0% found this document useful (0 votes)
5 views

Module 3 Protocols&Models 2025

Module 3 covers network protocols and models, explaining their importance in enabling communication between devices. It discusses the types of rules necessary for communication, the role of standards organizations, and the TCP/IP and OSI models for standardization. Additionally, it outlines the functions of various protocols and the layered approach used in protocol suites.

Uploaded by

flying kite
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Module 3 Protocols&Models 2025

Module 3 covers network protocols and models, explaining their importance in enabling communication between devices. It discusses the types of rules necessary for communication, the role of standards organizations, and the TCP/IP and OSI models for standardization. Additionally, it outlines the functions of various protocols and the layered approach used in protocol suites.

Uploaded by

flying kite
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 73

Module 3: Protocols and Models

Introduction to Networks 7.0


(ITN)
Module Objectives
Module Title: Protocols and Models
Module Objective: Explain how network protocols enable devices to access local and remote
network resources.
Topic Title Topic Objective
The Rules Describe the types of rules that are necessary to successfully communicate.

Protocols Explain why protocols are necessary in network communication.

Protocol Suites Explain the purpose of adhering to a protocol suite.

Standards Organizations Explain the role of standards organizations in establishing protocols for network
interoperability.

Reference Models Explain how the TCP/IP model and the OSI model are used to facilitate
standardization in the communication process.

Data Encapsulation Explain how data encapsulation allows data to be transported across the
network.
Data Access Explain how local hosts access local resources on a network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
3.1 The Rules

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
The Rules
Communications Fundamentals
Networks can vary in size and complexity. It is not enough to
have a connection; devices must agree on “how” to communicate.
There are three elements to any communication:

• There will be a source (sender).


• There will be a destination (receiver).
• There will be a channel (media) that provides for the path of
communications to occur.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
The Rules
Communications Protocols
• All communications are governed by protocols.
• Protocols are the rules that communications will follow.
• These rules will vary depending on the protocol.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
The Rules (Rule Establishment)
• Individuals must use established rules or agreements to govern the
conversation.
• The first message is difficult to read because it is not formatted properly. The
second shows the message properly formatted

6
The Rules
Rule Establishment (Cont.)
Protocols must account for the following requirements:

• An identified sender and receiver


• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
The Rules
Network Protocol Requirements
Common computer protocols must be in agreement and include the following
requirements:
1-Message encoding
2-Message formatting and encapsulation
3-Message size
4-Message timing
5-Message delivery options

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
The Rules
1-Message Encoding

• Encoding is the process of converting information into another acceptable form for
transmission.
• Decoding reverses this process to interpret the information.

9
The Rules
2-Message Formatting and Encapsulation
• When a message is sent, it must use a specific format or structure.

• Message formats depend on the type of message and the channel that is used to
deliver the message.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
The Rules
3-Message Size
Encoding between hosts must be in an appropriate format for the medium.
• Messages sent across the network are converted to bits ( 0 or 1)
• The bits are encoded into a pattern of light, sound, or electrical impulses.
• The destination host must decode the signals to interpret the message.

01011010

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
The Rules 4-Message Timing

Message timing includes the following:


Flow Control – Manages the rate of data transmission and defines how much information can be sent and the
speed at which it can be delivered.
Response Timeout – Manages how long a device waits when it does not hear a reply from the destination.
Access method - Determines when someone can send a message.
• There may be various rules governing issues like “collisions”. This is when more than one device sends traffic
at the same time and the messages become corrupt.

• Some protocols are proactive and attempt to prevent collisions; other protocols are reactive and
establish a recovery method after the collision occurs.
Congestion occurs when the demand for bandwidth exceeds the amount available. Network
bandwidth is measured in the number of bits that can be
transmitted in a single second, or bits per second (bps)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
The Rules 5-Message Delivery Options

Message delivery may one of the following methods:


• Unicast – one to one communication (email to an individual)

• Multicast – one to many, typically not all (teacher send email to


• his/her class)

• Broadcast – one to all ( radio message to everyone)

Note: Broadcasts are used in IPv4 networks, but are not an option for Pv6.
Later we will also see “Anycast” as an additional delivery option for IPv6. 13
Types of Data Transmissions

Unicast Broadcast

Multicast
The Rules
A Note About the Node Icon
• Documents may use the node icon , typically a circle, to represent all devices.

• The figure illustrates the use of the node icon for delivery options.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
3.2 Protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Protocols
Network Protocol Overview
Network protocols define a common
Protocol Type Description
set of rules.
• Can be implemented on devices in:
Network enable two or more devices to communicate
• Software Communications over one or more networks
TCP/IP
• Hardware
Network Security secure data to provide authentication,
• Both data integrity, and data encryption
• Protocols have their own:
Routing enable routers to exchange route
• Function information, compare path information, and
• Format select best path
Service used for the automatic detection of
• Rules Discovery devices or services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Protocols Network Protocol Functions
• Devices use agreed-upon protocols to communicate .

• Protocols may have one of theses functions:

Function Description

Addressing Identifies sender and receiver

Reliability Provides guaranteed delivery

Flow Control Ensures data flows at an efficient rate

Sequencing Uniquely labels each transmitted segment of data

Error Detection Determines if data became corrupted during transmission

Application Interface Process-to-process communications between network applications


© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Protocols
Protocol Interaction
• Networks require the use of severall protocols. Web page

Guaranteed
• Each protocol has its own function and format.
192.168.1.24

10101

Protocol Function
Hypertext Transfer  Governs the way a web server and a web client interact
Protocol (HTTP)  Defines content and format

Transmission Control  Manages the individual conversations


Protocol (TCP)  Provides guaranteed delivery
 Manages flow control

Internet Protocol (IP) Delivers messages globally from the sender to the receiver 192.168.1.24
NIC:Network Interface Card, NIC has uniqie MAC adress
Ethernet Delivers messages from one NIC to another NIC onCiscothe
© 2016 and/orsame Ethernet
its affiliates. All Local
rights reserved. Cisco Confidential 19

Area Network (LAN) 0101011 00111001


3.3 Protocol Suites
TCP/IP (Transmission Control Protocol/Internet protocol

Video to watch 5 M

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Protocol Suites
Network Protocol Suites
Protocols must be able to work with other protocols.
Protocol suite:
• A group of inter-related protocols necessary to perform a communication function
• Sets of rules that work together to help solve a problem
The protocols are viewed in terms of layers:
• Higher Layers
• Lower Layers- concerned with moving
data and provide services to upper layers
Layered Approach: Protocols are organized
into layers, with each layer responsible for
specific tasks. ​ For example, the TCP/IP model has four layers: Application, Transport, Internet, and
Network Access. ​ Each layer interacts with
the layers directly above and below it. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Example of Common Protocols include:

 Transmission Control Protocol/Internet Protocol (TCP/IP): The most


common protocol suite, maintained by the Internet Engineering Task
Force (IETF). It includes protocols such as HTTP, TCP, IP, and
Ethernet.
 Open Systems Interconnection (OSI) Protocols: Developed by the
International Organization for Standardization (ISO) and the
International Telecommunications Union (ITU).
 NetBIOS Enhanced User Interface (NetBEUI) : Proprietary suite
developed by Novell Inc. The last two not widly used
 AppleTalk : A proprietary suite released by Apple Inc.
Protocol Suites (common protocols)
Evolution of Protocol Suites
There are several protocol suites.
• 1-Internet Protocol Suite or TCP/IP- Transmission Control
Protocol/Internet Protocol. The most common protocol suite
and maintained by the Internet Engineering Task Force
(IETF)

• 2-Open Systems Interconnection (OSI) protocols-


Developed by the International Organization for
Standardization (ISO) and the International
Telecommunications Union (ITU)

• 3-AppleTalk- Proprietary suite release by Apple Inc.

• 4-Novell NetWare- Proprietary suite developed


by Novell Inc.

• 5- NetBeui (NetBIOS Extended User Interface):


Windows protocol
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Protocol Suites
TCP/IP Protocol Example
• TCP/IP protocols operate at the application, transport, and internet layers.

• The most common network access layer LAN protocols are Ethernet and WLAN
(wireless LAN).

