KEMBAR78
Modulo 1 - Capitulo 3 | PDF | Internet Protocols | Computer Network
0% found this document useful (0 votes)
11 views4 pages

Modulo 1 - Capitulo 3

Uploaded by

Gybes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

Modulo 1 - Capitulo 3

Uploaded by

Gybes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

CAPITULO 3: NETWORK PROTOCOLS AND COMMUNICATION

3.1. Rules of Communication

3.1.1. The Rules


1. Protocols are necessary for effective communication and include:
1. An identified sender and receiver
2. Common language and grammar
3. Speed and timing of delivery
4. Confirmation or acknowledgment requirements
2. Protocols used in network communications also define:
1. Message encoding
2. Message delivery options
3. Message Formatting and Encapsulation
4. Message Timing
5. Message Size

3.1.2. Message Encoding


1. Encoding between hosts must be in appropriate format for the medium.
2. Messages are first converted into bits by the sending host.
3. Each bit encoded into pattern of sounds, light waves, electrical impulses depending network media
4. The destination host receives and decodes the signals in order to interpret the message.

3.1.3. Message Formatting and Encapsulation

3.1.4. Message Size


1. Long messages are broken into smaller pieces to travel across a network.
1. Each piece is sent in a separate frame.
2. Each frame has its own addressing information.
3. Receiving host will reconstruct multiple frames into the original message.

3.1.5. Message Timing


1. Access Method
Hosts on a network need to know when to begin sending messages and how to respond when collisions occur.
2. Flow Control
Source and destination hosts use flow control to negotiate correct timing to avoid overwhelming the destination
and ensure information is received.
3. Response Timeout
Hosts have rules to specify how long to wait for responses and what action to take if a response timeout occurs.

3.1.6. Message Delivery Options


1. Unicast Message: One-to-one delivery
2. Multicast Message: One-to-many delivery
3. Broadcast Message: One-to-all delivery

3.2. Network Protocols and Standards

3.2.1. Protocols
1. Protocol suites are implemented by hosts and networking devices in software, hardware or both.
2. Protocols viewed in terms of layers, each higher level service depending on the functionality defined by the
protocols shown in the lower levels.

3.2.2. Network protocols


1. Protocols define a common format and set of rules for exchanging messages between devices.
2. Common network protocols are HTTP, TCP and IP.

3.2.3. Protocol Interaction


1. HTTP: Application protocol that governs the way a web server and a web client interact.
2. TCP: Transport protocol that manages the individual conversations.
3. IP: encapsulates the TCP segments into packets, assigns addresses, and delivers to the destination host.
4. Ethernet: allows communication over a data link and the physical transmission of data on the network media.
3.2.4. Protocol Suites and Industry Standards
1. Set of protocols that work together to provide comprehensive network communication services.
2. Specified by a standards organization or developed by a vendor.
3. TCP/IP protocol suite is an open standard any vendor is able to implement these protocols on their hardware or in
their software.

3.2.5. Development of TCP/IP


Advanced Research Projects Agency Network (ARPANET) was the predecessor to today’s Internet.

3.2.6. TCP/IP Protocol Suite

3.2.7. TCP/IP Communication Process


1. Sending encapsulation procedure:
1. Webserver prepares HTML page, application layer protocol sends the data to the transport layer.
2. Transport layer breaks the data into segments and identifies each.
3. IP source and destination addresses are added, creating an IP Packet.
4. Ethernet information is then added creating the Ethernet Frame, or data link frame.
5. Frame is delivered to the nearest router along the path towards the web client.
6. Each router adds new data link information before forwarding the packet.

2. Sending encapsulation procedure:


1. Client processes and removes each protocol header in the opposite order it was added:
2. First the Ethernet header is removed
3. Then the IP header
4. Then the Transport layer header
5. HTTP information is processed and sent to the client’s web browser

3.2.8. Open Standards


1. Open standards encourage interoperability, competition, and innovation.
2. Standards organizations are vendor-neutral, non-profit organizations established to develop and promote the
concept of open standards.
3.2.9. Internet Standards
1. Internet Society (ISOC): promotes open development and evolution of Internet use globally.
2. Internet Architecture Board (IAB): management and development of Internet standards.
3. Internet Engineering Task Force (IETF): develops, updates, and maintains Internet and TCP/IP technologies.
4. Internet Research Task Force (IRTF): research related to Internet and TCP/IP protocols.
5. Internet Corporation for Assigned Names and Numbers (ICANN): coordinates IP address allocation and
management of domain names.
6. Internet Assigned Numbers Authority (IANA): manages IP address allocation, domain name management
and protocol identifiers for ICANN.

