Lecure#2 - Fundamentals
Lecure#2 - Fundamentals
Network Architecture
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
The Rules
Communications Fundamentals
Networks can vary in size and complexity. It is not enough to have a connection, devices
must agree on “how” to communicate.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
The Rules
Communications Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
The Rules
Rule Establishment
• Individuals must use established rules or agreements to govern the conversation.
• The first message is difficult to read because it is not formatted properly. The second
shows the message properly formatted
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
The Rules
Rule Establishment (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
The Rules
Network Protocol Requirements
Protocols must account for the following requirements:
• An identified sender and receiver
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements
Common computer protocols must be in agreement and include the following requirements:
• Message encoding
• Message formatting and encapsulation
• Message size
• Message timing
• Message delivery options
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
The Rules
Message Encoding
• Encoding is the process of converting information into another acceptable form for transmission.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
The Rules
Message Formatting and Encapsulation
• Message formats depend on the type of message and the channel that is used to deliver the
message.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
The Rules
Message Size
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
The Rules
Message Timing
Message timing includes the following:
• Flow Control – Manages the rate of data transmission and defines how much information
can be sent and the speed at which it can be delivered.
• Response Timeout – Manages how long a device waits when it does not hear a reply from
the destination.
§ There may be various rules governing issues like “collisions”. This is when more than one
device sends traffic at the same time and the messages become corrupt.
§ Some protocols are proactive and attempt to prevent collisions; other protocols are reactive
and establish a recovery method after the collision occurs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
The Rules
Message Delivery Options
Message delivery may one of the following methods:
Note: Broadcasts are used in IPv4 networks, but are not an option for IPv6. Later we will
also see “Anycast” as an additional delivery option for IPv6.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
The Rules
A Note About the Node Icon
• Documents may use the node icon , typically a circle, to represent all devices.
• The figure illustrates the use of the node icon for delivery options.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
2.2 Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Protocols
Network Protocol Overview
• Can be implemented on devices Network Security secure data to provide authentication, data
in: Software, Hardware, or Both integrity, and data encryption
Routing enable routers to exchange route
• Protocols have their own: information, compare path information, and
Function, Format, Rules select best path
Service Discovery used for the automatic detection of devices
or services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Protocols
Network Protocol Functions
• Devices use agreed-upon protocols to
communicate .
Function Description
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Protocols
Protocol Interaction
Protocol Function
Hypertext Transfer Protocol (HTTP) § Governs the way a web server and a web client interact
§ Defines content and format
Transmission Control Protocol (TCP) § Manages the individual conversations
§ Provides guaranteed delivery
§ Manages flow control
Internet Protocol (IP) Delivers messages globally from the sender to the receiver
Ethernet Delivers messages from one NIC to another NIC on the same LAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
2.3 Protocol Suites
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Protocol Suites
Network Protocol Suites
Protocol suite:
• A group of inter-related protocols necessary to
perform a communication function
• Sets of rules that work together to help solve a
problem
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Protocol Suites
Evolution of Protocol Suites
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Protocol Suites
TCP/IP Protocol Example
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Protocol Suites
TCP/IP Protocol Suite
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Protocol Suites
TCP/IP Communication Process
• A web server encapsulating and sending • A client de-encapsulating the web page
a web page to a client. for the web browser
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
2.4 Standards Organizations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Standards Organizations
Open Standards
Open standards encourage:
• interoperability
• competition
• innovation
• non-profit organizations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Standards Organizations
• Internet Society (ISOC) - Promotes
Internet Standards the open development and evolution of
internet
• Internet Architecture Board (IAB) -
Responsible for management and
development of internet standards
• Internet Engineering Task Force
(IETF) - Develops, updates, and
maintains internet and TCP/IP
technologies
• Internet Research Task Force
(IRTF) - Focused on long-term
research related to internet and
TCP/IP protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Standards Organizations
Internet Standards (Cont.)
Standards organizations involved with the
development and support of TCP/IP
• Internet Corporation for Assigned
Names and Numbers (ICANN) -
Coordinates IP address allocation, the
management of domain names, and
assignment of other information
• Internet Assigned Numbers Authority
(IANA) - Oversees and manages IP
address allocation, domain name
management, and protocol identifiers
for ICANN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Standards Organizations
Electronic and Communications Standards
• Institute of Electrical and Electronics Engineers (IEEE, pronounced “I-triple-E”)
- dedicated to creating standards in power and energy, healthcare,
telecommunications, and networking
• Electronic Industries Alliance (EIA) - develops standards relating to electrical
wiring, connectors, and the 19-inch racks used to mount networking equipment
• Telecommunications Industry Association (TIA) - develops communication
standards in radio equipment, cellular towers, Voice over IP (VoIP) devices,
satellite communications, and more
• International Telecommunications Union-Telecommunication
Standardization Sector (ITU-T) - defines standards for video compression,
Internet Protocol Television (IPTV), and broadband communications, such as a
digital subscriber line (DSL)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
2.5 Reference Models
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Reference Models
The Benefits of Using a Layered Model
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Reference Models
The Benefits of Using a Layered Model (Cont.)
These are the benefits of using a layered model:
• Assist in protocol design because protocols that operate at a specific layer have
defined information that they act upon and a defined interface to the layers above
and below
• Foster competition because products from different vendors can work together
• Prevent technology or capability changes in one layer from affecting other layers
above and below
• Provide a common language to describe networking functions and capabilities
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Reference Models
The OSI Reference Model
OSI Model Layer Description
7 - Application Contains protocols used for process-to-process communications.
Provides for common representation of the data transferred between application
6 - Presentation
layer services.
5 - Session Provides services to the presentation layer and to manage data exchange.
Defines services to segment, transfer, and reassemble the data for individual
4 - Transport
communications.
3 - Network Provides services to exchange the individual pieces of data over the network.
2 - Data Link Describes methods for exchanging data frames over a common media.
1 - Physical Describes the means to activate, maintain, and de-activate physical connections.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Reference Models
The TCP/IP Reference Model
TCP/IP Model
Description
Layer
Application Represents data to the user, plus encoding and dialog control.
Network Access Controls the hardware devices and media that make up the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Reference Models
OSI and TCP/IP Model Comparison
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Lab Activity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Data Encapsulation
Segmenting Messages
Segmenting is the process of breaking up
messages into smaller units. Multiplexing is
the processes of taking multiple streams of
segmented data and interleaving them
together.
Segmenting messages has two primary
benefits:
• Increases speed - Large amounts of data can
be sent over the network without tying up a
communications link.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Data Encapsulation
Sequencing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Data Encapsulation
Protocol Data Units
Encapsulation is the process where protocols
add their information to the data.
• At each stage of the process, a PDU has a
different name to reflect its new functions.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Lab Activity