Anda di halaman 1dari 15

CCNA 5.

0
Planning Guide
Chapter 3: Network Protocols
and Communications

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: Objectives
By the end of this chapter, you will be able to:
Explain how rules are used to facilitate communication.
Explain the role of protocols and standards organizations in
facilitating interoperability in network communications.
Explain how devices on a LAN access resources in a small to
medium-sized business network.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: Activities
What activities are associated with this chapter?

3.0.1.2 Class Activity Designing a Communications System


3.2.2.4 Activity Mapping the Protocols of the TCP/IP Suite
3.2.3.6 Lab Researching Network Standards
3.2.3.7 Activity Standards Body Scavenger Hunt
3.2.4.5 Activity Identify Layers and Functions
3.2.4.6 Packet Tracer Investigating the TCP-IP and OSI
Models in Action
3.2.4.7 Lab Researching RFCs
3.3.1.5 Activity Identify the PDU Layer
3.3.3.3 Packet Tracer Explore a Network
3.3.3.4 Lab Using Wireshark to View Network Traffic
3.4.1.1 Activity Guaranteed to Work!
Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: Packet Tracer Activity Password


Below is the password for all the Packet Tracer activities in this
chapter:
PT_ccna5

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: Assessment
Students should complete Chapter 3, Assessment after
completing Chapter 3.
Worksheet, quizzes, and labs can be used to informally assess
student progress.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: New Terms and Commands


What terms are introduced in this chapter?

3.1.1.1
3.1.1.2
3.1.1.3
3.1.1.4
3.1.1.5
3.1.1.6
3.1.1.7
3.2.1.1
3.2.1.2
3.2.1.3

Presentation_ID

message, transmitter, transmission medium, receiver


protocols, message encoding, message formatting and
encapsulation, message size, message timing, message
delivery options
encoder, decoder
message formatting, encapsulation
message size, segmenting
access method, flow control, response timeout
acknowledgement, unacknowledged, unicast, multicast,
broadcast
protocol stack
network protocol suite
application protocol, transport protocol, internet protocol,
network access protocols

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: New Terms and Commands


(cont.)
What terms are introduced in this chapter?
3.2.2.1
3.2.2.2
3.2.2.3
3.2.3.2
3.2.3.3
3.2.3.4

Presentation_ID

standards organization, Transmission Control Protocol/IP (TCP/IP),


standards-based protocol, proprietary protocol
AppleTalk, Internetwork Packet Exchange/Sequenced Packet
Exchange (IPX/SPX), Advanced Research Projects Agency Network
(ARPANET)
Hypertext Markup Language (HTML)
Internet Society (ISOC), Internet Architecture Board (IAB), Internet
Engineering Task Force (IETF), Request for Comments (RFC)
Institute of Electrical and Electronics Engineers (IEEE), IEEE 802.3,
IEEE 802.11, Media Access Control (MAC)
International Organization for Standardization (ISO), Open Systems
Interconnection (OSI) reference model

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: New Terms and Commands


(cont.)
What terms are introduced in this chapter?

3.2.3.5

3.2.4.1
3.3.1.1
3.3.1.2
3.3.1.3
3.3.1.3
3.3.2.1
3.3.2.3
3.3.3.1

Presentation_ID

Electronic Industries Alliance (EIA), Telecommunications Industry


Association (TIA), International Telecommunications UnionTelecommunication Standardization Sector (ITU-T), International
Corporation for Assigned Names and Numbers (ICANN), Internet
Assigned Numbers Authority (IANA)
protocol model, reference model
segmentation, multiplexing
protocol data unit (PDU), data, segment, packet, frame, bits
data encapsulation
de-encapsulation
network address, source IP address, destination IP address, data link
address, source data link address, destination data link address
Address Resolution Protocol (ARP)
default gateway

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: Best Practices


Prior to teaching Chapter 3, the instructor should:
Complete Chapter 3, Assessment.
Explain the role of protocols in facilitating interoperability in
network communications.
Ensure this chapter becomes as hands-on as possible.
Discuss protocols both generally and how they are used in
networking.
Draw an example of the interaction between a web server and
client through the protocol stack on the board. (page 3.1.1.3)
Discuss the advantages and disadvantages between a standardsbased protocol and a proprietary protocol.
Give a few examples of network traffic moving through the TCP/IP
protocol stack.
Show some of the common RFCs used in networking. Ex: RFC
1918, RFCs 1034 & 1035, RFC 1178.
Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 3: Best Practices (cont.)


Discuss why we use a layered model.
Compare OSI reference model to TCP/IP protocol model.
Ask students, what is RFC 1?
Demonstrate using Post-It notes how data is passed down through
the TCP/IP stack by adding encapsulation at each layer. Follow the
flow back up through the stack on the destination by deencapsulation.
Demonstrate on the board how the subnet mask is applied to the
source and destination addresses to determine if the gateway is
used, or if the traffic is local.
Demonstrate Wireshark using live traffic or previously captured
traffic.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

10

Chapter 3: Additional Help


For additional help with teaching strategies, including lesson plans,
analogies for difficult concepts, and discussion topics, visit the
CCNA Community at www.community.netacad.net.
If you have lesson plans or resources that you would like to share,
upload them to the CCNA Community to help other instructors.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

11

Chapter 3: Topics not in ICND1 100-101


This section lists topics covered by this chapter that are NOT listed
in the ICND1 100-101 blueprint. Those topics are posted at
http://www.cisco.com/web/learning/exams/list/icnd1b.html.
Instructors could skip these sections; however, they should provide
additional information and fundamental concepts to assist the
student with the topic.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

12

Chapter 3: Topics not in ICND1 100-101


What sections, topics, pages of this chapter are NOT in ICND1
100-101 certification blueprint?
3.0

Section

Introduction

3.1.1

Topic

The Rules

3.2.1.1

Page

Protocols: Rules that Govern Communications

3.2.1.2

Page

Network Protocols

3.2.3

Topic

Standards Organizations

3.4

Section

Summary

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

13

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

14

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

15