REAL LIFE example!! (TCP/IP and OSI layers) // FREE CCNA // EP 4

NetworkChuck
6 Aug 202016:50

Summary

TLDRIn this fourth episode of the free CCNA course, sponsored by Bozon Software, the tutorial delves into the TCP/IP and OSI networking models. It follows a packet's journey through a network, illustrating how it interacts with each layer. The video uses a simulation of Johnny ordering coffee from NetworkChuck.Coffee, detailing the process from the application layer to the physical layer. Key concepts like encapsulation, ports, IP and MAC addresses, and the roles of switches and routers are explained. The episode concludes with challenging quiz questions to test viewers' understanding of the OSI model and TCP.

Takeaways

  • 🎓 This is the fourth episode of a free CCNA course sponsored by Bozon Software, which provides CCNA and CCNP labs and practice exams.
  • 🌐 The video explains the TCP/IP and OSI networking models, which are essential for understanding how computers connect in a network.
  • 📦 The tutorial follows a packet's journey through a network, demonstrating how it interacts with each layer of the OSI model.
  • 🖥️ The scenario involves Johnny accessing 'networkchuck.coffee' over the internet to order coffee, using this as a practical example to explain networking concepts.
  • 🔍 The video uses Packet Tracer software to simulate network traffic and analyze the packet's progression through the layers.
  • 🔑 Layer 7, the Application Layer, is where Johnny's web browser initiates an HTTPS request to access the website, highlighting the use of HTTP and HTTPS protocols.
  • 🛠️ Encapsulation is a key process explained, where data is wrapped with headers as it moves down from the Application Layer to the Physical Layer.
  • 🔄 The video covers the Transport Layer (Layer 4), explaining the difference between TCP and UDP, and the importance of port numbers like 443 for HTTPS.
  • 🌐 The Network Layer (Layer 3) is where IP addresses are used to direct packets to their destination, with routers playing a crucial role in this process.
  • 🔗 The Data Link Layer (Layer 2) involves MAC addresses and the use of switches to direct frames to the next network device.
  • 🔍 The Physical Layer (Layer 1) is the actual transmission of electrical signals over Ethernet cables, representing the physical medium of the network.
  • 📝 The video concludes with a quiz to test understanding, focusing on the functions of the Application Layer and the protocols involved in reliable data transfer.

Q & A

  • What is the main focus of episode four of the CCNA course?

    -The main focus of episode four is to understand how packets travel through a network, following the packet's journey as it interacts with each layer of the OSI model.

  • Why is Bozon Software mentioned in the video?

    -Bozon Software is mentioned as the official sponsor of the CCNA course, making it possible for the course to be offered for free.

  • What are the two main networking models discussed in the video?

    -The two main networking models discussed are the TCP/IP model and the OSI model, with the video using the OSI model for reference to explain the packet's journey.

  • What does Johnny want to do in the scenario presented in the video?

    -Johnny wants to order some coffee from the website networkchuck.coffee by going over the internet.

  • What is the significance of the traffic being filtered to HTTP and HTTPS in the video?

    -Filtering the traffic to HTTP and HTTPS allows the viewer to focus on web-related traffic, omitting other protocols such as ARP requests and DNS queries that were covered in previous videos.

  • What is the role of the application layer (Layer 7) in the OSI model as described in the video?

    -The application layer is responsible for managing communications between applications, directing data to the correct program, and using protocols like HTTP and HTTPS for web browser interactions.

  • Why is the transport layer (Layer 4) important in the video's explanation?

    -The transport layer is important because it determines how data is transported, using either TCP for reliable delivery or UDP for faster, less reliable transport, and includes port numbers to direct the data to the correct application.

  • What is encapsulation as explained in the video?

    -Encapsulation in the video is the process of adding headers to the data as it moves down through the OSI model layers, with each layer adding its own information, such as ports for Layer 4 and IP addresses for Layer 3.

  • How does the video illustrate the difference between a packet and a frame?

    -The video illustrates that a packet includes all layers above Layer 2, encapsulated with a Layer 3 header, while a frame includes all layers encapsulated down to Layer 2, with MAC addresses, and is what is sent over the physical medium.

  • What happens when a packet reaches a router as described in the video?

