communications Jupriyadi, S.Kom., M.T. July 2020
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 3.0 Introduction 3.1 Rules of Communication 3.2 Network Protocols and Standards 3.3 Data Transfer in the Network 3.4 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Describe the types of rules that are necessary to successfully communicate.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Human Communication
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Computer Communication
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Example: Personal letter contains the following elements: • An identifier of the recipient • A salutation or greeting • The message content • A closing phrase • An identifier of the sender
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Human Communication
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 Computer Communication • The source host breaks a long message into individual pieces or frames that meet both the minimum and maximum size requirements. • Each frame will also have its own addressing information. • At the receiving host, the pieces are reconstructed to be processed and interpreted.
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 Rules of engagement: • Access Method • Flow Control • Response Timeout
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 Upon completion of this section, you should be able to: • Explain why protocols are necessary in communication. • Explain the purpose of adhering to a protocol suite. • Explain the role of standards organizations in establishing protocols for network interoperability. • Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process.
  • 20. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 • The role of protocols • How the message is formatted or structured • The process by which networking devices share information about pathways with other networks • How and when error and system messages are passed between devices • The setup and termination of data transfer sessions
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 Interaction of protocols in communication between a web server and web client.
  • 24. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 24
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28 Protocol Operation - Sending a Message
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29 Protocol Operation – Receiving a Message
  • 30. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 30
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 ISOC, IAM, IETF, and IRTF
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33 IANA and ICANN
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 Institute of Electrical and Electronics Engineers (IEEE)
  • 35. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35 EIA/TIA Standards
  • 36. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 36
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
  • 40. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
  • 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41 Upon completion of this section, you should be able to: • Explain how data encapsulation allows data to be transported across the network. • Explain how local hosts access local resources on a network.
  • 42. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 42
  • 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43 Communicating the Message
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44 Communicating the Message
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45 Segmenting Messages: • Allows many different conversations to be interleaved • Increases the efficiency of network communications • Adds complexity
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46 Encapsulation • Data • Segment • Packet • Frame • Bits
  • 47. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
  • 48. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
  • 49. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 49
  • 50. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50 Network Addresses and Data Link Addresses
  • 51. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51 Layer 3 Network Addresses
  • 52. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52 Network Address • Source IP address • Destination IP address • Responsible for delivering the IP packet from the original source to the final destination, either on the same network or to a remote network. Data Link Address • Source data link address • Destination data link address • Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network
  • 53. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53 Layer 2 Data Link Addresses
  • 54. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54 Layer 2 Data Link Addresses
  • 55. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
  • 56. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56 • Role of the Network Layer Addresses Network portion of the IP Address – The left-most part of the address that indicates which network the IP address is a member. Host portion – The remaining part of the address that identifies a specific device on the network. • Source IP address – The IP address of the sending device • Destination IP address – The IP address of the receiving device • Role of the Data Link Layer Addresses Source MAC address – This is the data link address, or the Ethernet MAC address, of the sending device. Destination MAC address – When the receiving device is on the same network as the sending device, this is the data link address of the receiving device.
  • 57. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
  • 58. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 58 Role of the Network Layer Addresses • The source and destination IP addresses will represent hosts on different networks indicated by the different network portions of the source and destination addresses. Role of the Data Link Layer Addresses • Destination MAC address - When the receiving device is on a different network from the sending device, the sending device uses the Ethernet MAC address of the default gateway or router.
  • 59. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59 Chapter Objectives: • Explain how rules are used to facilitate communication. • Explain the role of protocols and standards organizations in facilitating interoperability in network communications. • Explain how devices on a LAN access resources in a small to medium-sized business network.