SlideShare a Scribd company logo
1 of 41
Module 5: Communication
Principles
Instructor Materials
Networking Essentials (NETESS v2.0)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Instructor Materials – Module 5 Planning Guide
This PowerPoint deck is divided in two parts:
• Instructor Planning Guide
• Information to help you become familiar with the module
• Teaching aids
•Instructor Class Presentation
• Optional slides that you can use in the classroom
• Begins on slide #9.
Note: Remove the Planning Guide from this presentation before sharing with anyone.
For additional help and resources go to the Instructor Home Page and Course Resources
for this course. You also can visit the professional development site on netacad.com, the
official Cisco Networking Academy Facebook page, or Instructor Only FB group.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What to Expect in this Module
To facilitate learning, the following features within the GUI may be included in this module:
Feature Description
Animations Expose learners to new skills and concepts.
Videos Expose learners to new skills and concepts.
Check Your Understanding (CYU) Per topic online quiz to help learners gauge content
understanding.
Lab Labs designed for working with physical equipment.
Module Quizzes Self-assessments that integrate concepts and skills
learned throughout the series of topics presented in
the module.
Module Summary Briefly recaps module content.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Check Your Understanding
• Check Your Understanding activities are designed to let students quickly determine if they understand
the content and can proceed, or if they need to review.
• Check Your Understanding activities do not affect student grades.
• There are no separate slides for these activities in the PPT. They are listed in the notes area of the
slide that appears before these activities.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Activities
Page # Activity Type Activity Name Optional?
5.1.1 Animation The Three Elements recommended
5.1.4 Lab My Protocol Rules recommended
5.2.1 Video Devices in a Bubble recommended
5.2.4 CYU Communications Standards recommended
5.3.1 Video Network Protocols recommended
5.3.2 Video The Protocol Stack recommended
5.3.8 CYU Network Communication Models recommended
5.4.2 Animation Ethernet Evolution recommended
5.4.3 Video Ethernet Addressing recommended
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Activities (Cont.)
Page # Activity Type Activity Name Optional?
5.4.4 Animation The Ethernet MAC Address recommended
5.4.5 Lab Determine the MAC Address of a Host recommended
5.5.2 Module Quiz Communication Principles Quiz recommended
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Best Practices
Prior to teaching Module 5, the instructor should:
• Review the animations and assessments for this module.
• Try to include as many questions as possible to keep students engaged during classroom presentation.
Topic 5.1
• Review lab 5.1.4 – My Protocol Rules, before teaching Topic 5.1.
• Express the importance of communication protocols using human communication as an example.
• Describe the use of networking protocols to provide successful computer network communication.
Topic 5.2
• Ask the class: How do you know that computer technologies purchased from a store will be
compatible with each other?
• Discuss the large amount of new devices and technologies being created and the importance of
standards.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Best Practices (Cont.)
Topic 5.3
• Explain the requirements for successful communication by providing an example of a protocol stack. A
Wireshark capture of an HTTP session is a great example to focus on HTTP/TCP/IP/Ethernet.
• Walk through a graphic of the TCP/IP model and explain the purpose of each layer.
• Walk through a graphic of the OSI Reference model and explain the purpose of each layer.
• Make sure to compare the functionality of the layers from both the TCP/IP and OSI Reference models.
• Ask the students to create a mnemonic to memorize the order of the layers in both models.
Topic 5.4
• Ask the class to draw a topology of your current home network or of the network in the classroom.
• Ask the class: How are all the different devices on this network able to successfully communicate with
a common protocol?
• Discuss examples of Ethernet standards and their standard notation.
• Bring up a PC in Packet Tracer or on a physical client and demonstrate the identification of a MAC
address and the use of it in a conversation between two or more devices.
Module 5: Communication
Principles
Networking Essentials (NETESS)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Objectives
Module Title: Communication Principles
Module Objective: Explain the importance of standards and protocols in network communications.
Topic Title Topic Objective
The Rules Describe network communication protocols.
Communication
Standards
Describe network communication standards.
Network
Communication
Models
Compare the OSI and TCP/IP models.
Ethernet Explain the OSI model Layer 1 and Layer 2 functions in an Ethernet network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.1 The Rules
11
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Rules
The Three Elements
The primary purpose of any network is to provide us with a method to communicate and share
information. All communication begins with a message, or information, that must be sent from one
individual or device to another.
All communication methods have three elements in common:
• The first of these elements is the message source, or sender. Message sources are people,
or electronic devices, that need to communicate a message to other individuals or devices.
• The second element of communication is the destination, or receiver, of the message. The
destination receives the message and interprets it.
• The third element is called a transmission medium, or channel. It provides the pathway over
which the message can travel from source to destination.
12
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Rules
Communication Protocols
Before beginning to communicate with each other, we establish rules or agreements to govern the
conversation:
• What method of communication should we use?
• What language should we use?
• Do we need to confirm that our messages are received?
These rules, or protocols, must be followed for the message to be successfully delivered and understood:
• An identified sender and receiver
• Agreed upon method of communicating (face-to-face, telephone, letter, photograph)
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements
13
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Rules
Why Protocols Matter
Protocol Characteristic Description
Message format
When a message is sent, it must use a specific format or structure. Message formats
depend on the type of message and the channel that is used to deliver the message.
Message size
The rules that govern the size of the pieces communicated across the network are very
strict and can be different, depending on the channel used. It may be necessary to break