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Protocol Suites
TCP/IP Protocol Suite
• TCP/IP is the protocol suite used by the internet and includes many protocols.

• TCP/IP is:

• An open standard protocol suite that


is freely available to the public and can be
used by any vendor
• A standards-based protocol suite that
is endorsed by the networking industry
and approved by a standards
organization to ensure interoperability

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Protocol Suites TCP/IP Communication Process
• A web server encapsulating and sending a • A client de-encapsulating the web page for
web page to a client. the web browser
Encapsulation De-capsulation

Encapsulation
De-capsulation

26
3.4 Standards Organizations

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Standards Organizations
Open Standards
Open standards encourage:
• interoperability

• competition

• innovation

Standards organizations are:


• vendor-neutral

• non-profit organizations

• established to develop and promote the


concept of open standards.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Standards Organizations
• Internet Society (ISOC) - Promotes the open
Internet Standards
development and evolution of internet
• Internet Architecture Board (IAB) -
Responsible for management and
development of internet standards
• Internet Engineering Task Force (IETF) -
Develops, updates, and maintains internet
and TCP/IP technologies
• Internet Research Task Force (IRTF)
- Focused on long-term research
related to internet and TCP/IP protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Standards Organizations
Internet Standards (Cont.)
Standards organizations involved with the
development and support of TCP/IP
• Internet Corporation for Assigned Names
and Numbers (ICANN) - Coordinates IP
address allocation, the management of
domain names, and assignment of other
information
• Internet Assigned Numbers Authority (IANA)
- Oversees and manages IP address allocation,
domain name management, and protocol
identifiers for ICANN

Domain name example:


http://algonquinquincollege.com
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Standards Organizations
Electronic and Communications Standards
• Institute of Electrical and Electronics Engineers (IEEE, pronounced “I-triple-E”)
- dedicated to creating standards in power and energy, healthcare,
telecommunications, and networking.
• Electronic Industries Alliance (EIA) - develops standards relating to electrical
wiring, connectors, and the 19-inch racks used to mount networking equipment
• Telecommunications Industry Association (TIA) - develops communication
standards in radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite
communications, and more
• International Telecommunications Union-Telecommunication Standardization
Sector (ITU-T) - defines standards for video compression, Internet Protocol
Television (IPTV), and broadband communications, such as a digital subscriber line
(DSL)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
3.5 Reference Models OSI Models

Video to watch 5 M

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Reference Models
The Benefits of Using a Layered Model

Complex concepts such as how a


network operates can be difficult to
explain and understand. For this
reason, a layered model is used.
Two layered models describe network
operations:
• Open System Interconnection (OSI)
Reference Model
• TCP/IP Reference Model

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Reference Models
The Benefits of Using a Layered Model (Cont.)
These are the benefits of using a layered model:
• Assist in protocol design because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below
• Foster competition because products from different vendors can work together

• Prevent technology or capability changes in one layer from affecting other layers above
and below
• Provide a common language to describe networking functions and capabilities

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
The OSI Reference Model
All People Seem To Need Domino Pizza
OSI Model Description
Layer
7 - Application Contains protocols used for process-to-process communications.
Provides for common representation of the data transferred between
6 - Presentation
application layer services.

5 - Session Provides services to the presentation layer and to manage data


exchange.
Defines services to segment, transfer, and reassemble the data
4 - Transport
for individual communications.

3 - Network Provides services to exchange the individual pieces of data over the
network.

2 - Data Link Describes methods for exchanging data frames over a common media.