    -When a packet reaches a router, the router de-encapsulates the packet to examine the Layer 3 header to determine the destination IP address and then uses its routing table to forward the packet to the next hop.

  • What is the purpose of the three-way handshake mentioned in the video?

    -The three-way handshake is a process used by TCP to establish a connection-oriented, reliable data transfer between networked computers before actual data transmission begins.

Outlines

00:00

🌐 Introduction to Networking Models

The script introduces Episode Four of a free CCNA course, sponsored by Bozon Software. It emphasizes the importance of networking models like TCP/IP and OSI for computer connectivity. The video aims to illustrate how a packet traverses a network, interacting with different layers. The presenter uses the OSI model for reference, adding extra layers like session and presentation for clarity. The scenario involves Johnny ordering coffee from NetworkChuck.Coffee, and the video uses Packet Tracer to simulate this process. The focus is on HTTP and HTTPS traffic, and viewers are encouraged to download the Packet Tracer file for a hands-on experience.

05:01

📨 Application and Transport Layer Analysis

This section delves into the application and transport layers of the OSI model, detailing how Johnny's HTTP request to NetworkChuck.Coffee is processed. The application layer, layer 7, uses HTTP over SSL (HTTPS) to ensure secure communication. The script explains the concept of encapsulation, where data is wrapped in headers as it moves down the OSI stack. At the transport layer, layer 4, TCP is chosen for reliable data transfer on port 443. The process of adding headers and the significance of ports in directing traffic are discussed. The segment, which includes the data and layer 4 header, is highlighted as a key component in data transmission.

10:01

🔗 Network Layer and Encapsulation Process

The script continues with the network layer, layer 3, focusing on IP addresses and the role of routers. It describes how a packet is encapsulated with a layer 3 header containing source and destination IP addresses, turning the segment into a packet. The importance of the encapsulation process is reiterated, with a practical example of how data is passed down to the data link layer. The packet's journey from Johnny's laptop to the router is visualized, and the concept of frames, which include layer 2 headers, is introduced. The script explains how switches use MAC addresses to direct frames and how routers de-encapsulate packets to read layer 3 information.

15:02

🌐 Deep Dive into TCP/IP Suite and Quiz

The final paragraph summarizes the entire process of Johnny's request being handled by the TCP/IP suite, from encapsulation into a frame to its transmission across the network. It touches on the de-encapsulation process at NetworkChuck.Coffee's server, which reads the request and initiates a response. The script then transitions into a quiz format, challenging viewers with questions about the OSI model's application layer and the transport layer's role in ensuring reliable data transfer. The quiz is designed to test comprehension and application of the concepts discussed in the video.

Mindmap

Keywords

💡CCNA

CCNA stands for Cisco Certified Network Associate, which is an entry-level certification program offered by Cisco Systems. It is designed to provide networking professionals with the skills and knowledge needed to install, operate, and troubleshoot medium-sized routed and switched networks. In the video, the course is focused on preparing for the CCNA exam, and the sponsor, Bozon Software, is mentioned as providing valuable resources for CCNA and CCNP candidates.

💡Bozon Software

Bozon Software is referred to as the official sponsor of the CCNA course in the video. It is likely a company that provides educational materials, labs, and practice exams for networking certifications such as CCNA and CCNP. The mention of Bozon Software in the script highlights its role in supporting the creation of free educational content for the viewers.

💡TCP/IP Model

The TCP/IP Model, also known as the Internet Protocol Suite, is a conceptual framework used to understand the workings of the internet and computer networking. It consists of four layers: the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer. In the video, the script mentions that while the OSI model is used for reference, the actual implementation follows the TCP/IP model, emphasizing its practical relevance in networking.

💡OSI Model

The OSI Model, or Open Systems Interconnection Model, is a seven-layer framework that standardizes the functions of a network system. It includes the Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, and Application Layer. The video script uses the OSI model to explain how data packets travel through a network, adding the Session and Presentation layers for educational purposes.

💡Encapsulation

Encapsulation in networking refers to the process of wrapping data in protocol-specific headers and trailers as it moves down through the OSI model layers. This process is crucial for the data to be properly formatted and addressed at each layer. In the video, encapsulation is described as the act of placing a data packet into 'envelopes' with headers that contain necessary information for routing and delivery.

💡HTTP and HTTPS

HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) are protocols used for transmitting data over the internet. HTTP is the basic protocol, while HTTPS is the secure version of HTTP that encrypts data to ensure privacy and security. The video script mentions that the application layer protocol used in the example is HTTPS, indicating a secure communication attempt to access a website.

💡Port 443

Port 443 is a network port that is commonly used for HTTPS traffic, which is a secure version of HTTP. It is the default port for HTTPS and is used to distinguish secure web traffic from regular HTTP traffic, which typically uses port 80. In the video, port 443 is mentioned as the destination port for the secure web traffic to the coffee ordering website.

💡IP Addresses

An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. In the video, IP addresses are discussed in the context of the Network Layer (Layer 3 of the OSI model), where they are used to route packets of data to their destination.

💡MAC Addresses

A MAC address, or Media Access Control address, is a unique identifier assigned to network interfaces for communications on the physical network segment. In the video, MAC addresses are mentioned in relation to the Data Link Layer (Layer 2 of the OSI model), where they are used by switches to forward frames to their destination.

💡Packet Tracer

Packet Tracer is a network simulation tool that allows users to create and manipulate network topologies and to visualize the flow of data across the network. In the video, Packet Tracer is used as a teaching tool to demonstrate how packets move through a network, helping to illustrate the concepts being taught in the CCNA course.

💡Routers and Switches

Routers and switches are networking devices that facilitate the transfer of data across networks. Routers operate at the Network Layer and use IP addresses to direct data, while switches operate at the Data Link Layer and use MAC addresses. The video script explains the roles of routers and switches in forwarding data packets based on the headers encapsulated at different OSI model layers.

Highlights

Introduction to episode four of a free CCNA course sponsored by Bozon Software.

Emphasis on the importance of TCP and OSI networking models for computer connectivity.

Overview of following a packet's journey through a network, interacting with each OSI layer.

Scenario setup where Johnny orders coffee from NetworkChuck.Coffee over the internet.

Explanation of using the OSI model for educational purposes despite the practical use of the TCP/IP model.

Use of Packet Tracer to simulate and visualize the network traversal process.

Description of traffic filtering to focus on HTTP and HTTPS protocols for web traffic.

Detail on the process of Johnny initiating a web request by typing a URL into his browser.

Explanation of the application layer (Layer 7) and the use of HTTP and HTTPS protocols.

Discussion on the transport layer (Layer 4), focusing on TCP for reliability and UDP for speed.

Clarification of port 443 being reserved for HTTPS traffic and port 80 for HTTP.

Introduction to the concept of encapsulation as data moves down the OSI model layers.

Explanation of the network layer (Layer 3) focusing on IP addresses and routing.

Discussion on the data link layer (Layer 2), involving MAC addresses and switches.

Illustration of how a switch directs frames based on MAC addresses using its CAM table.

Description of the process of de-encapsulation as data is received and processed by network devices.

Final steps in the data transmission process from the server back to Johnny's laptop.

Quiz time with challenging questions related to the OSI model functions and TCP.

Conclusion of the episode with a call to action for feedback and further engagement.

Transcripts

play00:00

this is episode four of my free

play00:03

ccna course and a huge shout out to

play00:06

bozon software the official sponsor of

play00:08

this ccna course

play00:09

they are the reason this can be made

play00:10

available for free so i highly encourage

play00:12

you to go check them out

play00:14

they have the absolute best ccna ccnp

play00:18

labs and practice exams tcp and osi

play00:21

networking models that define how we

play00:23

connect our computers

play00:24

without these we wouldn't have

play00:25

networking so in this video we're going

play00:27

to watch it happen we're going to follow

play00:29

a packet as it goes

play00:30

through a network and how it interacts

play00:32

with each layer

play00:33

let's do it

play00:33

[Music]

