SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Instructor Materials
Chapter 3: Network
Protocols and
Communications
CCNA Routing and Switching
Introduction to Networks v6.0
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
Chapter 3: Network
Protocols and
Communications
CCNA Routing and Switching
Introduction to Networks v6.0
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 3 - Sections & Objectives
 3.1 Rules of Communication
• Describe the types of rules that are necessary to successfully
communicate.
 3.2 Network Protocols and Standards
• Explain why protocols are necessary in communication.
• Explain the purpose of adhering to a protocol suite.
• Explain the role of standards organizations in establishing protocols for
network interoperability.
• Explain how the TCP/IP model and the OSI model are used to facilitate
standardization in the communication process.
 3.3 Data Transfer in the Network
• Explain how data encapsulation allows data to be transported across the
network.
• Explain how local hosts access local resources on a network.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6
3.1 Rules of
Communication
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rules of Communication
The Rules
 Rule Establishment
• Identified sender and receiver
• Common language and grammar a method of communication with a
computer.
• Speed and timing of delivery
• Confirmation or acknowledgment requirements
 Message Encoding
• Process of converting information into another acceptable form
• Decoding is the reverse of encoding. It converts encoded
data communication transmissions and files to their original states.
 Message Formatting and Encapsulation :is the process of taking
data from one protocol and translating it into another protocol, .
 Message Size
 Message Timing
• Access method
• Flow control
• Response timeout
 Message Delivery Options
• Unicast
• Multicast
• Broadcast
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8
3.2 Network Protocols and
Standards
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Protocols and Standards
Protocols
 Rules that Govern Communications
 Network Protocols
• The role of protocols
• How the message is formatted or structured
• The process by which networking devices share information about
pathways with other networks
• The setup and termination of data transfer sessions
 Protocol Interaction
• Example: web server and client
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Protocols and Standards
Protocol Suites
 Protocol Suites and Industry Standards
• TCP/IP is an open standard
 TCP/IP Protocol Suites
• Can you name some of the protocols from the TCP/IP protocol suite.
 TCP/IP Communication Process
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Protocols and Standards
Reference Models
 The Benefits of Using a
Layered Model
• Name some benefits
 The OSI Reference Model
• Provides list of functions
• Describes interactions between
layers
 OSI Model and TCP/IP Model
Comparison
• Similar: transport and network
layers
• Contrast: relationship between
layers
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
3.3 Data Transfer in the
Network
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Transfer in the Network
Data Encapsulation
 Message Segmentation
• Segmentation - Break communication into pieces ,splitting a
computer network into subnetworks,
• Multiplexing – interleaving the piece
 Encapsulation and de-encapsulation process
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Transfer in the Network
Data Access
 Network Addresses
• Source IP address
• Destination IP address
• Deliver the IP packet from the original source to the final destination, either on the same network or
to a remote network.
 Data Link Addresses:- to deliver the data link frame from one network interface to
another network interface on the same network.
• Source data link address
• Destination data link address
• Deliver the data link frame from one network interface card (NIC) to another NIC on the same
network
 Devices on the Same Network
 Devices on a Remote Network
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
3.4 Chapter Summary
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Explain how rules are used to facilitate communication.
 Explain the role of protocols and standards organizations in facilitating interoperability in
network communications.
 Explain how devices on a LAN access resources in a small to medium-sized business
network.
Chapter Summary
Summary
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

Protocol
ProtocolProtocol
Protocol
Shi Na
 
Computer Networks
Computer Networks Computer Networks
Computer Networks
Kereen Tatham
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
Pradeep Kumar TS
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
Sachii Dosti
 
Networking Basic and Cisco History
Networking Basic and Cisco History Networking Basic and Cisco History
Networking Basic and Cisco History
Er Aadarsh Srivastava
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and Cisco
Shoaib Iqbal
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1
Aram Mohammed
 
Aerial links
Aerial linksAerial links
Aerial links
Talha Karim
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
Kirti Ahirrao
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
Saif Muttair
 
Communication standards ieee 802 3
Communication standards ieee 802 3Communication standards ieee 802 3
Communication standards ieee 802 3
thanhtrung_ys
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
Irsandi Hasan
 
CCNA training report
CCNA training reportCCNA training report
CCNA training report
Nikita Kaushal
 
Лекц 2
Лекц 2Лекц 2
Лекц 2Muuluu
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
sulaiman_karim
 
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Aksum Institute of Technology(AIT, @Letsgo)
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
Aksum Institute of Technology(AIT, @Letsgo)
 

What's hot (20)

Protocol
ProtocolProtocol
Protocol
 
Computer Networks
Computer Networks Computer Networks
Computer Networks
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Networking Basic and Cisco History
Networking Basic and Cisco History Networking Basic and Cisco History
Networking Basic and Cisco History
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and Cisco
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1
 
6 osi vimp
6 osi vimp6 osi vimp
6 osi vimp
 
Aerial links
Aerial linksAerial links
Aerial links
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Communication standards ieee 802 3
Communication standards ieee 802 3Communication standards ieee 802 3
Communication standards ieee 802 3
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA training report
CCNA training reportCCNA training report
CCNA training report
 
Лекц 2
Лекц 2Лекц 2
Лекц 2
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 

Similar to Itn6 instructor materials_chapter3

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
Irsandi Hasan
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
Hamza Malik
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
Yaser Rahmati
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
teknetir
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
argost1003
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
Irsandi Hasan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
Waqas Ahmed Nawaz
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2r82093403
 
Networking Protocols.pdf
Networking Protocols.pdfNetworking Protocols.pdf
Networking Protocols.pdf
dp589397
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
Irsandi Hasan
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
NguyenLe340487
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
United International University
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptx
SaqibAhmedKhan4
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptx
SaqibAhmedKhan4
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
 

Similar to Itn6 instructor materials_chapter3 (20)

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
 
Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2
 
Networking Protocols.pdf
Networking Protocols.pdfNetworking Protocols.pdf
Networking Protocols.pdf
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptx
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptx
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Itn6 instructor materials_chapter3

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Instructor Materials Chapter 3: Network Protocols and Communications CCNA Routing and Switching Introduction to Networks v6.0
  • 2. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 Chapter 3: Network Protocols and Communications CCNA Routing and Switching Introduction to Networks v6.0
  • 3. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 3 - Sections & Objectives  3.1 Rules of Communication • Describe the types of rules that are necessary to successfully communicate.  3.2 Network Protocols and Standards • Explain why protocols are necessary in communication. • Explain the purpose of adhering to a protocol suite. • Explain the role of standards organizations in establishing protocols for network interoperability. • Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process.  3.3 Data Transfer in the Network • Explain how data encapsulation allows data to be transported across the network. • Explain how local hosts access local resources on a network.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6 3.1 Rules of Communication
  • 5. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Rules of Communication The Rules  Rule Establishment • Identified sender and receiver • Common language and grammar a method of communication with a computer. • Speed and timing of delivery • Confirmation or acknowledgment requirements  Message Encoding • Process of converting information into another acceptable form • Decoding is the reverse of encoding. It converts encoded data communication transmissions and files to their original states.  Message Formatting and Encapsulation :is the process of taking data from one protocol and translating it into another protocol, .  Message Size  Message Timing • Access method • Flow control • Response timeout  Message Delivery Options • Unicast • Multicast • Broadcast
  • 6. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8 3.2 Network Protocols and Standards
  • 7. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Protocols and Standards Protocols  Rules that Govern Communications  Network Protocols • The role of protocols • How the message is formatted or structured • The process by which networking devices share information about pathways with other networks • The setup and termination of data transfer sessions  Protocol Interaction • Example: web server and client
  • 8. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Protocols and Standards Protocol Suites  Protocol Suites and Industry Standards • TCP/IP is an open standard  TCP/IP Protocol Suites • Can you name some of the protocols from the TCP/IP protocol suite.  TCP/IP Communication Process
  • 9. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Protocols and Standards Reference Models  The Benefits of Using a Layered Model • Name some benefits  The OSI Reference Model • Provides list of functions • Describes interactions between layers  OSI Model and TCP/IP Model Comparison • Similar: transport and network layers • Contrast: relationship between layers
  • 10. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12 3.3 Data Transfer in the Network
  • 11. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Transfer in the Network Data Encapsulation  Message Segmentation • Segmentation - Break communication into pieces ,splitting a computer network into subnetworks, • Multiplexing – interleaving the piece  Encapsulation and de-encapsulation process
  • 12. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Transfer in the Network Data Access  Network Addresses • Source IP address • Destination IP address • Deliver the IP packet from the original source to the final destination, either on the same network or to a remote network.  Data Link Addresses:- to deliver the data link frame from one network interface to another network interface on the same network. • Source data link address • Destination data link address • Deliver the data link frame from one network interface card (NIC) to another NIC on the same network  Devices on the Same Network  Devices on a Remote Network
  • 13. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 3.4 Chapter Summary
  • 14. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Explain how rules are used to facilitate communication.  Explain the role of protocols and standards organizations in facilitating interoperability in network communications.  Explain how devices on a LAN access resources in a small to medium-sized business network. Chapter Summary Summary
  • 15. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 16. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential