You are on page 1of 45

UNIVERSIDAD TECNOLGICA

ISRAEL

CCNA 1
Chapter 3:
Network Protocols
and
Communications
Fuente: Cisco CCNA1 V 5.0

TUTOR: Ing. Oswaldo


Basurto G. Mg.

INTRODUCTION

Ing. Oswaldo Basurto G. Mg.

INTRODUCTION
More and more, it is
networks that connect
us. People
communicate online
from everywhere.
Conversations in
classrooms spill into
instant message chat
sessions, and online
debates continue at
school.
New services are being
developed daily to
Oswaldo Basurto G. Mg.
take advantage of Ing.
the

What is
Communication?
Communication begins
with a message, or information, that must
be sent from a source to a destination. The sending of this
message, whether by face-to-face communication or over a
network, is governed by rules called protocols. These protocols
are specific to the type of communication method occurring. In
our day-to-day personal communication, the rules we use to
communicate over one medium, like a telephone call, are not
necessarily the same as the protocols for using another medium,
such as sending a letter.

Ing. Oswaldo Basurto G. Mg.

Communication Process
Packets

Protocols

Source
Address

Medium

Destination
Address

Establishing the
Before communicating with one
another, individuals must use
Rules
established rules or agreements to govern the conversation.
There are many
protocols available that
govern successful
human communication.
Once there is an
agreed upon method of
communicating (faceto-face, telephone,
letter, photography),
the protocols put in
place must account for
the following
requirements:

An identified sender
and receiver
Common language and
grammar
Speed and timing of

Ing. Oswaldo Basurto G. Mg.

Establishing the
The protocols that are used in Rules
network communications share many
of the fundamental traits as those protocols used to govern
successful human conversations. In addition to identifying the
source and destination, computer and network protocols define the
details of how a message is transmitted across a network to answer
the above requirements. While there are many protocols that must
interact, common computer protocols include:

Ing. Oswaldo Basurto G. Mg.

Message Encoding
One of the first steps to sending a message is encoding
it. Encoding is the process of converting information into
another, acceptable form, for transmission. Decoding
reverses this process in order to interpret the
information.

Ing. Oswaldo Basurto G. Mg.

Message Encoding
Encoding between hosts must be in an appropriate form for the medium.
Messages sent across the network are first converted into bits by the
sending host. Each bit is encoded into a pattern of sounds, light waves, or
electrical impulses depending on the network media over which the bits are
transmitted. The destination host receives and decodes the signals in order
to interpret the message.

Ing. Oswaldo Basurto G. Mg.

Message Formatting and


Encapsulation
When a message is sent from
source to destination, it must use a specific
format or structure. Message formats depend on the type of message and
the channel that is used to deliver the message.

Ing. Oswaldo Basurto G. Mg.

10

Message Size
Another rule of communication is size. When people communicate with
each other, the messages that they send are usually broken into smaller
parts or sentences. These sentences are limited in size to what the
receiving person can process at one time.

This is known as segmenting. Each segment is encapsulated in a separate


frame with the address information, and is sent over the network. At the
receiving host, the messages are de-encapsulated and put back together
to be processed and interpreted.
Ing. Oswaldo Basurto G. Mg.

11

The Rules
Message Timing
Access Method
.
Flow Control
Response Timeout

Ing. Oswaldo Basurto G. Mg.

12

Message Delivery
A conversation between
two people is an example of a one-to-one delivery. When a
Options
group of recipients need to receive the same message simultaneously, a one-tomany or one-to-all message delivery is necessary.

Ing. Oswaldo Basurto G. Mg.

13

Protocols: Rules that Govern


The use ofCommunications
layers is a model that provides a way to conveniently
break a complex task into parts and describe how they work.

Ing. Oswaldo Basurto G. Mg.

14

Interaction of Protocols
The different protocols work together to ensure that the messages are received
and understood by both parties.

Application Protocol
Transport
Internet Protocol
Network Access
Protocols

Ing. Oswaldo Basurto G. Mg.

15

Protocol Suites and Industry


Standards
As stated previously, a protocol
suite is a set of protocols that work
together to provide comprehensive network communication services.
A protocol suite may be specified by a standards organization or
developed by a vendor.
Several companies
may even work
together to create a
proprietary protocol. It
is not uncommon for a
vendor (or group of
vendors) to develop a
proprietary protocol to
meet the needs of its
customers and later
assist in making that
proprietary protocol an
open standard. For
example:
Ing. Oswaldo Basurto G. Mg.
16
Ethernet, XEROX,

TCP/IP Protocol Suite and


Communication Process
They are organized in
layers using the TCP/IP
protocol model. TCP/IP
protocols are included in
the internet layer to the
application layer when
referencing the TCP/IP
model. The lower layer
protocols in the data link
or network access layer
are responsible for
delivering the IP packet
over the physical
medium. These lower
layer protocols are
developed by standardsIng. Oswaldo Basurto G. Mg.
organizations, such as

17

TCP/IP Protocol Suite and


Communication Process

Ing. Oswaldo Basurto G. Mg.

18

Open Standards
Standards organizations are usually vendor-neutral, nonprofit organizations established to develop and promote
the concept of open standards.
Standards organizations
include:
The Internet Society
(ISOC)
The Internet Architecture
Board (IAB)
The Internet Engineering
Task Force (IETF)
The Institute of Electrical
and Electronics Engineers
(IEEE)
Ing. Oswaldo Basurto G. Mg.
The International

19

Standards Organizations IEEE Engineers (IEEE,


The Institute of Electrical and Electronics
pronounced I-triple-E) is a professional organization for those in the
electrical engineering and electronics fields who are dedicated to
advancing technological innovation and creating standards.

Ing. Oswaldo Basurto G. Mg.

20

Other Standards
Organizations
Networking standards involve
several other standards
organizations. Some of the more common ones are:
The EIA is best
known for its
standards
related to
electrical wiring,
connectors, and
the 19-inch racks
used to mount
networking
equipment.
The
ICANN IS a
non-profit
organization based
in the United
States that
coordinates IP
address allocation,
the management
of domain names
used by DNS, and
the protocol
identifiers or port
numbers used by
TCP and UDP
protocols

The ITU-T defines standards for video


compression, Internet Protocol Television (IPTV),
and broadband communications, such as a digital
subscriber line (DSL).
Ing. Oswaldo Basurto G. Mg.

The TIA Is
responsible for
developing
communication
standards in a
variety of areas
including radio
equipment,
cellular towers,
Voice over IP
(VoIP) devices,
satellite
communications,
The
and IANA
more.is a
department of
ICANN
responsible for
overseeing and
managing IP
address
allocation,
domain name
management,
and protocol
identifiers for
ICANN
21

The Benefits of Using a


Layered Model
The OSI model is the most widely known internetwork reference
model. It is used for data network design, operation
specifications, and troubleshooting.
As shown in the figure, the TCP/IP and OSI models are the
primary
models
used when discussing network functionality
Using
a layered
model:
Assists in protocol design,
because protocols that operate
at a specific layer have defined
information that they act upon
and a defined interface to the
layers above and below.
Fosters competition because
products from different vendors
can work together.
Prevents technology or capability
changes in one layer from
affecting other layers above and
below.
Ing. Oswaldo
Provides a common language
to Basurto G. Mg.

22

The OSI Reference Model

MEDIA AYERS

HOST LAYERS

Although a few of the developed


protocols using the OSI
specifications are widely used
today, the seven-layer OSI model
has made major contributions to
the development of other protocols
and products for all types of new
networks.
The OSI model provides an
extensive list of functions and
services that can occur at each
layer. It also describes the
interaction of each layer with the
layers directly above and below it.
Although the content of this course
is structured around the OSI
reference model, the focus of
discussion is the protocols
Ing. Oswaldo Basurto G. Mg.
identified in the TCP/IP protocol

23

Physical Layer
The physical layer defines the electrical,
mechanical, procedural, and functional
specifications for activating, maintaining,
and deactivating the physical link between
end systems.
Such characteristics as voltage levels,
timing of voltage changes, physical data
rates, maximum transmission distances,
physical connectors, and other, similar,
attributes are defined by physical layer
specifications.
If you want to remember Layer 1 in as few
words as possible, think of signals and
media.

Data Link Layer


The data link layer provides reliable transit of
data across a physical link.
In so doing, the data link layer is concerned
with physical addressing, network topology,
network access, error notification, ordered
delivery of frames, and flow control.
If you want to remember Layer 2 in as few
words as possible, think of frames and media
access control.

Network Layer
The network layer is a complex layer that
provides connectivity and path selection
between two host systems that may be
located on geographically separated networks.
If you want to remember Layer 3 in as few
words as possible, think of path selection,
routing, and logical addressing.