a longer message into smaller pieces in order to ensure that the message can be
delivered reliably.
Timing
Many network communication functions are dependent on timing. Timing determines the
speed at which the bits are transmitted across the network. It also affects when an
individual host can send data and the total amount of data that can be sent in any one
transmission.
Encoding
Messages sent across the network are first converted into bits by the sending host. Each
bit is encoded into a pattern of sounds, light waves, or electrical impulses. The
destination host receives and decodes the signals in order to interpret the message.
Encapsulation
Each message transmitted on a network must include a header that contains addressing
information that identifies the source and destination hosts. Encapsulation is the process
of adding this information to the pieces of data that make up the message.
Message pattern
Some messages require an acknowledgment before the next message can be sent. This
type of request/response pattern is a common aspect of many networking protocols. 14
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Rules
Lab - My Protocol Rules
In this lab, you will complete the following objectives:
• Relate computer network protocols to the rules that you use every day for various forms of
communication.
• Define the rules that govern how you send and interpret text messages.
• Explain what would happen if the sender and receiver did not agree on the details of the protocol.
15
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.2 Communication Standards
16
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Communication Standards
Video - Devices in a Bubble
17
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Communication Standards
The Internet and Standards
A standard is a set of rules that determines how something must be done.
Networking and internet standards ensure that all devices connecting to the network implement the same
set of rules or protocols in the same manner.
Using standards, it is possible for different types of devices to send information to each other over the
internet.
For example, the way in which an email is formatted, forwarded, and received by all devices is done
according to a standard:
• If one person sends an email via a personal computer, another person can use a mobile phone to
receive and read the email as long as the mobile phone uses the same standards as the personal
computer.
18
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Communication Standards
Network Standards Organizations
An internet standard is the end result of a comprehensive cycle of
discussion, problem solving, and testing.
These different standards are developed, published, and
maintained by a variety of organizations.
When a new standard is proposed, each stage of the development
and approval process is recorded in a numbered Request for
Comments (RFC) document.
• RFCs for internet standards are published and managed by the
Internet Engineering Task Force (IETF).
Other standards organizations that support the internet are shown
in the figure.
19
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.3 Network Communication
Models
20
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Communication Models
Video - Network Protocols
21
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Communication Models
Video - The Protocol Stack
22
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Communication Models
The Protocol Stack
Successful communication between hosts requires interaction between a number of protocols.
These protocols are implemented in software and hardware that are installed on each host and
networking device.
The interaction between the different protocols on a device can be illustrated as a protocol stack, as
shown in the figure.
A stack illustrates the protocols as a layered hierarchy, with each higher-level protocol depending on the
services of the protocols shown in the lower levels.
The separation of functions enables each layer in the stack to operate independently of others
23
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Communication Models
The Protocol Stack (Cont.)
The protocols in the figure are described as follows:
Hypertext Transfer Protocol (HTTP) – This protocol governs the
way a web server and a web client interact.
HTTP defines the content and formatting of the requests and
responses that are exchanged between the client and server.
Transmission Control Protocol (TCP) – This protocol manages
the individual conversations. TCP is responsible for guaranteeing
the reliable delivery of the information and managing flow control
between the end devices.
Internet Protocol (IP) – This protocol is responsible for delivering
messages from the sender to the receiver. IP is used by routers to
forward the messages across multiple networks.
Ethernet – This protocol is responsible for the delivery of
messages from one NIC to another NIC on the same Ethernet
local area network (LAN).
24
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Communication Models
The TCP/IP Model
A layered model depicts the operation of the protocols occurring within each layer, as well as the
interaction with the layers above and below it.
The layered model has many benefits:
• Assists in protocol design, because protocols that operate at a specific layer have defined information
that they act upon and a defined interface to the layers above and below.
• Fosters competition because products from different vendors can work together.
• Enables technology changes to occur at one level without affecting the other levels.
• Provides a common language to describe networking functions and capabilities.
TCP/IP Model Layer Description
Application Represents data to the user, plus encoding and dialog control.
Transport Supports communication between various devices across diverse networks.
Internet Determines the best path through the network.
Network Access Controls the hardware devices and media that make up the network.
25
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Communication Models
The OSI Reference Model
OSI Model Layer Description
7 - Application The application layer contains protocols used for process-to-process
communications.
6 - Presentation The presentation layer provides for common representation of the data
transferred between application layer services.
5 - Session The session layer provides services to the presentation layer to organize its
dialogue and to manage data exchange.
4 - Transport The transport layer defines services to segment, transfer, and reassemble the
data for individual communications between the end devices.
3 - Network The network layer provides services to exchange the individual pieces of data
over the network between identified end devices.
2 - Data Link The data link layer protocols describe methods for exchanging data frames
between devices over a common media
1 - Physical The physical layer protocols describe the mechanical, electrical, functional,
and procedural means to activate, maintain, and de-activate physical
connections for a bit transmission to and from a network device.
26
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Communication Models
Upper and Lower Layers of the OSI Model
Group Layer Number Layer Name
Common Network Components Associated
with this Layer
Upper
Layers
7 Application •Network aware applications
•Email
•Web browsers and servers
•File transfer
•Name resolution
6 Presentation
5 Session
Lower
Layers
4 Transport
•Video and voice streaming mechanisms
•Firewall filtering lists
3 Network
•IP addressing
•Routing
2 Data Link
•Network interface cards and drivers
•Network switching
•WAN connectivity
1 Physical
•Physical medium (copper twisted pair, fiber-optic
cables, wireless transmitters)
•Hubs and repeaters
27
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Communication Models
OSI Model and TCP/IP Model Comparison
The protocols that make up the TCP/IP
protocol suite can be described in terms of
the OSI reference model:
• The functions that occur at the internet
layer in the TCP/IP model are
contained in the network layer of the
OSI Model.
• The transport layer functionality is the
same between both models.
• The network access layer and the
application layer of the TCP/IP model
are further divided in the OSI model to
describe discrete functions that must
occur at these layers.
28
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.4 Ethernet
29
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ethernet
The Rise of Ethernet
In the early days of networking, each vendor used its own proprietary methods of
interconnecting network devices and networking protocols.
As networks became more widespread, standards were developed that defined rules by which
network equipment from different vendors operated.
Standards are beneficial to networking in many ways:
• Facilitate design
• Simplify product development
• Promote competition
• Provide consistent interconnections
• Facilitate training
• Provide more vendor choices for customers
30
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ethernet
The Rise of Ethernet (Cont.)
There is no official local area networking standard protocol, but over time, Ethernet has become
the most common.
Ethernet protocols define how data is formatted and how it is transmitted over the wired network.
The Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model.
Ethernet has become a de facto standard, which means that it is the technology used by almost
all wired local area networks, as shown in the figure.
31
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ethernet
Ethernet Evolution
The Institute of Electrical and Electronic Engineers, or IEEE, maintains the networking standards,
including Ethernet and wireless standards.
Each technology standard is assigned a number that refers to the committee that is responsible for
approving and maintaining the standard.
The committee responsible for the Ethernet standards is 802.3.
Each version of Ethernet has an associated standard. For example, 802.3 100BASE-T.
This standard notation translates as:
• 100 is the speed in Mbps
• BASE stands for baseband transmission
• T stands for the type of cable, in this case, twisted-pair cable standards.
Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of Ethernet operate
at 10 Gigabits per second and more.
32
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ethernet
The Ethernet MAC Address
All communication requires a way to identify the source and destination.
The source and destination in human communication are represented by names.
When your name is called, you listen to the message and respond. Other people in the room may hear
the message, but they ignore it because it is not addressed to them.
On Ethernet networks, a similar method exists for identifying source and destination hosts. Each host
connected to an Ethernet network is assigned a physical address which serves to identify the host on the
network.
Every Ethernet network interface has a physical address assigned to it when it is manufactured. This
address is known as the Media Access Control (MAC) address.
The MAC address identifies each source and destination host on the network.
33
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ethernet
Video - Ethernet Addressing
34
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ethernet
Lab - Determine the MAC Address of a Host
In this lab, you will complete the following objectives:
• Determine the MAC address of a Windows computer on an Ethernet network using the
ipconfig /all command.
• Analyze a MAC address to determine the manufacturer.
35
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.5 Communication Principles
Summary
36
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Communication Principles Summary
What Did I Learn in this Module?
• All communication methods have three elements in common.
• The first of these elements is the message source, or sender.
• The second element of communication is the destination, or receiver, of the message.
• The third element is called a transmission medium, or channel.
• Protocols are required for computers to properly communicate across the network.
• Networking protocols define many aspects of communication over the local network which
include message format, message size, timing, encoding, encapsulation, and message
patterns.
• Successful communication between hosts requires interaction between a number of protocols
that are implemented in software and hardware on each host and networking device.
• A layered model depicts the operation of the protocols occurring within each layer, as well as the
interaction with the layers above and below it.
37
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Communication Principles Summary
What Did I Learn in this Module? (Cont.)
• Networking and internet standards ensure that all devices connecting to the network
implement the same set of rules or protocols in the same manner.
• The most widely known internetwork reference model was created by the Open Systems
Interconnection (OSI) project and is commonly referred to as the OSI model.
• The OSI model breaks network communications down into multiple processes. Each
process is a small part of the larger task.
• The OSI model helps us troubleshoot by focusing on a specific layer to identify and
resolve network problems.
• The protocols that make up the TCP/IP protocol suite can be described in terms of the
OSI reference model.
• Ethernet is the technology used by almost all wired local area networks and Ethernet
standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model.
• Each host connected to an Ethernet network is assigned a physical address, known
as a MAC address, which serves to identify the host on the network.
38
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Communication Principles Summary
Module 5 – New Terms and Commands
• Message format
• Message size
• Timing
• Encoding
• Encapsulation
• Message pattern
• Standards
• Standards Organizations
• TCP/IP Model
• OSI Reference Model
• HTTP
• TCP
• Ethernet
• MAC address
39
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Communication Principles Summary
Module 5 - Communication Principles Quiz
40
Networking Essentials 2.0 Module5.pptx

More Related Content

Similar to Networking Essentials 2.0 Module5.pptx

Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3limenih muluneh
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1paolo374233
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6APSU
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesCisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesAhmed Gad
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3Waqas Ahmed Nawaz
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
Modulo 4 cisco ccna v7 para estudiantes d
Modulo 4 cisco ccna v7 para estudiantes dModulo 4 cisco ccna v7 para estudiantes d
Modulo 4 cisco ccna v7 para estudiantes dSebastianAcevedoGome1
 
QoS for Media Networks
QoS for Media NetworksQoS for Media Networks
QoS for Media NetworksAmine Choukir
 
Background of gondar university
Background of gondar universityBackground of gondar university
Background of gondar universityTemesgen Geta
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...wosborne03
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptxNguynVngQuc
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?ssuser06ea42
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Hamza Malik
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 

Similar to Networking Essentials 2.0 Module5.pptx (20)

Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesCisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
 
data communication
data communicationdata communication
data communication
 
Itn instruction ppt_chapter3
Itn instruction ppt_chapter3Itn instruction ppt_chapter3
Itn instruction ppt_chapter3
 
COC2_edited.docx
COC2_edited.docxCOC2_edited.docx
COC2_edited.docx
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
Modulo 4 cisco ccna v7 para estudiantes d
Modulo 4 cisco ccna v7 para estudiantes dModulo 4 cisco ccna v7 para estudiantes d
Modulo 4 cisco ccna v7 para estudiantes d
 
QoS for Media Networks
QoS for Media NetworksQoS for Media Networks
QoS for Media Networks
 
Background of gondar university
Background of gondar universityBackground of gondar university
Background of gondar university
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
It4504 syllabus
It4504 syllabusIt4504 syllabus
It4504 syllabus
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 

Recently uploaded

Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 

Networking Essentials 2.0 Module5.pptx

  • 1. Module 5: Communication Principles Instructor Materials Networking Essentials (NETESS v2.0)
  • 2. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Instructor Materials – Module 5 Planning Guide This PowerPoint deck is divided in two parts: • Instructor Planning Guide • Information to help you become familiar with the module • Teaching aids •Instructor Class Presentation • Optional slides that you can use in the classroom • Begins on slide #9. Note: Remove the Planning Guide from this presentation before sharing with anyone. For additional help and resources go to the Instructor Home Page and Course Resources for this course. You also can visit the professional development site on netacad.com, the official Cisco Networking Academy Facebook page, or Instructor Only FB group.
  • 3. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential What to Expect in this Module To facilitate learning, the following features within the GUI may be included in this module: Feature Description Animations Expose learners to new skills and concepts. Videos Expose learners to new skills and concepts. Check Your Understanding (CYU) Per topic online quiz to help learners gauge content understanding. Lab Labs designed for working with physical equipment. Module Quizzes Self-assessments that integrate concepts and skills learned throughout the series of topics presented in the module. Module Summary Briefly recaps module content.
  • 4. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Check Your Understanding • Check Your Understanding activities are designed to let students quickly determine if they understand the content and can proceed, or if they need to review. • Check Your Understanding activities do not affect student grades. • There are no separate slides for these activities in the PPT. They are listed in the notes area of the slide that appears before these activities.
  • 5. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 5: Activities Page # Activity Type Activity Name Optional? 5.1.1 Animation The Three Elements recommended 5.1.4 Lab My Protocol Rules recommended 5.2.1 Video Devices in a Bubble recommended 5.2.4 CYU Communications Standards recommended 5.3.1 Video Network Protocols recommended 5.3.2 Video The Protocol Stack recommended 5.3.8 CYU Network Communication Models recommended 5.4.2 Animation Ethernet Evolution recommended 5.4.3 Video Ethernet Addressing recommended
  • 6. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 5: Activities (Cont.) Page # Activity Type Activity Name Optional? 5.4.4 Animation The Ethernet MAC Address recommended 5.4.5 Lab Determine the MAC Address of a Host recommended 5.5.2 Module Quiz Communication Principles Quiz recommended
  • 7. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 5: Best Practices Prior to teaching Module 5, the instructor should: • Review the animations and assessments for this module. • Try to include as many questions as possible to keep students engaged during classroom presentation. Topic 5.1 • Review lab 5.1.4 – My Protocol Rules, before teaching Topic 5.1. • Express the importance of communication protocols using human communication as an example. • Describe the use of networking protocols to provide successful computer network communication. Topic 5.2 • Ask the class: How do you know that computer technologies purchased from a store will be compatible with each other? • Discuss the large amount of new devices and technologies being created and the importance of standards.
  • 8. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module 5: Best Practices (Cont.) Topic 5.3 • Explain the requirements for successful communication by providing an example of a protocol stack. A Wireshark capture of an HTTP session is a great example to focus on HTTP/TCP/IP/Ethernet. • Walk through a graphic of the TCP/IP model and explain the purpose of each layer. • Walk through a graphic of the OSI Reference model and explain the purpose of each layer. • Make sure to compare the functionality of the layers from both the TCP/IP and OSI Reference models. • Ask the students to create a mnemonic to memorize the order of the layers in both models. Topic 5.4 • Ask the class to draw a topology of your current home network or of the network in the classroom. • Ask the class: How are all the different devices on this network able to successfully communicate with a common protocol? • Discuss examples of Ethernet standards and their standard notation. • Bring up a PC in Packet Tracer or on a physical client and demonstrate the identification of a MAC address and the use of it in a conversation between two or more devices.
  • 10. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Objectives Module Title: Communication Principles Module Objective: Explain the importance of standards and protocols in network communications. Topic Title Topic Objective The Rules Describe network communication protocols. Communication Standards Describe network communication standards. Network Communication Models Compare the OSI and TCP/IP models. Ethernet Explain the OSI model Layer 1 and Layer 2 functions in an Ethernet network.
  • 11. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.1 The Rules 11
  • 12. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Rules The Three Elements The primary purpose of any network is to provide us with a method to communicate and share information. All communication begins with a message, or information, that must be sent from one individual or device to another. All communication methods have three elements in common: • The first of these elements is the message source, or sender. Message sources are people, or electronic devices, that need to communicate a message to other individuals or devices. • The second element of communication is the destination, or receiver, of the message. The destination receives the message and interprets it. • The third element is called a transmission medium, or channel. It provides the pathway over which the message can travel from source to destination. 12
  • 13. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Rules Communication Protocols Before beginning to communicate with each other, we establish rules or agreements to govern the conversation: • What method of communication should we use? • What language should we use? • Do we need to confirm that our messages are received? These rules, or protocols, must be followed for the message to be successfully delivered and understood: • An identified sender and receiver • Agreed upon method of communicating (face-to-face, telephone, letter, photograph) • Common language and grammar • Speed and timing of delivery • Confirmation or acknowledgment requirements 13