1 - Physical Describes the means to activate, maintain, and de-activate physical


© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
connections.
OSI model sub-protocols
Application layer: The user initiates a message at this level. (writing an email, or download a picture, upload a file)

HTTP: Hypertext Transfer Protocol. Pulls a web page from a web server.
It uses TCP (guaranteed connection) protocol to communicate with the web server first.
DNS: Domain Name System: The user pings a URL in the CMD
It resolves a URL (Universal Resource Locator) to an IP address.
Example: cisco.com= 72.163.4.185
DHCP: Dynamic Host Configuration Protocol. Your PC looks for an IP address.
It provides an IP address automatically to the end device like a PC or printer.
FTP: File Transport Protocol. A user tries to download or upload a file
It downloads and uploads files from another pc, like a uTorrent computer.
Presentation layer:
It specifies the data type. It checks if the data is a text, picture, or voice.
It encrypts the message as well.
Session layer:
Session: It maintains the connection between two devices.
Transport layer manages traffic between two devices.
TCP: Transport Control Protocol: guaranteed connection (three handshake communication. It is a
email use TCP connection-oriented protocol. Sequency packets number
UDP: User Datagram Protocol. No guaranteed connection. Used for voice, video, and data
streaming. It is a connectionless protocol.
OSI model sub-protocols cont.
Network layer provides an IP address. The router works at this layer.
Breaking up segments into network packets and reassembling the packets on
the receiving end.
Routing packets by discovering the best path across a physical network.
IPv4 and IPv6 address.
ICMP: Internet Control Message Protocol (ping uses this protocol to have echo
Request and echo Reply.
Data link layer works with physical address (MAC). Ethernet frames. Switches work at
this layer.
LLC: talks to the upper layer like the network layer. it controls the synchronization,
flow control, and error checking functions of the data link layer.
MAC: check the MAC address
Physical layer: change the message to bits and send it to another PC. Cables, and hub work
at this layer
OSI and TCP model Encapsulation

Encapsulation
Reference Models
The TCP/IP Reference Model
TCP/IP
Description
Layer
Application Represents data to the user, plus encoding and dialog control.

Transport Supports communication between various devices across diverse networks.

Internet Determines the best path through the network.

Network Controls the hardware devices and media that make up the network.
Access

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Reference Models
OSI and TCP/IP Model Comparison

• The OSI model divides the network


access layer and the application
layer of the TCP/IP model into
multiple layers.
• The TCP/IP protocol suite does not
specify which protocols to use when
transmitting over a physical medium.
• OSI Layers 1 and 2 discuss the
necessary procedures to access the
media and the physical means to
send data over a network.Sending bits

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
3.6 Data Encapsulation

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Data Encapsulation
Segmenting Messages Segmenting is the process of breaking up messages
into smaller units.
Multiplexing is the processes of taking multiple streams
of segmented data and interleaving them together.
Segmenting messages has two primary benefits:
• Increases speed - Large amounts of data can be
sent over the network without tying up a
communications link.
• Increases efficiency - Only segments
which fail to reach the destination need to be
retransmitted, not the entire data stream.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Data Encapsulation
Sequencing
Sequencing messages is the process of numbering the segments so that the
message may be reassembled at the destination. numbering packets
TCP is responsible for sequencing the individual segments.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Data Encapsulation Protocol Data Units(PDU)
Encapsulation is the process where protocols add
Hello Mike their information to the data.
• At each stage of the process, a PDU has a
different name to reflect its new functions.
• There is no universal naming convention for
PDUs, in this course, the PDUs are named
according to the protocols of the TCP/IP
suite.
• PDUs passing down the stack are as follows:

data
1. Data (Data Stream)

S
P 1. Segment
F 2. Packet
B 3. Frame © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44

4. Bits (Bit Stream)


Data Encapsulation
Encapsulation Example
• Encapsulation is a top down process.

• The level above does its process and


then passes it down to the next level
of the model. This process is
repeated by each layer until it is sent
out as a bit stream.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Data Encapsulation
Encapsulation Example

A frame check sequence (FCS) is an error-detecting code added to a frame in a communication protocol
Data Encapsulation
De-encapsulation Example
• Data is de-encapsulated as it moves up
the stack.
• When a layer completes its process,
that layer strips off its header and
passes it up to the next level to be
processed. This is repeated at each
layer until it is a data stream that the
application can process.
1. Received as Bits (Bit Stream)
2. Frame
3. Packet
4. Segment
5. Data (Data Stream)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Encapsulation and decapsulation process

Encapsulation De-capsulation
3.7 Data Access: MAC address

Video1 to watch 8 M

Video2 to watch 6 M: Mac


address explained
https://www.youtube.com/watc
h?v=TIiQiw7fpsU
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Data Access: Addresses ip and mac addresses