play00:40

okay same scenario as the last video

play00:41

johnny wants some delicious

play00:43

network chuck coffee so he needs to go

play00:45

over the internet to access

play00:46

networkchuck.coffee to

play00:48

order some coffee let's watch his

play00:50

packets go across the network

play00:51

and we'll analyze the layers as it goes

play00:53

across the network let's check it out

play00:55

now i'll say it again in reality we're

play00:57

using the tcp ip model which is this

play01:00

but for reference i'm going to use the

play01:01

osi model so i'll add in those extra

play01:03

layers the session layer and the

play01:05

presentation layer just going to add

play01:06

those in there

play01:07

stack them up and if you want to follow

play01:09

along which i highly encourage you to do

play01:11

that it's really helpful to watch this

play01:12

actually happen

play01:13

use your own computer so i got a link

play01:15

below download this package tracer file

play01:17

that i'm about to walk through

play01:18

go ahead and do it right now i'll wait

play01:19

for you if you pause otherwise here we

play01:22

go

play01:22

so using simulation mode we'll watch

play01:24

johnny go all the way across the network

play01:26

to access networkshop.com which is this

play01:28

server right here

play01:29

and order some delicious coffee so let's

play01:31

click on simulation and watch this in

play01:32

bullet time because it's

play01:33

it's amazing now as we go through this i

play01:35

want you to notice one thing

play01:36

i have our traffic filtered meaning that

play01:40

i'm

play01:40

only looking at http in https traffic

play01:43

web traffic things you might use to

play01:45

access a website i'm telling you this

play01:47

because you won't see things that we saw

play01:49

in the last video like

play01:50

arp requests to discover a device's mac

play01:53

address you won't see a dns query

play01:55

so johnny can discover the ip address in

play01:57

narc shock.coffee if you want to see

play01:59

those things you can

play02:00

just go edit the filters right here you

play02:02

can unlock all those goodies so we're

play02:04

going to open up johnny's laptop here

play02:06

we're going to navigate over to his

play02:07

desktop and click on web browser

play02:09

we're going to type in https colon whack

play02:13

network chuck dot coffee

play02:17

and go now nothing happened because

play02:19

we're filtering traffic

play02:20

let me step forward in time and watch

play02:22

things happen there we go

play02:24

so we see here we have our blue message

play02:25

our blue packet that johnny is

play02:27

getting ready to send out in our

play02:28

simulation panel here you can actually

play02:29

see we have two separate messages

play02:31

why well one is what he's getting ready

play02:33

the other is what he's sending out to

play02:34

the switch

play02:35

let's open up that first one and take a

play02:36

look i'll just select that first message

play02:38

right here

play02:38

you can see we have our wonderful seven

play02:40

layers of the osi even though we're

play02:42

actually using tcpip

play02:43

again i'm telling you the networking

play02:44

world always uses the seven layers

play02:46

always so let's analyze this first

play02:48

johnny starts out by using layer 7.

play02:50

what's layer 7 it's our application

play02:53

layer

play02:53

what application is he using well we get

play02:56

a message right here

play02:57

because we have that layer selected the

play02:59

http client sends an http request to the

play03:01

server what that basically means is that

play03:03

johnny's web browser

play03:04

is attempting to access a website so

play03:06

simply this is the application layer the

play03:08

protocol we're using here is the http

play03:10

protocol

play03:11

and actually we're using the https

play03:13

because it's secure and encrypted

play03:14

but this is an example of an application

play03:16

layer protocol that is used by

play03:18

things like hey your web browser you're

play03:20

using that right now so johnny types in

play03:22

networkchuck.com into his web browser

play03:24

he hits enter and his computer gets to

play03:26

work and so again the application

play03:27

protocol we're using is https

play03:30

and the computer takes this data and

play03:32

gets it ready to send out now at this

play03:33

point

play03:34

the computer's goal is to get the data

play03:36

all the way down through the layers down

play03:37

to the physical layer so it can go

play03:39

across our ethernet cable

play03:40

through the internet to the other server

play03:42

to the networkchuck.cof server but

play03:44

what's happening in all this mess what's

play03:45

going

play03:46

on let's talk about it now we're gonna

play03:47

skip these two layers for now we will go

play03:49

into more detail later but again

play03:51

typically they're

play03:51

meshed into the application layer anyhow

play03:53

so it's okay looking back at packet

play03:55

tracer we're on to layer four now

play03:57

layer four is our transport layer for

play03:58

now the way i want you to think about it

play04:00

is

play04:00

how can we transport the data how can we

play04:02

get it there and we really have two main

play04:04

options we can use tcp

play04:06

or udp now i'm not going to cover this

play04:08

super in depth right now but just know

play04:09

that when we use tcp

play04:10

it's more reliable it's when we want to

play04:12

make sure our message actually gets

play04:13

there

play04:14

we have mechanisms in place to make sure

play04:15

that if it doesn't get there we can send

play04:17

it again

play04:17

whereas udp is not as reliable as tcp

play04:20

and it's typically seen as a

play04:21

faster transport method so when it comes

play04:24

to the transport layer these are the two

play04:25

main options we have and then we have

play04:27

our ports now the destination port here

play04:29

is destination 443

play04:31

you might recognize this port 443 is

play04:34

reserved for https traffic

play04:36

you might also be familiar with port 80

play04:37

which is http traffic

play04:39

again we'll cover more in detail later

play04:41

but just know that that's what's

play04:42

happening right now

play04:43

so i'll move on down through our layers

play04:44

real quick put our data down here

play04:46

and the transport information we're

play04:47

going to use will slap on as a layer 4

play04:50

header we'll attach that to our data

play04:52

and inside this header are things like

play04:53

hey we're going to be using tcp

play04:55

and we'll be using port 443 now what

play04:57

just happened here

play04:58

is important the process of taking our

play05:00

application data

play05:01

and then scooting it on down here and

play05:04

slapping on that layer 4 header

play05:06

that's called encapsulation this

play05:08

encapsulation process actually happened

play05:10

up here as well

play05:11

the web browser encapsulated whatever

play05:13

johnny wanted to send to the network

play05:14

coffee server which is him saying get me

play05:17

some coffee it's a message saying get me

play05:19

some coffee he encapsulated that into a

play05:21

http header which is our data the way i

play05:23

like to see this is let's say

play05:25

for example the data is like a message a

play05:28

letter we encapsulate that message into

play05:30

a

play05:31

http header which is our data when we

play05:33

moved on down to the transport layer

play05:35

we took that data envelope and we put it

play05:37

inside another envelope we encapsulated

play05:39

it and this new envelope has our data

play05:41

inside and this is our layer 4 header

play05:43

and that's the way i like to visualize

play05:44

encapsulation we'll keep taking our

play05:45

letters and just putting them inside

play05:47

other

play05:47

envelopes other letters until we get to

play05:49

the bottom which is our data link and

play05:50

i'll show you oh by the way this

play05:52

message right here when we have our data

play05:53

encapsulated with a layer 4 header

play05:55

attached we call this message a segment

play05:57

and now we're getting into familiar

play05:58

territory we're at layer 3.