Transport Layer
The transport layer segments data from the sending host's system and reassembles the
data into a data stream on the receiving host's system.
The transport layer attempts to provide a data transport service that shields the upper layers
from transport implementation details. Specifically, issues such as how reliable transport
between two hosts are accomplished is the concern of the transport layer.
In providing communication service, the transport layer
establishes, maintains, and properly terminates virtual circuits. In
providing reliable service, transport error detection-and-recovery
and information flow control are used.
If you want to remember Layer 4 in as few words as possible,
think of quality of service, and reliability.

Session Layer
As its name implies, the session layer establishes,
manages, and terminates sessions between two
communicating hosts.
The session layer provides its services to the presentation
layer. It also synchronizes dialogue between the two hosts'
presentation layers and manages their data exchange.

In addition to session regulation, the session layer


offers provisions for efficient data transfer, class of
service, and exception reporting of session layer,
presentation layer, and application layer problems.
If you want to remember Layer 5 in as few words as
possible, think of dialogues and conversations.

Presentation Layer

The presentation layer ensures that the


information that the application layer of one
system sends out is readable by the application
layer of another system.
If necessary, the presentation layer translates
between multiple data formats by using a
common format. If you want to think of Layer 6 in
as few words as possible, think of a common data
format.

Application Layer

The application layer is the OSI layer that is closest to


the user. It provides network services to the user's
applications. It differs from the other layers in that it
does not provide services to any other OSI layer, but
rather, only to applications outside the OSI model.
Examples of such applications are spreadsheet
programs, word processing programs, and bank terminal
programs.
The application layer establishes the availability of
intended communication partners, synchronizes and
establishes agreement on procedures for error recovery
and control of data integrity.
If you want to remember Layer 7 in as few words as
possible, think of browsers.

ACRONIMO
All

7 - Application

People 6 - Presentation
Seem 5 - Session
To

4 - Transport

Need 3 - Network
Dominos 2 - Data Link
Pizza

1 - Physical

The TCP/IP Protocol Model


The TCP/IP protocol model for internetwork communications was
created in the early 1970s and is sometimes referred to as the
Internet model. As shown in the figure, it defines four categories of
functions that must occur for communications to be successful.
The architecture of the TCP/IP protocol suite follows the structure of
this model. Because of this, the Internet model is commonly
referred to as the TCP/IP mode

Ing. Oswaldo Basurto G. Mg.

32

Comparing the OSI Model


with the TCP/IP Model
The TCP/IP application layer includes a number of protocols
that provide specific functionality to a variety of end user
applications.

Describes general services and functions that provide ordered


and reliable delivery of data between source and destination
hosts. These functions include acknowledgement, error recovery,
and sequencing. At this layer, the TCP/IP protocols TCP and User
Datagram Protocol (UDP) provide the necessary functionality.
The network layer, is almost universally used to describe the
range of processes that occur in all data networks to address and
route messages through an internetwork. IP is the TCP/IP suite
protocol that includes the functionality described at OSI Layer 3.

At the network access layer, the TCP/IP protocol suite


does not specify which protocols to use when
transmitting over a physical medium; it only
describes the handoff from the internet layer to the
physical network protocols. OSI Layers 1 and 2
discuss the necessary procedures to access the
media and the physical means to send data over a
Ing. Oswaldo
Basurto G. Mg.
33
network.

Activity Identify Layers and


Functions

Ing. Oswaldo Basurto G. Mg.

34

Communicating the Messages


In theory, a single communication, such as a music video or an email
message, could be sent across a network from a source to a destination as
one massive, uninterrupted stream of bits.

Segmentation can increase the reliability of


network communications. The separate
pieces of each message need not travel the
same pathway across the network from
In network communications, each segment
source to destination. If a particular path
of the message must go through a similar
becomes congested with data traffic or fails,
process to ensure that it gets to the correct
individual pieces of the message can still be
destination and can be reassembled into the
directed to the destination using alternate
content of the original message
pathways. If part of the message fails to
Ing. Oswaldo Basurto G. Mg.
35
make it to the destination, only the missing

Protocol Data Units (PDUs)


As application data is passed down the protocol stack on its way to be
transmitted across the network media, various protocols add information to
it at each level. This is commonly known as the encapsulation process.
The form that a piece of data takes at
any layer is called a protocol data unit
(PDU). During encapsulation, each
succeeding layer encapsulates the PDU
that it receives from the layer above in
accordance with the protocol being used.
At each stage of the process, a PDU has
a different name to reflect its new
functions. Although there is no universal
naming convention for PDUs, in this
course, the PDUs are named according to
the protocols of the TCP/IP suite, as
shown in the figure:
Data - The general term for the PDU
used at the application layer
Segment - Transport layer PDU
Packet - Network layer PDU
Frame Data Link layer PDU
Bits - A Physical layer PDU used when
physically transmitting data over the
Ing. Oswaldo Basurto G. Mg.
medium

36

Encapsulation
When sending messages on a network, the protocol stack on a host
operates from top to bottom.
The application layer protocol, HTTP, begins the process
by delivering the HTML formatted web page data to the
transport layer. There the application data is broken into
TCP segments.
Each TCP segment is given a label, called a header,
containing information about which process running on
the destination computer should receive the message. It
also contains the information that enables the
destination process to reassemble the data back to its
original format.
The transport layer encapsulates the web page HTML
data within the segment and sends it to the internet
layer, where the IP protocol is implemented. Here the
entire TCP segment is encapsulated within an IP packet,
which adds another label, called the IP header. The IP
header contains source and destination host IP
addresses, as well as information necessary to deliver
the packet to its corresponding destination process.
Next, the IP packet is sent to the network access layer where it is encapsulated within a frame
header and trailer. Each frame header contains a source and destination physical address.
The physical address uniquely identifies the devices on the local network. The trailer contains
error checking information. Finally the bits are encoded onto the media by the server network
interface card (NIC).
Ing. Oswaldo Basurto G. Mg.
37

De-Encapsulation

This process is reversed at the receiving host, and is known as deencapsulation. De-encapsulation is the process used by a receiving device
to remove one or more of the protocol headers. The data is de-encapsulated
as it moves up the stack toward the end-user application.
Ing. Oswaldo Basurto G. Mg.

38

Network Addresses and Data


Link addresses
To understand how
communication is
successful in the
network, it is important
to understand the roles
of both the network
layer addresses and the
data link addresses
when a device is
communicating with
another device on the
same network. In this
example we have a
client computer, PC1,
communicating with a
file server, FTP server,
on the same IP
network.
Ing. Oswaldo Basurto G. Mg.

39

MAC and IP Addresses


The sending host uses a protocol called Address Resolution Protocol
(ARP) to discover the MAC address of any host on the same local
network.

Ing. Oswaldo Basurto G. Mg.

40

Default Gateway
When a host needs to
send a message to a
remote network, it
must use the router,
also known as the
default gateway. The
default gateway is the
IP address of an
interface on a router on
the same network as
the sending host.
It is important that the
address of the default
gateway be configured
on each host on the
local network.
Ing. Oswaldo Basurto G. Mg.

41

Communicating with a Device


on a Remote Network
Each device knows the IP
address of the router
through the default gateway
address configured in its
TCP/IP settings. The default
gateway address is the
address of the router
interface connected to the
same local network as the
source device. All devices on
the local network use the
default gateway address to
send messages to the router.
After the host knows the
default gateway IP address,
it can use ARP to determine
the MAC address of that
default gateway. The MAC
Ing. Oswaldo Basurto G. Mg.
address of the default

42

SUMMARY

Data networks are systems of end devices, intermediary devices, and the media
connecting the devices. For communication to occur, these devices must know
how to communicate.
These devices must comply with communication rules and protocols. TCP/IP is an
example of a protocol suite. Most protocols are created by a standards
organization such as the IETF or IEEE. The Institute of Electrical and Electronics
Engineers is a professional organization for those in the electrical engineering and
electronics fields. ISO, the International Organization for Standardization, is the
worlds largest developer of international standards for a wide variety of products
and services.
The most widely-used networking models are the OSI and TCP/IP models.
Associating the protocols that set the rules of data communications with the
different layers of these models is useful in determining which devices and
services are applied at specific points as data passes across LANs and WANs.
Data that passes down the stack of the OSI model is segmented into pieces and
encapsulated with addresses and other labels. The process is reversed as the
pieces are de-encapsulated and passed up the destination protocol stack. The OSI
model describes the processes of encoding, formatting, segmenting, and
encapsulating data for transmission over the network.
The TCP/IP protocol suite is an open standard protocol that has been endorsed by
the networking industry and ratified, or approved, by a standards organization.
The Internet Protocol Suite is a suite of protocols required for transmitting and
Ing.Internet.
Oswaldo Basurto G. Mg.
43
receiving information using the

Summary

TAREA
Realice las actividades propuestas por
los temas tratados
Conteste el cuestionario (Quiz) , le
permite prepararse para el examen del
captulo
Realice las prcticas programadas por
los diferentes temas en el captulo,
utilice el Packet Tracer
Realice el Examen del Captulo, que ser
activado en la fecha establecida.
Ing. Oswaldo Basurto G. Mg.

45

You might also like