03_Protocols and Models Flashcards
The Rules
Describe the types of rules that are necessary to successfully communicate.
All communication methods have three elements in common: message source (sender), message destination (receiver), and channel. Sending a message is governed by rules called protocols. Protocols must include: an identified sender and receiver, common language and grammar, speed and timing of delivery, and confirmation or acknowledgment requirements. Common computer protocols include these requirements: message encoding, formatting and encapsulation, size, timing, and delivery options. Encoding is the process of converting information into another acceptable form, for transmission. Decoding reverses this process to interpret the information. Message formats depend on the type of message and the channel that is used to deliver the message. Message timing includes flow control, response timeout, and access method. Message delivery options include unicast, multicast, and broadcast.
Protocols
- Explain why protocols are necessary in network communication.
- Protocols must account for the following requirements to successfully deliver a message that is understood by the receiver:
- An identified sender and receiver
- Common language and grammar
- Speed and timing of delivery
- Confirmation or acknowledgment requirements
Protocols are implemented by end-devices and intermediary devices in software, hardware, or both. A message sent over a computer network typically requires the use of several protocols, each one with its own functions and format. Each network protocol has its own function, format, and rules for communications. The Ethernet family of protocols includes IP, TCP, HTTP, and many more. Protocols secure data to provide authentication, data integrity, and data encryption: SSH, SSL, and TLS. Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network: OSPF and BGP. Protocols are used for the automatic detection of devices or services: DHCP and DNS. Computers and network devices use agreed-upon protocols that provide the following functions: addressing, reliability, flow control, sequencing, error-detection, and application interface.
Protocol Suites
Explain the purpose of adhering to a protocol suite.
A protocol suite is a group of inter-related protocols necessary to perform a communication function. A protocol stack shows how the individual protocols within a suite are implemented. Since the 1970s there have been several different protocol suites, some developed by a standards organization and others developed by various vendors. TCP/IP protocols are available for the application, transport, and internet layers. TCP/IP is the protocol suite used by today’s networks and internet. TCP/IP offers two important aspects to vendors and manufacturers: open standard protocol suite, and standards-based protocol suite. The TCP/IP protocol suite communication process enables such processes as a web server encapsulating and sending a web page to a client, as well as the client de-encapsulating the web page for display in a web browser.
Standards Organizations
Explain the role of standards organizations in establishing protocols for network interoperability.
Open standards encourage interoperability, competition, and innovation. Standards organizations are usually vendor-neutral, non-profit organizations established to develop and promote the concept of open standards. Various organizations have different responsibilities for promoting and creating standards for the internet including: ISOC, IAB, IETF, and IRTF. Standards organizations that develop and support TCP/IP include: ICANN and IANA. Electronic and communications standards organizations include: IEEE, EIA, TIA, and ITU-T.
Reference Models
Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process.
The two reference models that are used to describe network operations are OSI and TCP/IP.
Data Encapsulation
Explain how data encapsulation allows data to be transported across the network.
Data Access
Explain how local hosts access local resources on a network.
The network and data link layers are responsible for delivering the data from the source device to the destination device. Protocols at both layers contain a source and destination address, but their addresses have different purposes:
Network layer source and destination addresses - Responsible for delivering the IP packet from the original source to the final destination, which may be on the same network or a remote network.
Data link layer source and destination addresses - Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network.
The IP addresses indicate the original source IP address and final destination IP address. An IP address contains two parts: the network portion (IPv4) or Prefix (IPv6) and the host portion (IPv4) or Interface ID (IPv6). When the sender and receiver of the IP packet are on the same network, the data link frame is sent directly to the receiving device. On an Ethernet network, the data link addresses are known as Ethernet Media Access Control (MAC) addresses. When the sender of the packet is on a different network from the receiver, the source and destination IP addresses will represent hosts on different networks. The Ethernet frame must be sent to another device known as the router or default gateway.