Both the data link and network layers use addressing to deliver data from source to
destination
Network layer source and destination addresses - Responsible for delivering the IP packet
from original source to the final destination.
(192.168.1.15)
Data link layer source and destination addresses – Responsible for delivering the data link
frame from one network interface card (NIC) to another NIC on the same network.
00 1A 3F F1 4C C6

50
Network layer: source and Destination IP address
ICMP: Internet Control Message Protocol

Ip
Data link: Source and Destination MAC address (Frame)
ARP: Address Resolution Protocol

ARP
Data Access
Layer 3 Logical Address (Network layer)
IP address ia logical address

The IP packet contains two IP addresses:


• Source IP address - The IP address of the
sending device, original source of the packet.

• Destination IP address - The IP address of the


receiving device, final destination of the packet.
These addresses may be on the same link (network) or
remote. Source
Address

IP Packet Destination
Address
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Data Access
Layer 3 (network layer) Logical Address
(Cont.)
An IP address contains two parts:
• Network portion (IPv4) or Prefix (IPv6)
• The left-most part of the address indicates the network
group which the IP address is a member.
• 192.168.1.110
172.16.1.99
• Each LAN or WAN will have the same network portion.
• Host portion (IPv4) or Interface ID (IPv6)
• The remaining part of the address identifies a specific device
within the group.
192.168.1.15
• This portion is unique for each device on the network. Network Host
54
Data Access (network layer)
Devices on the Same Network ( Local IP address)
When devices are on the same network the source and destination will have the same number in
the network portion of the address.
• PC1 – 192.168.1.110
• FTP Server – 192.168.1.9

Default getaway

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Data Access (network layer)
Devices on a Remote Network
• What happens when the actual
(ultimate) destination is not on the
same LAN and is remote?
• What happens when PC1 tries to
reach the Web Server?
• Does this impact the network and data
link layers?

Note: MAC address changes


IP address never changes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Data Access
Role of the Network Layer Addresses Remote
When the source and destination have
a different network portion, this means
they are on different networks.
• PC1 – 192.168.110
• Web Server – 172.16.1.99

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Data Access
Role of the Data Link (MAC) Layer Addresses: Same IP Network (local
When devices are on the same Ethernet
network the data link frame will use the
actual MAC address of the destination NIC.
MAC addresses are physically embedded into
the Ethernet NIC and are local addressing.
• The Source MAC address will be that of
the originator on the link.
• The Destination MAC address will
always be on the same link as the
source, even if the ultimate destination
is remote.
Local network

broadcast
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Data Access
Role of the Data Link Layer Addresses (MAC): Different IP Networks (Remote)
When the final destination (computer) is
remote, Layer 3 will provide Layer 2 with the
local default gateway IP address, also known
as the router address. (192.168.1.1)
• The default gateway (DGW) is the router
interface IP address that is part of this
LAN and will be the “door” or “gateway” to
all other remote locations in internet.

• All devices on the LAN must be told about


this address or their traffic will be confined
to the LAN only.

• Once Layer 2 on PC1 forwards to the


default gateway (Router), the router then
can start the routing process of getting the
information to actual destination. Note: MAC address never passes through the router
It is always local
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Source and destination address (Remote)
Default Gateway

Video to watch 6 M: Default Gateway


Explained
https://www.youtube.com/watch?v=pCcJFdYNamc

Source and destination address

https://www.youtube.com/watch?
v=pCcJFdYNamc
Data Access
Role of the Data Link Layer Addresses: Different IP Networks (Cont.)