  • 14. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Rules Why Protocols Matter Protocol Characteristic Description Message format When a message is sent, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message. Message size The rules that govern the size of the pieces communicated across the network are very strict and can be different, depending on the channel used. It may be necessary to break a longer message into smaller pieces in order to ensure that the message can be delivered reliably. Timing Many network communication functions are dependent on timing. Timing determines the speed at which the bits are transmitted across the network. It also affects when an individual host can send data and the total amount of data that can be sent in any one transmission. Encoding Messages sent across the network are first converted into bits by the sending host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses. The destination host receives and decodes the signals in order to interpret the message. Encapsulation Each message transmitted on a network must include a header that contains addressing information that identifies the source and destination hosts. Encapsulation is the process of adding this information to the pieces of data that make up the message. Message pattern Some messages require an acknowledgment before the next message can be sent. This type of request/response pattern is a common aspect of many networking protocols. 14
  • 15. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Rules Lab - My Protocol Rules In this lab, you will complete the following objectives: • Relate computer network protocols to the rules that you use every day for various forms of communication. • Define the rules that govern how you send and interpret text messages. • Explain what would happen if the sender and receiver did not agree on the details of the protocol. 15
  • 16. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.2 Communication Standards 16
  • 17. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Communication Standards Video - Devices in a Bubble 17
  • 18. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Communication Standards The Internet and Standards A standard is a set of rules that determines how something must be done. Networking and internet standards ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner. Using standards, it is possible for different types of devices to send information to each other over the internet. For example, the way in which an email is formatted, forwarded, and received by all devices is done according to a standard: • If one person sends an email via a personal computer, another person can use a mobile phone to receive and read the email as long as the mobile phone uses the same standards as the personal computer. 18
  • 19. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Communication Standards Network Standards Organizations An internet standard is the end result of a comprehensive cycle of discussion, problem solving, and testing. These different standards are developed, published, and maintained by a variety of organizations. When a new standard is proposed, each stage of the development and approval process is recorded in a numbered Request for Comments (RFC) document. • RFCs for internet standards are published and managed by the Internet Engineering Task Force (IETF). Other standards organizations that support the internet are shown in the figure. 19
  • 20. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.3 Network Communication Models 20
  • 21. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Communication Models Video - Network Protocols 21
  • 22. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Communication Models Video - The Protocol Stack 22
  • 23. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Communication Models The Protocol Stack Successful communication between hosts requires interaction between a number of protocols. These protocols are implemented in software and hardware that are installed on each host and networking device. The interaction between the different protocols on a device can be illustrated as a protocol stack, as shown in the figure. A stack illustrates the protocols as a layered hierarchy, with each higher-level protocol depending on the services of the protocols shown in the lower levels. The separation of functions enables each layer in the stack to operate independently of others 23
  • 24. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Communication Models The Protocol Stack (Cont.) The protocols in the figure are described as follows: Hypertext Transfer Protocol (HTTP) – This protocol governs the way a web server and a web client interact. HTTP defines the content and formatting of the requests and responses that are exchanged between the client and server. Transmission Control Protocol (TCP) – This protocol manages the individual conversations. TCP is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices. Internet Protocol (IP) – This protocol is responsible for delivering messages from the sender to the receiver. IP is used by routers to forward the messages across multiple networks. Ethernet – This protocol is responsible for the delivery of messages from one NIC to another NIC on the same Ethernet local area network (LAN). 24
  • 25. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Communication Models The TCP/IP Model A layered model depicts the operation of the protocols occurring within each layer, as well as the interaction with the layers above and below it. The layered model has many benefits: • Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below. • Fosters competition because products from different vendors can work together. • Enables technology changes to occur at one level without affecting the other levels. • Provides a common language to describe networking functions and capabilities. TCP/IP Model Layer Description Application Represents data to the user, plus encoding and dialog control. Transport Supports communication between various devices across diverse networks. Internet Determines the best path through the network. Network Access Controls the hardware devices and media that make up the network. 25
  • 26. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Communication Models The OSI Reference Model OSI Model Layer Description 7 - Application The application layer contains protocols used for process-to-process communications. 6 - Presentation The presentation layer provides for common representation of the data transferred between application layer services. 5 - Session The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange. 4 - Transport The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices. 3 - Network The network layer provides services to exchange the individual pieces of data over the network between identified end devices. 2 - Data Link The data link layer protocols describe methods for exchanging data frames between devices over a common media 1 - Physical The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device. 26
