Networking Essentials 2.0 Module5
Networking Essentials 2.0 Module5
Networking Essentials 2.0 Module5
Principles
Instructor Materials
Note: Remove the Planning Guide from this presentation before sharing with anyone.
For additional help and resources go to the Instructor Home Page and Course Resources
for this course. You also can visit the professional development site on netacad.com, the
official Cisco Networking Academy Facebook page, or Instructor Only FB group.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What to Expect in this Module
To facilitate learning, the following features within the GUI may be included in this module:
Feature Description
Check Your Understanding (CYU) Per topic online quiz to help learners gauge content
understanding.
Lab Labs designed for working with physical equipment.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Check Your Understanding
• Check Your Understanding activities are designed to let students quickly determine if they
understand the content and can proceed, or if they need to review.
• There are no separate slides for these activities in the PPT. They are listed in the notes area of the
slide that appears before these activities.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Activities
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Activities (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Best Practices
Prior to teaching Module 5, the instructor should:
• Review the animations and assessments for this module.
• Try to include as many questions as possible to keep students engaged during classroom presentation.
Topic 5.1
• Review lab 5.1.4 – My Protocol Rules, before teaching Topic 5.1.
• Express the importance of communication protocols using human communication as an example.
• Describe the use of networking protocols to provide successful computer network communication.
Topic 5.2
• Ask the class: How do you know that computer technologies purchased from a store will be
compatible with each other?
• Discuss the large amount of new devices and technologies being created and the importance of
standards.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Best Practices (Cont.)
Topic 5.3
• Explain the requirements for successful communication by providing an example of a protocol stack.
A Wireshark capture of an HTTP session is a great example to focus on HTTP/TCP/IP/Ethernet.
• Walk through a graphic of the TCP/IP model and explain the purpose of each layer.
• Walk through a graphic of the OSI Reference model and explain the purpose of each layer.
• Make sure to compare the functionality of the layers from both the TCP/IP and OSI Reference
models.
• Ask the students to create a mnemonic to memorize the order of the layers in both models.
Topic 5.4
• Ask the class to draw a topology of your current home network or of the network in the classroom.
• Ask the class: How are all the different devices on this network able to successfully communicate
with a common protocol?
• Discuss examples of Ethernet standards and their standard notation.
• Bring up a PC in Packet Tracer or on a physical client and demonstrate the identification of a MAC
address and the use of it in a conversation between two or more devices.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module 5: Communication
Principles
Communication
Describe network communication standards.
Standards
Network
Communication Compare the OSI and TCP/IP models.
Models
Ethernet Explain the OSI model Layer 1 and Layer 2 functions in an Ethernet network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.1 The Rules
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
The Rules
The Three Elements
The primary purpose of any network is to provide us with a method to communicate and share
information. All communication begins with a message, or information, that must be sent from
one individual or device to another.
• The first of these elements is the message source, or sender. Message sources are people,
or electronic devices, that need to communicate a message to other individuals or devices.
• The second element of communication is the destination, or receiver, of the message. The
destination receives the message and interprets it.
• The third element is called a transmission medium, or channel. It provides the pathway over
which the message can travel from source to destination.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
The Rules
Communication Protocols
Before beginning to communicate with each other, we establish rules or agreements to govern the
conversation:
These rules, or protocols, must be followed for the message to be successfully delivered and understood:
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
The Rules
Why Protocols Matter
Protocol Characteristic Description
When a message is sent, it must use a specific format or structure. Message formats
Message format
depend on the type of message and the channel that is used to deliver the message.
The rules that govern the size of the pieces communicated across the network are very
strict and can be different, depending on the channel used. It may be necessary to
Message size
break a longer message into smaller pieces in order to ensure that the message can be
delivered reliably.
Many network communication functions are dependent on timing. Timing determines the
speed at which the bits are transmitted across the network. It also affects when an
Timing
individual host can send data and the total amount of data that can be sent in any one
transmission.
Messages sent across the network are first converted into bits by the sending host.
Encoding Each bit is encoded into a pattern of sounds, light waves, or electrical impulses. The
destination host receives and decodes the signals in order to interpret the message.
Each message transmitted on a network must include a header that contains
Encapsulation addressing information that identifies the source and destination hosts. Encapsulation is
the process of adding this information to the pieces of data that make up the message.
Some messages require an acknowledgment before the next message can be sent.
Message pattern This type of request/response pattern is a common aspect© of many networking
2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
protocols.
The Rules
Lab - My Protocol Rules
In this lab, you will complete the following objectives:
• Relate computer network protocols to the rules that you use every day for various forms of
communication.
• Define the rules that govern how you send and interpret text messages.
