You are on page 1of 61

Chapter 3: Protocols and

Models
Prepared By: Eng.Israa Saadeh

Introduction to Networks v7.0


(ITN)
3.1 The Rules

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
The Rules
Communication Fundamentals
 All communication methods have three elements in common:
• Source or sender
• Destination or receiver
• Channel or media
 Rules or protocols govern all methods of communication.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
The Rules
Rule Establishment
 Protocols are necessary for effective communication and include:
• An identified sender and receiver
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements
 Protocols used in network communications also define:
• Message encoding
• Message delivery options
• Message Formatting and Encapsulation
• Message Timing
• Message Size

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
The Rules
Message Encoding
 Encoding between hosts must be in
appropriate format for the medium.
 Messages are first converted into
bits by the sending host.
 Each bit is encoded into a pattern of
sounds, light waves, or electrical
impulses depending on the network
media
 The destination host receives and
decodes the signals in order to
interpret the message.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
The Rules
Message Formatting and Encapsulation
 There is an agreed format for letters and
addressing letters which is required for
proper delivery.
 Putting the letter into the addressed
envelope is called encapsulation.
 Each computer message is
encapsulated in a specific format, called
a frame, before it is sent over the
network.
 A frame acts like an envelope providing
destination address and source address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
The Rules
Message Size
 Humans break long messages into smaller
parts or sentences.
 Long messages must also be broken into
smaller pieces to travel across a network.
• Each piece is sent in a separate frame.
• Each frame has its own addressing
information.
• A receiving host will reconstruct multiple
frames into the original message.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
The Rules
Message Timing
 Access Method
• Hosts on a network need to know when to begin sending
messages and how to respond when collisions occur.
 Flow Control
• Source and destination hosts use flow control to negotiate
correct timing to avoid overwhelming the destination and
ensure information is received.
 Response Timeout
• Hosts on the network have rules that specify how long to
wait for responses and what action to take if a response
timeout occurs.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
The Rules
Message Delivery Options
Unicast Message Multicast Message Broadcast
Message

One-to-one delivery One-to-many delivery One-to-all delivery

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
The Rules
A Note About the Node Icon
• Documents may use the node icon , typically a circle, to represent all devices.

• The figure illustrates the use of the node icon for delivery options.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
3.2 Protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Protocols
Network Protocol Overview
Protocol Type Description

Network Protocols enable two or more devices to communicate over one or more
Communications networks. The Ethernet family of technologies involves a variety of protocols
Protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol
(HTTP), and many more

Network Security Protocols secure data to provide authentication, data integrity, and data
Protocols encryption. Examples of secure protocols include Secure Shell (SSH), Secure
Sockets Layer (SSL), and Transport Layer Security (TLS).
Routing Protocols enable routers to exchange route information, compare path
Protocols information, and then to select the best path to the destination network.
Examples of routing protocols include Open Shortest Path First (OSPF) and
Border Gateway Protocol (BGP).
Service Protocols are used for the automatic detection of devices or services.
Discovery Examples of service discovery protocols include Dynamic Host Configuration
Protocols Protocol (DHCP) which discovers services for IP address allocation, and
Domain Name System (DNS) which is used to© 2016perform name-to-IP
Cisco and/or its address
affiliates. All rights reserved. Cisco Confidential 12

translation.
Protocols
Network Protocol Overview
Network protocols define a
common set of rules.
• Can be implemented on
devices in:
• Software
• Hardware
• Both
• Protocols have their own:
• Function
• Format
• Rules

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Protocols
Network Protocol Functions
• Devices use agreed-upon protocols
to communicate .
• Protocols may have may have one
or functions.

Function Description
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
Flow Control Ensures data flows at an efficient rate
Sequencing Uniquely labels each transmitted segment of data
Error Detection Determines if data became corrupted during transmission
Application Interface Process-to-process communications between network applications

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Protocols
Network Protocol Functions

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Protocols
Protocol Interaction
• Networks require the use of several
protocols.
• Each protocol has its own function and
format.
Protocol Function
Hypertext Transfer  Governs the way a web server and a web client interact
Protocol (HTTP)  Defines content and format
Transmission Control  Manages the individual conversations
Protocol (TCP)  Provides guaranteed delivery
 Manages flow control
Internet Protocol (IP) Delivers messages globally from the sender to the receiver
Ethernet Delivers messages from one NIC to another NIC on the same Ethernet
Local Area Network (LAN)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
3.3 Protocol Suites

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Protocol Suites
Network Protocol Suites
Protocols must be able to work with other
protocols.
Protocol suite:
• A group of inter-related protocols
necessary to perform a communication
function
• Sets of rules that work together to help
solve a problem
The protocols are viewed in terms of layers:
• Higher Layers
• Lower Layers- concerned with moving
data and provide services to upper layers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Protocol Suites
TCP/IP Protocol Suite
Today, the TCP/IP protocol suite includes
many protocols and continues to evolve to
support new services.
TCP/IP is the protocol suite used by the
internet and includes many protocols.
- Open standard protocol suite - This means it
is freely available to the public and can be used
by any vendor on their hardware or in their
software.
 Standards-based protocol suite - This
means it has been endorsed by the networking
industry and approved by a standards
organization. This ensures that products from
different manufacturers can interoperate
successfully. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Protocol Suites
Application Layer
Name System
 DNS - Domain Name System. Translates domain names such as cisco.com, into IP
addresses.
 Host Config

 DHCPv4 - Dynamic Host Configuration Protocol for IPv4. A DHCPv4 server dynamically
assigns IPv4 addressing information to DHCPv4 clients at start-up and allows the addresses
to be re-used when no longer needed.
 DHCPv6 - Dynamic Host Configuration Protocol for IPv6. DHCPv6 is similar to DHCPv4. A
DHCPv6 server dynamically assigns IPv6 addressing information to DHCPv6 clients at start-
up.
 SLAAC - Stateless Address Autoconfiguration. A method that allows a device to obtain its
IPv6 addressing information without using a DHCPv6 server.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Protocol Suites
Application Layer
Email
 SMTP - Simple Mail Transfer Protocol. Enables clients to send email to a mail server and
enables servers to send email to other servers.
 POP3 - Post Office Protocol version 3. Enables clients to retrieve email from a mail server
and download the email to the client's local mail application.
 IMAP - Internet Message Access Protocol. Enables clients to access email stored on a
mail server as well as maintaining email on the server.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Protocol Suites
Application Layer
File Transfer
 FTP - File Transfer Protocol. Sets the rules that enable a user on one host to access and transfer files to and from another
host over a network. FTP is a reliable, connection-oriented, and acknowledged file delivery protocol.

 SFTP - SSH File Transfer Protocol. As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a
secure file transfer session in which the file transfer is encrypted. SSH is a method for secure remote login that is typically
used for accessing the command line of a device.

 TFTP - Trivial File Transfer Protocol. A simple, connectionless file transfer protocol with best-effort, unacknowledged file
delivery. It uses less overhead than FTP.

Web and Web Service


 HTTP - Hypertext Transfer Protocol. A set of rules for exchanging text, graphic images, sound, video, and other multimedia
files on the World Wide Web.

 HTTPS - HTTP Secure. A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.

 REST - Representational State Transfer. A web service that uses application programming interfaces (APIs) and HTTP
requests to create web applications.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Protocol Suites
Transport layer
Connection-Oriented
 TCP - Transmission Control Protocol. Enables reliable communication
between processes running on separate hosts and provides reliable,
acknowledged transmissions that confirm successful delivery.
Connectionless
 UDP - User Datagram Protocol. Enables a process running on one host to
send packets to a process running on another host. However, UDP does
not confirm successful datagram transmission.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Protocol Suites
Internet Layer
Internet Protocol
 IPv4 - Internet Protocol version 4. Receives message segments from the
transport layer, packages messages into packets, and addresses packets
for end-to-end delivery over a network. IPv4 uses a 32-bit address.
 IPv6 - IP version 6. Similar to IPv4 but uses a 128-bit address.

 NAT - Network Address Translation. Translates IPv4 addresses from a


private network into globally unique public IPv4 addresses.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Protocol Suites
Internet Layer
Messaging
 ICMPv4 - Internet Control Message Protocol for IPv4. Provides feedback
from a destination host to a source host about errors in packet delivery.
 ICMPv6 - ICMP for IPv6. Similar functionality to ICMPv4 but is used for
IPv6 packets.
 ICMPv6 ND - ICMPv6 Neighbor Discovery. Includes four protocol
messages that are used for address resolution (ARP) and duplicate
address detection (DAD).

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Protocol Suites
Internet Layer
Routing Protocols
 OSPF - Open Shortest Path First. Link-state routing protocol that uses a
hierarchical design based on areas. OSPF is an open standard interior
routing protocol.
 EIGRP - Enhanced Interior Gateway Routing Protocol. A Cisco proprietary
routing protocol that uses a composite metric based on bandwidth, delay,
load and reliability.
 BGP - Border Gateway Protocol. An open standard exterior gateway
routing protocol used between Internet Service Providers (ISPs). BGP is
also commonly used between ISPs and their large private clients to
exchange routing information.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Protocol Suites
Network Access Layer
Address Resolution
 ARP - Address Resolution Protocol (L2 Protocol), Provides dynamic
address mapping between an IPv4 address and a hardware address.
Data Link Protocols
 Ethernet - Defines the rules for wiring and signaling standards of the
network access layer.
 WLAN - Wireless Local Area Network. Defines the rules for wireless
signaling across the 2.4 GHz and 5 GHz radio frequencies.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Protocol Suites
TCP/IP Protocol Example
• TCP/IP protocols operate at the
application, transport, and
internet layers.
• The most common network
access layer LAN protocols are
Ethernet and WLAN (wireless
LAN).

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Protocol Suites
TCP/IP Communication Process
• A web server encapsulating and sending a • A client de-encapsulating the web page for
web page to a client. the web browser

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
3.4 Standards Organizations

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Standards Organizations
Open Standards
Open standards encourage:
• interoperability

• competition

• innovation

Standards organizations are:


• vendor-neutral

• non-profit organizations

• established to develop and promote the


concept of open standards.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Standards Organizations
• Internet Society (ISOC) - Promotes
Internet Standards the open development and evolution of
internet
• Internet Architecture Board (IAB) -
Responsible for management and
development of internet standards
• Internet Engineering Task Force
(IETF) - Develops, updates, and
maintains internet and TCP/IP
technologies
• Internet Research Task Force (IRTF) -
Focused on long-term research related
to internet and TCP/IP protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Standards Organizations
Internet Standards (Cont.)
Standards organizations involved with the
development and support of TCP/IP
• Internet Corporation for Assigned
Names and Numbers (ICANN) -
Coordinates IP address allocation, the
management of domain names, and
assignment of other information
• Internet Assigned Numbers Authority
(IANA) - Oversees and manages IP
address allocation, domain name
management, and protocol identifiers for
ICANN

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Standards Organizations
Electronics and Communications Standard Organizations
 Institute of Electrical and Electronics Engineers (IEEE)
- dedicated to advancing technological innovation and
creating standards in a wide area of industries including
networking.
 Electronic Industries Alliance (EIA) - standards related
to electrical wiring, connectors, and network racks.
 Telecommunications Industry Association (TIA)
standards for radio equipment, cellular towers, Voice over
IP (VoIP) devices, and satellite communications.
 International Telecommunications Union-
Telecommunication Standardization Sector (ITU-T)
standards for video compression, Internet Protocol
Television (IPTV), and broadband communications.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
3.5 Reference Models

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Reference Models
The Benefits of Using a Layered Model
Complex concepts such as how a
network operates can be difficult to
explain and understand. For this
reason, a layered model is used.
Two layered models describe network
operations:
• Open System Interconnection (OSI)
Reference Model
• TCP/IP Reference Model

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Reference Models
The Benefits of Using a Layered Model (Cont.)
These are the benefits of using a layered model:
• Assist in protocol design because protocols that operate at a specific layer have
defined information that they act upon and a defined interface to the layers above
and below
• Foster competition because products from different vendors can work together

• Prevent technology or capability changes in one layer from affecting other layers
above and below
• Provide a common language to describe networking functions and capabilities

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Reference Models
The OSI Reference Model
 Application - contains protocols used for process-to-process
communications.
 Presentation - provides for common representation of the data.

 Session - provides services to the presentation layer to


organize its dialogue and to manage data exchange.
 Transport - defines services to segment, transfer, and
reassemble the data.
 Network - provides services to exchange the individual pieces
of data over the network between identified end devices.
 Data Link - provides methods for exchanging data frames
between devices over a common media.
 Physical - describes the mechanical, electrical, functional, and
procedural means to transmit bits across physical connections.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Reference Models
The TCP/IP Protocol Model
 The TCP/IP Protocol Model
• Created in the early 1970s for
internetwork communications.
• Open Standard.
• Also called The TCP/IP Model
or the Internet Model.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Reference Models
OSI Model and TCP/IP Model Comparison
 In the OSI model, the network access layer and the application layer of the
TCP/IP model are further divided to describe discrete functions that must
occur at these layers.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
3.6 Data Encapsulation

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Data Encapsulation
Segmenting Messages Segmenting is the process of breaking up
messages into smaller units.
Multiplexing is the processes of taking
multiple streams of segmented data and
interleaving them together.
Segmenting messages has two primary
benefits:
• Increases speed - Large amounts of
data can be sent over the network
without tying up a communications link.
• Increases efficiency - Only segments
which fail to reach the destination need to
be retransmitted, not the entire data
stream.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Data Encapsulation
Sequencing

Sequencing messages is the process of


numbering the segments so that the
message may be reassembled at the
destination.
TCP is responsible for sequencing the
individual segments.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Data Encapsulation
Protocol Data Units
 As application data is passed down the
protocol stack, information is added at each
level. This is known as the encapsulation
process.
 The form that the data takes at each layer is
known as a Protocol Data Unit (PDU).
• Data - application layer PDU
• Segment – Transport layer PDU
• Packet – Network layer PDU
• Frame – Data Link Layer PDU
• Bits – Physical Layer PDU

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Data Encapsulation
Encapsulation Example
• Encapsulation is a top down
process.
• The level above does its
process and then passes it
down to the next level of the
model. This process is
repeated by each layer until
it is sent out as a bit stream.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Data Encapsulation
De-encapsulation Example
• Data is de-encapsulated as it moves up
the stack.
• When a layer completes its process,
that layer strips off its header and
passes it up to the next level to be
processed. This is repeated at each
layer until it is a data stream that the
application can process.
1. Received as Bits (Bit Stream)
2. Frame
3. Packet
4. Segment
5. Data (Data Stream)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
3.7 Data Access

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Data Access
Addresses
Both the data link and network layers use addressing to deliver data from source to
destination.
Network layer source and destination addresses - Responsible for delivering the IP
packet from original source to the final destination.
Data link layer source and destination addresses – Responsible for delivering the data
link frame from one network interface card (NIC) to another NIC on the same network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Data Access
Layer 3 Logical Address

The IP packet contains two IP


addresses:
• Source IP address - The IP
address of the sending device,
original source of the packet.
• Destination IP address - The IP
address of the receiving device,
final destination of the packet.
These addresses may be on the same
link or remote.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Data Access
Layer 3 Logical Address (Cont.)
An IP address contains two parts:
• Network portion (IPv4) or Prefix (IPv6)
• The left-most part of the address indicates
the network group which the IP address is
a member.
• Each LAN or WAN will have the same
network portion.
• Host portion (IPv4) or Interface ID
(IPv6)
• The remaining part of the address
identifies a specific device within the
group.
• This portion is unique for each device on
the network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Data Access
Devices on the Same Network

When devices are on the same


network the source and destination will
have the same number in network
portion of the address.
• PC1 – 192.168.1.110
• FTP Server – 192.168.1.9

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Data Access
Role of the Data Link Layer Addresses: Same IP Network
When devices are on the same Ethernet
network the data link frame will use the
actual MAC address of the destination
NIC.
MAC addresses are physically embedded
into the Ethernet NIC and are local
addressing.
• The Source MAC address will be that of
the originator on the link.
• The Destination MAC address will
always be on the same link as the
source, even if the ultimate destination
is remote.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Data Access
Devices on a Remote Network
• What happens when the actual
(ultimate) destination is not on the
same LAN and is remote?
• What happens when PC1 tries to
reach the Web Server?
• Does this impact the network and data
link layers?

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Data Access
Role of the Network Layer Addresses
When the source and destination have
a different network portion, this means
they are on different networks.
• PC1 – 192.168.1
• Web Server – 172.16.1.99

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Data Access
Role of the Data Link Layer Addresses: Different IP Networks
When the final destination is remote, Layer
3 will provide Layer 2 with the local default
gateway IP address, also known as the
router address.
• The default gateway (DGW) is the router
interface IP address that is part of this
LAN and will be the “door” or “gateway” to
all other remote locations.
• All devices on the LAN must be told about
this address or their traffic will be confined
to the LAN only.
• Once Layer 2 on PC1 forwards to the
default gateway (Router), the router then
can start the routing process of getting the
information to actual destination.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Data Access
Role of the Data Link Layer Addresses: Different IP Networks
(Cont.)
• The data link addressing is local
addressing so it will have a source and
destination for each link.
• The MAC addressing for the first
segment is :
• Source – AA-AA-AA-AA-AA-AA
(PC1) Sends the frame.
• Destination – 11-11-11-11-11-11 (R1-
Default Gateway MAC) Receives
the frame.
Note: While the L2 local addressing will
change from link to link or hop to hop, the
L3 addressing remains the same.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Data Access
Data Link Addresses
• Since data link addressing is local addressing, it will have a source and destination for
each segment or hop of the journey to the destination.
• The MAC addressing for the first segment is:
• Source – (PC1 NIC) sends frame
• Destination – (First Router- DGW interface) receives frame

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Data Access
Data Link Addresses (Cont.)
The MAC addressing for the second hop is:
• Source – (First Router- exit interface) sends frame
• Destination – (Second Router) receives frame

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Data Access
Data Link Addresses (Cont.)
The MAC addressing for the last segment is:
• Source – (Second Router- exit interface) sends frame
• Destination – (Web Server NIC) receives frame

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Data Access
Data Link Addresses (Cont.)
• Notice that the packet is not modified, but the frame is changed, therefore the L3 IP
addressing does not change from segment to segment like the L2 MAC addressing.
• The L3 addressing remains the same since it is global and the ultimate destination is still
the Web Server.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60

You might also like