• The data link addressing is local


addressing so it will have a source and
destination for each link. (Local)
• The MAC addressing for the first
segment is :
• Source – AA-AA-AA-AA-AA-AA
(PC1) Sends the frame.
• Destination – 11-11-11-11-11-11 (R1-
Default Gateway MAC) Receives the
frame.
Note: While the L2 local addressing will
change from link to link or hop to hop, the Remote: Mac address changes for each link
L3 addressing remains the same. IP address stays the same
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Data Access
Data Link Addresses
• Since data link addressing is local addressing, it will have a source and destination for each
segment or hop of the journey to the destination.
• The MAC addressing for the first segment is:
• Source – (PC1 NIC) sends frame
• Destination – (First Router- DGW
• interface) receives frame

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Data Access
Data Link Addresses (Cont.)
The MAC addressing for the second hop is:
• Source – (First Router- exit interface) sends frame
• Destination – (Second Router) receives frame

source source
source

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Data Access
Data Link Addresses (Cont.)
The MAC addressing for the last segment is:
• Source – (Second Router- exit interface) sends frame
• Destination – (Web Server NIC) receives frame

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Data Access
Data Link Addresses (Cont.)
• Notice that the packet (IP address) is not modified, but the frame (Mac address) is changed,
therefore the L3 IP addressing does not change from segment to segment like the L2 MAC
addressing.
• The L3 addressing remains the same since it is global and the ultimate destination is still the Web
Server.

Remote: Mac address changes


IP address the same

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
MAC and IP addresses

 MAC (Media Access Control fc-45-ad-2d-67-aa  IP (Internet protocol) 192.168.3.45


 Physical (burn in)  Logical (ISP provided)
 Never changes (other networks)  Changes (other networks)
 48 bits  32 bits
 Hexadecimal  Decimal
 ARP Broadcast  No broadcast
 local identification (LAN)  global identification (WAN)
 Works at layer 2 OSI  Works at layer 3 OSI
 Works with switch  Works with router
 Who you are (Mike)  Where you are (Woodroffe)
Module Practice and Quiz
What did I learn in this module?
The Rules
• Protocols must have a sender and a receiver.
• Common computer protocols include these requirements: message encoding, formatting and
encapsulation, size, timing, and delivery options.
Protocols
• To send a message across the network requires the use of several protocols.
• Each network protocol has its own function, format, and rules for communications.
Protocol Suites
• A protocol suite is a group of inter-related protocols.
• TCP/IP protocol suite are the protocols used today.
Standards Organizations
• Open standards encourage interoperability, competition, and innovation.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Module Practice and Quiz
What did I learn in this module? (Cont.)
Reference Models
• The two models used in networking are the TCP/IP and the OSI model.
• The TCP/IP model has 4 layers and the OSI model has 7 layers.
Data Encapsulation
• The form that a piece of data takes at any layer is called a protocol data unit (PDU).
• There are five different PDUs used in the data encapsulation process: data, segment, packet, frame,
and bits
Data Access
• The Network and Data Link layers are going to provide addressing to move data through the
network.
• Layer 3 will provide IP addressing and layer 2 will provide MAC addressing.
• The way these layers handle addressing will depend on whether the source and the destination
are on the same network or if the destination is on a different network from the source.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Ethernet cable
Cables types
Straight Thru ________pc to switch
pc to Hub
switch to router

Cross over _ _ _ _ _ _ Pc to pc
Pc to router
Server to router
Hub to hub
Switch to switch
Router to router
Roll over Pc to router console
Serial connection- WAN

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Why we are using a crossover cable between the Router and the PC?
Both Routers and PCs use the same two wires to send (TX), and two wires to receive (TX ) RX1.
Straight Crossover
TX1=Transmit RX1=Receive TX1=Transmit Rx3= Receive
TX2=Transmit RX2=Receive TX2=Transmit Rx6=Receive
RX3= Receive TX3=Transmit RX3=Receive TX1=Transmit
RX6= Receive TX6=Transmit RX9=Receive TX2=Transmit
Why we are using two IP and MAC addresses in our computers?

IP Address (Internet Protocol) MAC address (Media Access Control)


An IP address is a logical number (Decimal). MAC address is a physical number (Hexadecimal).
It works in layer 3 (Network layer) of the OSI
It works in the layer 2 (Datalink)of the OSI model
model.
It changes, when you move the computer to It never changes even if you move the computer
another network to another network.
it identifies the device globally (internet) It identifies a device to other devices on the
It is routable
same local network
192.168.3.10 MAC address is burned into the NIC chip.
It is not routable
3C-58-C2-F5-88-95

You might also like