Networking Essentials 2.0 Module11
Networking Essentials 2.0 Module11
Services
Instructor Materials
Networking Essentials (NETESS v2.0)
Instructor Materials – Module 11 Planning Guide
Note: Remove the Planning Guide from this presentation before sharing with anyone.
For additional help and resources go to the Instructor Home Page and Course Resources for this
course. You also can visit the professional development site on netacad.com, the official Cisco
Networking Academy Facebook page, or Instructor Only FB group.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What to Expect in this Module
To facilitate learning, the following features within the GUI may be included in this module:
Feature Description
Check Your Understanding (CYU) Per topic online quiz to help learners gauge
content understanding.
Labs Labs designed for working with physical
equipment.
Packet Tracers Simulation and modeling activities designed to
explore, acquire, reinforce, and expand skills.
Module Quizzes Self-assessments that integrate concepts and
skills learned throughout the series of topics
presented in the module.
Module Summary Briefly recaps module content.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Check Your Understanding
• Check Your Understanding activities are designed to let students quickly determine if they
understand the content and can proceed, or if they need to review.
• There are no separate slides for these activities in the PPT. They are listed in the notes area
of the slide that appears before these activities.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 11: Activities
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 11: Activities (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 11: Best Practices
Prior to teaching Module 11, the instructor should:
• Review the activities and assessments for this module.
• Try to include as many questions/activities as possible to keep students engaged during classroom
presentation.
Topic 11.1
• Compare and contrast peer-to-peer and client/server model.
• Illustrate the process of a web client request to a web server, from web request using an URL, DNS
resolving domain name to IP address, through the internet, and reaching the web server. Use a video
or animation to help students understand the process.
• Use several examples to illustrate the concept of URI, URN, and URL.
• Demonstrate PT activity in 11.1.6 with simulation mode and review different packets.
Topic 11.2
• Discuss the DHCPv4 operation details. Emphasize the delivery mode for each step (broadcast and
unicast)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 11: Best Practices (Cont.)
Topic 11.2
• Review the TCP/IP layered protocols.
• Compare and contrast between TCP and UDP.
• Use 11.2.4 animation or similar content video to explain TCP features.
• Use multiple examples to explain appropriate use cases of TCP and UDP.
Topic 11.3
• Ask students how they use internet resources in daily life. Do they always close an application
before opening another application? If multiple applications are open, for example, multiple web
sessions are open, how each web browser window manages the ongoing conversations for the
session?
• Emphasize that while the destination port is typically predefined, the source port is dynamically
generated, which leads to the discussion “if a user opens multiple web browsers to visit the same
web server, how are the conversations identified and maintained?” Use the netstat command to
illustrate.
• Create practice quizzes for students to self-assess the knowledge of port numbers.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 11: Transport
Layer Services
TCP and UDP Compare TCP and UDP transport layer functions.
Port Numbers Explain how TCP and UDP use port numbers.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11.1 The Client Server
Relationship
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Client Server Relationship
Client and Server Interaction
• We use network services available over networks and the internet to communicate with others
and to perform routine tasks
• A server is a host running a software application (or server service) that provides services to
other hosts (clients)
• There are millions of servers on the internet. Clients and servers interact following agreed upon
standards and protocols
Type Description
Email The email server runs email server software. Clients use mail client software,
such as Microsoft Outlook, to access email on the server.
Web The web server runs web server software. Clients use browser software, such as
Windows Internet Explorer, to access web pages on the server.
File The file server stores corporate and user files in a central location. The client
devices access these files with client software such as the Windows File Explorer.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Client Server Relationship
Video - Web Traffic in Packet Tracer
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Client Server Relationship
Client Requests a Web Page
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Client Server Relationship
URI, URN, and URL
Uniform Resource Name (URN) - identifies only the namespace of the resource without reference to the
protocol
Uniform Resource Locator (URL) - defines the network location of a specific resource on the network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Client Server Relationship
Video - Web Server and Client IP Interactions
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Client Server Relationship
Packet Tracer - The Client Interaction
In this activity, you will observe the client interaction between the server and
PC.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11.2 TCP and UDP
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
TCP and UDP
Protocol Operations
A web server and a web client use specific protocols and standards in the process of exchanging
information to ensure that the messages are received and understood. The various protocols
necessary to deliver a web page function at the four different layers of the TCP/IP model are as
follows:
• Application Layer Protocol - Hypertext Transfer Protocol (HTTP) governs the way that a web
server and a web client interact.
• Transport Layer Protocol - Transmission Control Protocol (TCP) ensures that IP packets are
sent reliably, and any missing packets are resent.
• Internetwork Layer Protocol - The most common internetwork protocol is Internet Protocol (IP)
which is used to identify end hosts and to route packets to destination host.
• Network Access Layer - The specific protocol at the network access layer, such as Ethernet,
depends on the type of media and transmission methods used in the physical network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
TCP and UDP
Video - TCP and UDP Operation
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
TCP and UDP
TCP and UDP
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
TCP and UDP
UDP Best Effort Delivery
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11.3 Port Numbers
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Port Numbers
Video - Transport Layer Port Numbers
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Port Numbers
TCP and UDP Port Numbers
• When a message is delivered using either TCP or UDP, the protocols and services requested are
identified by a port number.
• A port is a numeric identifier within each segment that is used to keep track of specific
conversations between a client and server.
• Every message that a host sends contains both a source and destination port.
• Ports are assigned and managed by an organization known as the Internet Corporation for
Assigned Names and Numbers (ICANN). Ports are broken into three categories and range in
number from 1 to 65,535:
• Well-Known Ports - Destination ports that are associated with common network
applications. These ports are in the range of 1 to 1023.
• Registered Ports - Ports 1024 through 49151 can be used as either source or destination
ports.
• Private Ports - Ports 49152 through 65535 are often used as source ports. These ports can
be used by any application.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Port Numbers
TCP and UDP Port Numbers (Cont.)
Some Common Well-Known Port Numbers
23 TCP Telnet
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Port Numbers
TCP and UDP Port Numbers (Cont.)
Some Common Well-Known Port Numbers
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Port Numbers
Destination and Source Port Numbers
The source port number is associated with the originating application on the local sending host. The
destination port number is associated with the destination application on the remote host.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Port Numbers
Socket Pairs
The source and destination ports are placed within the segment PDU. It is encapsulated within an IP
packet which contains the IP address of the source and destination. The combination of the source IP
address and source port number, or the destination IP address and destination port number is known as a
socket.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Port Numbers
The netstat Command
• On a PC, the command netstat lists the protocols in use, the local address and port numbers, the
foreign address and port numbers, and the connection state.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11.4 Transport Layer Services
Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Transport Layer Services Summary
What Did I Learn in this Module?
• In the client/server model, the term server refers to a host running a software application that provides
information or services to other hosts connected to the network. The client refers to a host running a
software application makes a service request to a server.
• TCP and UDP are two network protocols operating at the Transport Layer.
• TCP provides mechanisms to ensure reliable data packets delivery with sequencing and
acknowledgement. However, the acknowledgement slows down the packet delivery process.
• UDP is a 'best effort' delivery system that does not require acknowledgment of receipt.
• A port is a numeric identifier within each segment that is used to keep track of specific conversations
between a client and server.
• Source port number is dynamically generated by the sending device as a return address.
• Destination port identifies the intended service requested by a client.
• Port numbers are in three categories: well-known ports, registered ports, and private ports.
• Command netstat lists the protocols in use, the local address and port numbers, the foreign address and
port numbers, and the connection state.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 11 - Transport Layer Services
New Terms and Commands
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential