Chapter 2 Network Protocols _ Communication_July 2023
Chapter 2 Network Protocols _ Communication_July 2023
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 2
2.1 Rules of Communication
2.2 Network Protocols and Standards
2.3 Moving Data in the Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
2.1 Rules of
communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Communication begins with a message, or information,
that must be sent from one individual or device to
another
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
2.2 Network Protocols
and Standards
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Network Protocols
-8-
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Example of protocol suites
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
FYI only
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Network Standard Organisations
• Because there are many different manufacturers
of network components, they must all use the
same standards.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
The OSI Reference Model
▪ The OSI reference model provides
an extensive list of functions and
services that can occur at each
layer.
▪ It describes what must be done at a
particular layer, but not prescribing
how it should be accomplished.
▪ It also describes the interaction of
each layer with the layers directly
above and below.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
The TCP/IP Protocol Model
▪ The TCP/IP model is a protocol model because it describes the
functions that occur at each layer of protocols within the TCP/IP
suite.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
OSI and TCP/IP Comparison
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
The Benefits of a Layered Model
▪ Assists in protocol design, because protocols that operate at a specific
layer have defined information that they act upon and a defined
interface to the layers above and below.
-19-
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Protocol and Reference Models
2 types of networking models:
▪ A protocol model provides a model that closely matches the
structure of a particular protocol suite. The hierarchical set of
related protocols in a suite typically represents all the functionality
required to interface the human network with the data network.
Ex: TCP/IP model
-22-
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
OSI Reference Model - Layer 7
▪ The application layer contains
protocols used for process-to-
process communications.
-23-
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
OSI Reference Model - Layer 6
▪ To ensure information from the
sender’s application layer can
be read by the receiver’s
application layer.
-25-
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
OSI Reference Model - Layer 4
▪ The transport layer defines services
to segment, transfer, and
reassemble the data for individual
communications between the end
devices.
-26-
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
▪ Responsible for delivery of
individual packets from source to
destination (host-to-host delivery
possibly across multiple networks)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
2.3 Moving data in the
network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Segmenting messages
▪ Data is divided into smaller, more manageable pieces to send over
the network. This is called segmentation
▪ Segmentation is the process of dividing a stream of data into
smaller units for transmissions over the network.
▪ Two primary benefits:
• Increases speed - Because a large data stream is segmented into packets,
large amounts of data can be sent over the network without tying up a
communications link. This allows many different conversations to be
interleaved on the network called multiplexing.
• Increases efficiency -If a single segment is fails to reach its destination due to
a failure in the network or network congestion, only that segment needs to
be retransmitted instead of resending the entire data stream.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Multiplexing
▪ Multiplexing – interleaving of pieces of separate
communications from different users to share the medium on
the network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Encapsulation and Decapsulation
• As application data is passed down the protocol stack on its way
to be transmitted across the network media, various protocol
information is added at each level. This is known as the
encapsulation process.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
PDU names
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Definition of Encapsulation
▪ Encapsulation – the process by which a computer adds
networking headers and trailers to data from an application
for the eventual transmission of the data onto a transmission
medium – Cisco
When messages are being sent on a network, the encapsulation process
works from top to bottom. At each layer, the upper layer information is
considered data within the encapsulated protocol. For example, the TCP
segment is considered data within the IP packet
The network and data link layers are responsible for delivering the
data from the source device to the destination device
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Layer 3 Logical Address
An IP address is the network layer, or Layer 3, logical address
used to deliver the IP packet from the original source to the final
destination.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Layer 3 Logical Address
The IP packet contains two IP addresses:
•Source IP address - The IP address of the sending device, which
is the original source of the packet.
•Destination IP address - The IP address of the receiving device,
which is the final destination of the packet.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Devices on the same network
• When the sender and receiver of the IP packet are on the
same network, the data link frame is sent directly to the
receiving device.
• On an Ethernet network, the data link addresses are known
as Ethernet Media Access Control (MAC) addresses
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Devices on the same network
Notice that the network portion of the source IPv4 address and the network portion of
the destination IPv4 address are the same and therefore; the source and destination are
on the same network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
MAC addresses are physically embedded on the Ethernet NIC.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Devices on a different network
When the sender of the packet is on a different network from
the receiver, the source and destination IP addresses will
represent hosts on different networks. This will be indicated by
the network portion of the IP address of the destination host.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
When the sender and receiver of the IP packet are on different networks, the
Ethernet data link frame cannot be sent directly to the destination host
because the host is not directly reachable in the network of the sender.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
The Ethernet frame must be sent to another device known as the router or
default gateway. In our example, the default gateway is R1.
• R1 has an Ethernet data link address that is on the same network as PC1.
This allows PC1 to reach the router directly.
•Source MAC address - The Ethernet MAC address of the sending device,
PC1. The MAC address of the Ethernet interface of PC1 is AA-AA-AA-AA-AA-
AA.
•Destination MAC address - When the receiving device, the destination IP
address, is on a different network from the sending device, the sending
device uses the Ethernet MAC address of the default gateway or router. In
this example, the destination MAC address is the MAC address of the R1
Ethernet interface, 11-11-11-11-11-11. This is the interface that is attached
to the same network as PC1.
The Ethernet frame with the encapsulated IP packet can now be transmitted to R1. R1 forwards
the packet to the destination, Web Server. This may mean that R1 forwards the packet to
another router or directly to Web Server if the destination is on a network connected to R1.
It is important that the IP address of the default gateway be configured on each host on the local
network. All packets to a destination on remote networks are sent to the default gateway.
Ethernet MAC addresses and the default gateway are discussed in more detail in other modules.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Data Link Layer addresses
• The data link Layer 2 physical address has a different role. The
purpose of the data link address is to deliver the data link frame
from one network interface to another network interface on the
same network.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
IP address and MAC addresses
Example of changes of Data link layer
addresses during transmission across different
networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
• As the IP packet travels from host-to-router, router-to-router, and finally
router-to-host, at each point along the way the IP packet is encapsulated in
a new data link frame.
• Each data link frame contains the source data link address of the NIC card
sending the frame, and the destination data link address of the NIC card
receiving the frame.
• The Layer 2, data link protocol is only used to deliver the packet from NIC-
to-NIC on the same network. The router removes the Layer 2 information
as it is received on one NIC and adds new data link information before
forwarding out the exit NIC on its way towards the final destination.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Data Link Layer Address Network Layer address
Mac Address IP address
Transmit frame from NIC to Transmit packets from
NIC source destination to final
destination
Changes for each link No change
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56