• Explain what would happen if the sender and receiver did not agree on the details of the protocol.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
5.2 Communication Standards
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Communication Standards
Video - Devices in a Bubble
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Communication Standards
The Internet and Standards
A standard is a set of rules that determines how something must be done.
Networking and internet standards ensure that all devices connecting to the network implement the same
set of rules or protocols in the same manner.
Using standards, it is possible for different types of devices to send information to each other over the
internet.
For example, the way in which an email is formatted, forwarded, and received by all devices is done
according to a standard:
• If one person sends an email via a personal computer, another person can use a mobile phone to
receive and read the email as long as the mobile phone uses the same standards as the personal
computer.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Communication Standards
Network Standards Organizations
An internet standard is the end result of a comprehensive cycle of
discussion, problem solving, and testing.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
5.3 Network Communication
Models
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Network Communication Models
Video - Network Protocols
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Network Communication Models
Video - The Protocol Stack
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Network Communication Models
The Protocol Stack
Successful communication between hosts requires interaction between a number of protocols.
These protocols are implemented in software and hardware that are installed on each host and
networking device.
The interaction between the different protocols on a device can be illustrated as a protocol stack, as
shown in the figure.
A stack illustrates the protocols as a layered hierarchy, with each higher-level protocol depending on the
services of the protocols shown in the lower levels.
The separation of functions enables each layer in the stack to operate independently of others
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Network Communication Models
The Protocol Stack (Cont.)
The protocols in the figure are described as follows:
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Network Communication Models
The TCP/IP Model
A layered model depicts the operation of the protocols occurring within each layer, as well as the
interaction with the layers above and below it.
The layered model has many benefits:
• Assists in protocol design, because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below.
• Fosters competition because products from different vendors can work together.
• Enables technology changes to occur at one level without affecting the other levels.
• Provides a common language to describe networking functions and capabilities.
TCP/IP Model Layer Description
Application Represents data to the user, plus encoding and dialog control.
Network Access Controls the hardware devices and media that make up the network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Network Communication Models
The OSI Reference Model
OSI Model Layer Description
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Network Communication Models
Upper and Lower Layers of the OSI Model
Common Network Components Associated
Group Layer Number Layer Name
with this Layer
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Network Communication Models
OSI Model and TCP/IP Model Comparison
The protocols that make up the TCP/IP
protocol suite can be described in terms
of the OSI reference model:
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Ethernet
The Rise of Ethernet
In the early days of networking, each vendor used its own proprietary methods of
interconnecting network devices and networking protocols.
As networks became more widespread, standards were developed that defined rules by which
network equipment from different vendors operated.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Ethernet
The Rise of Ethernet (Cont.)
There is no official local area networking standard protocol, but over time, Ethernet has become
the most common.
Ethernet protocols define how data is formatted and how it is transmitted over the wired
network.
The Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model.
Ethernet has become a de facto standard, which means that it is the technology used by almost
all wired local area networks, as shown in the figure.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Ethernet
Ethernet Evolution
The Institute of Electrical and Electronic Engineers, or IEEE, maintains the networking standards,
including Ethernet and wireless standards.
Each technology standard is assigned a number that refers to the committee that is responsible
for approving and maintaining the standard.
Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of Ethernet
operate at 10 Gigabits per second and more.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Ethernet
Video - Ethernet Addressing
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Ethernet
The Ethernet MAC Address
On Ethernet networks, a similar method exists for identifying source and destination hosts. Each host
connected to an Ethernet network is assigned a physical address which serves to identify the host on the
network.
Every Ethernet network interface has a physical address assigned to it when it is manufactured. This
address is known as the Media Access Control (MAC) address.
The MAC address identifies each source and destination host on the network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Ethernet
Lab - Determine the MAC Address of a Host
In this lab, you will complete the following objectives:
• Determine the MAC address of a Windows computer on an Ethernet network using the
ipconfig /all command.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
5.5 Communication Principles
Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Communication Principles Summary
What Did I Learn in this Module?
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Communication Principles Summary
What Did I Learn in this Module? (Cont.)
• Networking and internet standards ensure that all devices connecting to the network
implement the same set of rules or protocols in the same manner.
• The most widely known internetwork reference model was created by the Open Systems
Interconnection (OSI) project and is commonly referred to as the OSI model.
• The OSI model breaks network communications down into multiple processes. Each
process is a small part of the larger task.
• The OSI model helps us troubleshoot by focusing on a specific layer to identify and
resolve network problems.
• The protocols that make up the TCP/IP protocol suite can be described in terms of
the OSI reference model.
• Ethernet is the technology used by almost all wired local area networks and Ethernet
standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model.
• Each host connected to an Ethernet network is assigned a physical address, known
as a MAC address, which serves to identify the host on the network.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Communication Principles Summary
Module 5 – New Terms and Commands
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Communication Principles Summary
Module 5 - Communication Principles Quiz
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40