3.2.10. Electronics and Communications Standard Organizations


1. Institute of Electrical and Electronics Engineers (IEEE): dedicated to advancing technological innovation and
creating standards in a wide area of industries including networking.
2. Electronic Industries Alliance (EIA): standards related to electrical wiring, connectors, and network racks.
3. Telecommunications Industry Association (TIA): standards for radio equipment, cellular towers, Voice over IP
(VoIP) devices, and satellite communications.
4. International Telecommunications Union-Telecommunication Standardization Sector (ITU-T):
standards for video compression, Internet Protocol Television (IPTV), and broadband communications.

3.2.11. Layered Model


1. Benefits of using a layered model include:
1. Assisting in protocol design since protocols at each layer have defined functions.
2. Fostering competition because products from different vendors can work together.
3. Preventing technology changes in one layer from affecting other layers.
4. Providing a common language to describe networking functions and capabilities.

3.2.12. OSI Reference Model


1. Application: contains protocols used for process-to-process communications.
2. Presentation: provides for common representation of the data.
3. Session: provides services to presentation layer to organize dialogue and manage data exchange.
4. Transport: defines services to segment, transfer, and reassemble the data.
5. Network: provides services to exchange individual pieces of data over the network between identified end devices.
6. Data Link: provides methods for exchanging data frames between devices over a common media.
7. Physical: mechanical, electrical, functional, and procedural means transmit bits across physical connections.

3.2.13. The TCP/IP Protocol Model: Open Standard.

3.3. Data Encapsulation

3.3.1. Message Segmentation


1. Large streams of data are divided into smaller, more manageable pieces to send over the network.
2. By sending smaller pieces, many different conversations can be interleaved on the network, called multiplexing.
3. Each piece must be labeled.
4. If part of the message fails to make it to the destination, only the missing pieces need to be retransmitted.
3.3.2. Protocol Data Units
1. As application data is passed down the protocol stack, information is added at each level.
2. This is known as the encapsulation process.
3. The form that the data takes at each layer is known as a Protocol Data Unit (PDU).
1. Data: Application layer PDU
2. Segment: Transport layer PDU
3. Packet: Network layer PDU
4. Frame: Data Link Layer PDU
5. Bits: Physical Layer PDU

3.3.3. Encapsulation Example


1. The encapsulation process works from top to bottom:
1. Data is divided into segments.
2. TCP segment is encapsulated in the IP Packet.
3. IP packet is encapsulated in the Ethernet Frame.
4. De-encapsulation process works from bottom to top.
5. De-encapsulation: process used by receiving device to remove one/more of protocol headers.
6. The data is de-encapsulated as it moves up the stack toward the end-user application.

3.3.4. Network Addresses


1. Source IP Address: The IP address of the sending device, the original source of the packet.
2. Destination IP Address: The IP address of the receiving device, the final destination of the packet.

3.3.5. Data Link Addresses


1. Data Link Address deliver data link frame from 1 network interface to another network interface on same network.
2. IP packet travels from source to destination it is encapsulated in a new data link frame when is forwarded by router

3.3.6. Devices on the Same Network


1. Network layer addresses, or IP addresses, indicate the original source and final destination.
2. Network portion: The left-most part of the address indicates which network the IP address is a member of.
3. Host portion: The remaining part of the address identifies a specific device on the network.
4. Data Link Frame which uses MAC addressing, is sent directly to the receiving device.
5. Sending to a remote network: the source and destination IP addresses represent hosts on different networks.
6. Data Link Frame cannot be sent directly to the remote destination host.
7. Frame is sent to the default gateway (nearest router interface).
8. Router removes received Layer 2 information and adds new data link information before forwarding out the exit
interface.

You might also like