play06:00

layer 3 again is our network layer and

play06:02

if you watched our previous video you

play06:03

know that layer 3 we're dealing with

play06:05

iop addresses we're dealing with routers

play06:08

love that stuff

play06:09

so in this layer 3 header we see that we

play06:10

have our source ip address

play06:12

and we have our destination ip address

play06:14

this ip address being johnny's ip

play06:15

address and this ip address being the ip

play06:17

address of the networkchuck.coffee

play06:19

server

play06:19

so we'll drag our segment down on to

play06:22

layer 3

play06:23

and we'll encapsulate that segment by

play06:24

adding a layer 3

play06:26

header and again our layer 3 header is

play06:28

going to contain the ip address

play06:29

information and we're basically telling

play06:30

our router

play06:31

where to send this we're giving our

play06:33

router directions we're saying hey mr

play06:34

router here's my source ip this is who

play06:36

the

play06:37

message is from which is 10.1.1.3 and

play06:40

then the destination ip address which

play06:41

was 23.227.38.65

play06:46

now let's test your memory you would

play06:47

have learned this from the last video

play06:49

what is this new message we have what is

play06:52

it called

play06:52

what do we call that if you said packet

play06:55

you're absolutely right a packet has

play06:57

all the layers above it the transport

play06:59

session presentation application

play07:01

all those layers encapsulated with a

play07:03

layer three header telling the router

play07:05

hey here's where you send this info and

play07:07

now we're at layer two

play07:08

almost there layer two is our data link

play07:10

layer with data link our layer two we're

play07:12

dealing with mac addresses we're giving

play07:14

our switch directions to the next stop

play07:16

that our information is taking in this

play07:18

case it'll be our router here we have

play07:20

the

play07:20

mac address of johnny's laptop and here

play07:23

we have the mac address of the router

play07:25

so now i'll move down our packet into

play07:27

layer two

play07:28

and we'll slap on our layer two header

play07:30

and layer two also have a trailer as

play07:32

well and this will encapsulate it into a

play07:34

message that we call

play07:35

well what do we call it what do we call

play07:36

messages that deal with layer two

play07:38

that deal with mac addresses and

play07:39

switches if you set frames you gotta

play07:41

this message is indeed a frame

play07:43

a frame has all these layers

play07:45

encapsulated down and inside these layer

play07:47

two headers we have the directions for

play07:48

the switch

play07:49

telling the switch where to send his

play07:50

message so in this case we have the

play07:52

source mac address

play07:53

which is johnny's mac address and then

play07:54

we have the next stop the destination

play07:56

which is our router and that's

play07:58

pretty much it we've encapsulated all

play08:00

the layers down to a frame and now we

play08:01

can send that frame

play08:03

over the physical layer the ethernet

play08:05

cable so he hits the wire and boom

play08:07

and actually he's up here so he goes

play08:09

from johnny to the switch

play08:11

let's watch it happen in packet tracer

play08:12

if we step forward in time we see that

play08:14

frame go to the switch if we open up

play08:16

that frame

play08:17

we're only seeing layer one and layer

play08:18

two because the switch can't see

play08:20

anything else

play08:21

all these layers right here have been

play08:23

encapsulated down

play08:24

into this frame and when the switch

play08:26

receives his frame he's got this bulky

play08:27

envelope

play08:28

but he only opens the first envelope and

play08:30

he opens it up and goes oh

play08:32

well it's going to this mac address

play08:34

which if i look in my

play08:35

cam table my mac address table i can see

play08:37

that mac address belongs to this port

play08:40

i'm going to send it out this port

play08:41

that's where the router is see right

play08:43

here he looked it up and

play08:44

fast ethernet 06 is the port that the

play08:46

router belongs to let's step forward in

play08:48

time and watch it happen

play08:49

boom it goes out to the router and boom

play08:51

it also does it here

play08:52

if we open up that message the router

play08:54

did indeed receive a frame

play08:56

and he made sure that it was for him it

play08:58

came to his mac address

play08:59

he will then do the opposite of

play09:01

encapsulation he'll de-encapsulate it

play09:04

which basically means he opens the next

play09:05

envelope to see what the next layer says

play09:08

so he takes a peek at layer 3. at this

play09:10

point we're dealing with the packet with

play09:11

the layer 3 header the layer 4 header

play09:13

and the data

play09:14

the router looks at the layer 3 header

play09:16

sees where it needs to go what

play09:17

is the destination ip address looks in

play09:19

his routing table he's like yeah i know

play09:21

where that goes

play09:22

i've got my map i'm a layer 3 guy and he

play09:24

then proceeds to send it out to the

play09:26

switch

play09:26

now something important happens here

play09:28

remember the switch can only deal

play09:31

with layer 2. if you recall from our

play09:33

previous videos the router has to

play09:34

somehow tell the switch

play09:36

how to get to networkcheck.coffee he has

play09:38

to tell him his mac address

play09:39

otherwise the switch will have no idea

play09:41

where to send it because he can't see ip

play09:42

addresses so after the router learns the

play09:44

mac address of

play09:46

networkchuck.coffee using arp he

play09:48

encapsulates his layer 3 header which is

play09:50

the ip address information

play09:52

inside a new layer 2 header and he

play09:55

changed the source and destination mac

play09:56

address

play09:57

and he had to change it because before

play09:59

the message he received the

play10:00

source mac address was johnny and the

play10:02

destination was himself

play10:04

now he has to change it to being the

play10:06

source is himself and the destination is

play10:08

networkchuck.coffee so he encapsulates

play10:10

that it's now a layer two frame

play10:11

and he sends it off to the switch we'll

play10:13

step forward in time and pack a tracer

play10:14

here the message arrives at the switch

play10:16

if we open that up

play10:17

here we are again switch eyes we can

play10:18

only see layer two and layer one the

play10:20

switch looks in his cam table as mac

play10:22

address table

play10:23

sees that hey network check dot coffee

play10:25

does indeed live on fast ethernet zero

play10:27

one

play10:28

that's where i'm gonna send that sucker

play10:29

that's where i'm firing the electrical

play10:30

signals and he does that let's watch we

play10:32

step forward in time once more

play10:34

boom the frame goes to

play10:37

networkchuck.coffee

play10:38

if we open the message up we now have

play10:40

all the layers once more and here's what

play10:42

just happened

play10:42

the switch sent this frame to

play10:43

networkcheck.coffee now because the

play10:45

server

play10:46

that runs networkcheck.coffee was built

play10:48

obeying the guidelines of the tcpip

play10:50

model when it receives a frame it knows

play10:52

exactly what to do it'll first do

play10:54

exactly what the router did

play10:55

look at the layer 2 header make sure

play10:57

that hey this is actually for me it's my

play10:59

mac address

play11:00

hey cool he'll take a look at the layer

play11:01

2 header he'll open up that message and

play11:02

go oh

play11:03

yeah this is my mac address it's to me

play11:05

awesome he'll then de-encapsulate

play11:07

or open up the next message and look at

play11:09

the layer 3 header and go

play11:11

huh look it's for me too this is my ip

play11:14

address

play11:15

awesome he'll then de-encapsulate it

play11:16

once more opening up the layer 4 message

play11:19

and going oh hey

play11:20

we're using tcp oh and awesome i love

play11:22

443

play11:23

reasoning port 443 and then he sends it

play11:25

up to the next layer

play11:26

and then finally the last layer the

play11:27

application layer opens up that last

play11:29

message and goes oh

play11:30

it's for me https it's browser

play11:34

information

play11:34

it's website stuff awesome so real quick

play11:37

a thousand foot view what johnny had to

play11:39

do is he had to

play11:40

use the entire tcp ip suite

play11:42

encapsulating all this stuff down into a

play11:44

frame

play11:45

and then he sends this frame across the

play11:46

physical network across

play11:48

ethernet cables and such touching each

play11:50

device a switch a router another switch

play11:53

and then finally arriving at

play11:54

networkchalk.coffee networkchuck.coffee

play11:56

took that frame

play11:57

and then de-encapsulated the entire

play11:59

thing to look inside and see

play12:01

what was meant for the web browser the

play12:03

application information of course in

play12:04

this case

play12:05

the data was a request for his

play12:08

web server johnny's wanting to buy some

play12:10

coffee and johnny's like hey

play12:12

i'm trying to get to the homepage of

play12:13

networkcheck.com can you give me the

play12:15

home page so i can shop

play12:16

so the web server reads that request

play12:17

which is inside the data and the whole

play12:19

process starts over again

play12:20

the networkcheck.cof server encapsulates

play12:23

all the information

play12:24

into a frame sends that to the switch

play12:25

the switch sends it to the router

play12:27

the router to the switch the switch to

play12:28

johnny and this is what johnny receives

play12:30

all right quiz time i hope you have your

play12:32

copy ready because these questions i

play12:34

chose are kind of difficult

play12:36

one is from the old ccna and one is from

play12:39

the

play12:39

old ccnp route exam so let's see what

play12:42

you got

play12:43

let's go question number one which of

play12:46

the following functions are performed

play12:48

by the application layer of the osi

play12:50

model select

play12:51

three choices now if you just started

play12:53

studying networking

play12:54

this could be a difficult question for

play12:56

you but when i encounter a difficult

play12:58

test question i start with the process

play12:59

of elimination

play13:00

so let's take out things that we know

play13:01

have nothing to do with the application

play13:03

layer which again is layer seven

play13:04

looking at this i think d is probably

play13:07

not it at all

play13:08

managing logical and physical addressing

play13:10

when i hear that i think mac addresses

play13:12

layer 2 definitely not layer 7.