  • 27. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Communication Models Upper and Lower Layers of the OSI Model Group Layer Number Layer Name Common Network Components Associated with this Layer Upper Layers 7 Application •Network aware applications •Email •Web browsers and servers •File transfer •Name resolution 6 Presentation 5 Session Lower Layers 4 Transport •Video and voice streaming mechanisms •Firewall filtering lists 3 Network •IP addressing •Routing 2 Data Link •Network interface cards and drivers •Network switching •WAN connectivity 1 Physical •Physical medium (copper twisted pair, fiber-optic cables, wireless transmitters) •Hubs and repeaters 27
  • 28. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Communication Models OSI Model and TCP/IP Model Comparison The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI reference model: • The functions that occur at the internet layer in the TCP/IP model are contained in the network layer of the OSI Model. • The transport layer functionality is the same between both models. • The network access layer and the application layer of the TCP/IP model are further divided in the OSI model to describe discrete functions that must occur at these layers. 28
  • 29. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.4 Ethernet 29
  • 30. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet The Rise of Ethernet In the early days of networking, each vendor used its own proprietary methods of interconnecting network devices and networking protocols. As networks became more widespread, standards were developed that defined rules by which network equipment from different vendors operated. Standards are beneficial to networking in many ways: • Facilitate design • Simplify product development • Promote competition • Provide consistent interconnections • Facilitate training • Provide more vendor choices for customers 30
  • 31. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet The Rise of Ethernet (Cont.) There is no official local area networking standard protocol, but over time, Ethernet has become the most common. Ethernet protocols define how data is formatted and how it is transmitted over the wired network. The Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model. Ethernet has become a de facto standard, which means that it is the technology used by almost all wired local area networks, as shown in the figure. 31
  • 32. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet Ethernet Evolution The Institute of Electrical and Electronic Engineers, or IEEE, maintains the networking standards, including Ethernet and wireless standards. Each technology standard is assigned a number that refers to the committee that is responsible for approving and maintaining the standard. The committee responsible for the Ethernet standards is 802.3. Each version of Ethernet has an associated standard. For example, 802.3 100BASE-T. This standard notation translates as: • 100 is the speed in Mbps • BASE stands for baseband transmission • T stands for the type of cable, in this case, twisted-pair cable standards. Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of Ethernet operate at 10 Gigabits per second and more. 32
  • 33. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet The Ethernet MAC Address All communication requires a way to identify the source and destination. The source and destination in human communication are represented by names. When your name is called, you listen to the message and respond. Other people in the room may hear the message, but they ignore it because it is not addressed to them. On Ethernet networks, a similar method exists for identifying source and destination hosts. Each host connected to an Ethernet network is assigned a physical address which serves to identify the host on the network. Every Ethernet network interface has a physical address assigned to it when it is manufactured. This address is known as the Media Access Control (MAC) address. The MAC address identifies each source and destination host on the network. 33
  • 34. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet Video - Ethernet Addressing 34
  • 35. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ethernet Lab - Determine the MAC Address of a Host In this lab, you will complete the following objectives: • Determine the MAC address of a Windows computer on an Ethernet network using the ipconfig /all command. • Analyze a MAC address to determine the manufacturer. 35
  • 36. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.5 Communication Principles Summary 36
  • 37. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Communication Principles Summary What Did I Learn in this Module? • All communication methods have three elements in common. • The first of these elements is the message source, or sender. • The second element of communication is the destination, or receiver, of the message. • The third element is called a transmission medium, or channel. • Protocols are required for computers to properly communicate across the network. • Networking protocols define many aspects of communication over the local network which include message format, message size, timing, encoding, encapsulation, and message patterns. • Successful communication between hosts requires interaction between a number of protocols that are implemented in software and hardware on each host and networking device. • A layered model depicts the operation of the protocols occurring within each layer, as well as the interaction with the layers above and below it. 37
  • 38. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Communication Principles Summary What Did I Learn in this Module? (Cont.) • Networking and internet standards ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner. • The most widely known internetwork reference model was created by the Open Systems Interconnection (OSI) project and is commonly referred to as the OSI model. • The OSI model breaks network communications down into multiple processes. Each process is a small part of the larger task. • The OSI model helps us troubleshoot by focusing on a specific layer to identify and resolve network problems. • The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI reference model. • Ethernet is the technology used by almost all wired local area networks and Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model. • Each host connected to an Ethernet network is assigned a physical address, known as a MAC address, which serves to identify the host on the network. 38
  • 39. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Communication Principles Summary Module 5 – New Terms and Commands • Message format • Message size • Timing • Encoding • Encapsulation • Message pattern • Standards • Standards Organizations • TCP/IP Model • OSI Reference Model • HTTP • TCP • Ethernet • MAC address 39
  • 40. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Communication Principles Summary Module 5 - Communication Principles Quiz 40