play13:13

another one that you might pick up on is

play13:15

that b is probably not the answer either

play13:17

ensuring error-free data delivery

play13:19

between devices this makes me think

play13:22

transport layer and specifically tcp tcp

play13:25

gives us reliable delivery of our

play13:27

packets

play13:28

of our data so now we're down to four

play13:29

choices and i'm gonna go ahead and

play13:31

select the right answers

play13:32

and i'll explain why a c

play13:36

and e let's see if i'm right boom

play13:39

now here's the tricky part though this

play13:40

is correct for the osi model so these

play13:43

three

play13:43

options are absolutely applicable to

play13:46

layer seven the one we didn't select

play13:48

down here the one we didn't eliminate

play13:50

this is part of the presentation layer

play13:52

which is layer six

play13:53

but as part of the tcp model layer six

play13:56

layer seven and even layer five

play13:58

are all clumped together in the

play13:59

application layer and if we had talked

play14:01

about the presentation

play14:02

layer in detail you would have known

play14:03

that this is not it but we didn't so

play14:05

it's okay if you didn't get this

play14:06

now c and e we probably could have just

play14:08

guessed that without having even known

play14:10

anything about layer seven managing

play14:12

communications between applications

play14:14

directing data to the correct program

play14:16

programs another word for applications

play14:18

a would have been a bit more fuzzy but

play14:20

just from the process of elimination

play14:21

we would have got that one question

play14:23

number two which of the following relies

play14:25

on a three-way handshake in order to

play14:28

provide connection-oriented reliable

play14:30

reliable data transfer between networked

play14:33

computers

play14:34

select the best answer now again this is

play14:36

a question that has terms you have not

play14:38

learned yet or possibly one of those

play14:40

being the three-way handshake

play14:43

we haven't talked about that yet but

play14:44

through the process of elimination

play14:46

we can look at these answers and go huh

play14:48

that's probably not that so for example

play14:49

arp

play14:50

when we talked about routers and

play14:51

switches we learned what arp does

play14:53

it's how a host on a network can find

play14:55

out what mac address belongs to a

play14:57

certain ip address

play14:58

so that's not it we can mark off a dns

play15:00

we saw what that was in our

play15:01

router video dns helps us map a friendly

play15:03

name like netflix.com or

play15:06

networkchuck.coffee to an ip address so

play15:08

that's not it

play15:09

and then down here even though it looks

play15:10

kind of weird rarp

play15:13

it stands for reverse arp and it's arp

play15:16

and reverse

play15:16

you got the mac address but you want to

play15:18

find the ip address so that's not it

play15:20

now we have two options and we just

play15:22

learned about these didn't we

play15:24

tcp and udp are two of the main

play15:25

protocols we can select when we are

play15:27

using the transport layer

play15:29

now out of those two options which of

play15:30

them do you think provide connection

play15:32

oriented

play15:34

reliable data transfer

play15:37

well udp no it's fast but it's not

play15:40

reliable

play15:41

tcp yeah it is if we select this answer

play15:44

and see

play15:45

if we're right we are right now if you

play15:47

got that right

play15:48

that's impressive that's a ccnp level

play15:50

question from the old ccmp route and the

play15:53

route exam

play15:54

i failed that three times three no two

play15:57

times

play15:58

it was a tough exam well guys that's

play15:59

about it if you like this video hit that

play16:01

like button if you have any questions or

play16:02

comments or need help with the ccna

play16:04

comment below or jump into my discord

play16:06

server i got a link below for that as

play16:07

well if you want to see more stuff

play16:09

like this more courses check out this is

play16:11

it.i o it's a collaboration between

play16:12

myself and david bomble

play16:14

it's pretty cool go check it out link

play16:16

below and that was episode four the osi

play16:18

model the tcp ip model

play16:20

we saw what happened we saw it happen in

play16:21

real time in the coming videos we're

play16:23

going to explore them a bit more

play16:24

jumping into the upper layers the

play16:26

application the presentation the session

play16:28

the transport we're going to dive deeper

play16:29

into those layers

play16:30

and yeah that's it i'll catch you guys

play16:34

later

play16:37

[Music]

play16:48

foreign

Rate This

5.0 / 5 (0 votes)

関連タグ
NetworkingCCNA CourseTCP/IP ModelOSI ModelPacket TracerEncapsulationData TransferLayer AnalysisNetwork ProtocolsEducational Content
英語で要約が必要ですか?