Editor's Notes

  1. Networking Essentials (NETESS) Module 5: Communication Principles
  2. Cisco Networking Academy Program Networking Essentials 2.0 (NETESS) Module 5: Communication Principles
  3. 5: Communication Principles 5.1: The Rules
  4. 5: Communication Principles 5.1: The Rules 5.1.1: The Three Elements
  5. 5: Communication Principles 5.1: The Rules 5.1.2: Communication Protocols
  6. 5: Communication Principles 5.1: The Rules 5.1.3: Why Protocols Matter
  7. 5: Communication Principles 5.1: The Rules 5.1.4: Lab - My Protocol Rules
  8. 5: Communication Principles 5.2: Communication Standards
  9. 5: Communication Principles 5.2: Communication Standards 5.2.1: Video - Devices in a Bubble
  10. 5: Communication Principles 5.2: Communication Standards 5.2.2: The Internet and Standards
  11. 5: Communication Principles 5.2: Communication Standards 5.2.3: Network Standards Organizations 5.2.4: Check Your Understanding - Communications Standards
  12. 5: Communication Principles 5.3: Network Communication Models
  13. 5: Communication Principles 5.3: Network Communication Models 5.3.1: Video - Network Protocols
  14. 5: Communication Principles 5.3: Network Communication Models 5.3.2: Video - The Protocol Stack
  15. 5: Communication Principles 5.3: Network Communication Models 5.3.3: The Protocol Stack
  16. 5: Communication Principles 5.3: Network Communication Models 5.3.3: The Protocol Stack (Cont.)
  17. 5: Communication Principles 5.3: Network Communication Models 5.3.4: The TCP/IP Model
  18. 5: Communication Principles 5.3: Network Communication Models 5.3.5: The OSI Reference Model
  19. 5: Communication Principles 5.3: Network Communication Models 5.3.6: Upper and Lower Layers of the OSI Model
  20. 5: Communication Principles 5.3: Network Communication Models 5.3.7: OSI Model and TCP/IP Model Comparison 5.3.8: Check Your Understanding - Network Communication Models
  21. 5: Communication Principles 5.4: Ethernet
  22. 5: Communication Principles 5.4: Ethernet 5.4.1: The Rise of Ethernet
  23. 5: Communication Principles 5.4: Ethernet 5.4.1: The Rise of Ethernet (Cont.)
  24. 5: Communication Principles 5.4: Ethernet 5.4.2: Ethernet Evolution
  25. 5: Communication Principles 5.4: Ethernet 5.4.4: The Ethernet MAC Address
  26. 5: Communication Principles 5.4: Ethernet 5.4.3: Video - Ethernet Addressing
  27. 5: Communication Principles 5.4: Ethernet 5.4.5: Lab - Determine the MAC Address of a Host
  28. 5: Communication Principles 5.5: Communication Principles Summary
  29. 5: Communication Principles 5.5: Communication Principles Summary 5.5.1: What Did I Learn in this Module?
  30. 5: Communication Principles 5.5: Communication Principles Summary 5.5.1: What Did I Learn in this Module? (Cont.)
  31. 5: Communication Principles 5.5: Communication Principles Summary 5.5.1: What Did I Learn in this Module?
  32. 5: Communication Principles 5.5: Communication Principles Summary 5.5.2: Module 5 - Communication Principles Quiz