Message source (sender)
Message sources are people, or electronic devices, that need to send a message to other individuals or devices.
Message Destination (receiver)
The destination receives the message and interprets it.
Channel
This consists of the media that provides the pathway over which the message travels from source to destination.
Common computer protocols include the following requirements:
- Message encoding
- Message formatting and encapsulation
- Message size
- Message timing
- Message delivery options
Message encoding
Encoding is the process of converting information into another acceptable form, for transmission. Decoding reverses this process to interpret the information.
Message formatting and encapsulation
An envelope has the address of the sender and receiver, each located at the proper place on the envelope. If the destination address and formatting are not correct, the letter is not delivered.
The process of placing one message format (the letter) inside another message format (the envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the recipient and the letter is removed from the envelope.
Message size
Another rule of communication is message size.
Message timing
- Flow Control - This is the process of managing the rate of data transmission. Flow control defines how much information can be sent and the speed at which it can be delivered. For example, if one person speaks too quickly, it may be difficult for the receiver to hear and understand the message. In network communication, there are network protocols used by the source and destination devices to negotiate and manage the flow of information.
- Response Timeout - If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly. The person may repeat the question or instead, may go on with the conversation. Hosts on the network use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs.
- Access method - This determines when someone can send a message. Click Play in the figure to see an animation of two people talking at the same time, then a “collision of information” occurs, and it is necessary for the two to back off and start again. Likewise, when a device wants to transmit on a wireless LAN, it is necessary for the WLAN network interface card (NIC) to determine whether the wireless medium is available.
Message Delivery Options
- Unicast - Information is being transmitted to a single end device.
- Multicast - Information is being transmitted to a one or more end devices.
- Broadcast - Information is being transmitted to all end devices.
What is the process of converting information into the proper form for transmission?
encoding
Which step of the communication process is concerned with properly identifying the address of the sender and receiver?
formatting
Which three are components of message timing? (Choose three.)
- flow control
- access method
- response timeout
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?
multicast
Network Communications Protocols
Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.
Network Security Protocols
Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
Routing Protocols
Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).
Service Discovery Protocols
Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.
Computers and network devices use agreed-upon protocols to communicate
- Addressing
- Reliability
- Flow control
- Sequencing
- Error Detection
- Application Interface
Addressing
This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.
Reliability
This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.
Flow control
This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.
Sequencing
This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.
Error Detection
This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.
Application Interface
This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.
Hyptertext Transfer Protocol (HTTP)
This protocol governs the way a web server and a web client interact. HTTP defines the content and formatting of the requests and responses that are exchanged between the client and server.
Transmission Control Protocol (TCP)
This protocl manages the individual conversations. TCP is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices
Internet Protocol (IP)
This protocol is responsible for delivering messages from the sender to the receiver. IP is used by routers to forward the messages across multiple networks
Ethernet
This protocol is responsible for the delivery of messages from one NIC to another NIC on the same Ethernet local area network (LAN).
BGP and OSPF are examples of which type of protocol?
routing
Which two protocols are service discovery protocols? (Choose two.)
- DNS
- DHCP
What is the purpose of the sequencing function in network communication?
to uniquely label transmitted segments of data for proper reassembly by the receiver
This protocol is responsible for guaranteeing the reliable delivery of information.
TCP
Internet Protocol Suite or TCP/IP
This is the most common and relevant protocol suite used today
Open Systems Interconnection (OSI) protocols
This is a family of protocols developd jointly in 1977 by the International Organization for Standardization (ISO) and the International Telecommunications Union (ITU). The OSI protocol also included a seven-layer model called the OSI reference model. The OSI reference model categorizes the functions of its protocols. Today OSI is mainly known for its layered model. The OSI protocols have largely been replaced by TCP/IP
AppleTalk
A short-lived proprietary protocol suite released by Apple Inc. in 1985 for Apple devices. In 1995, Apple adopted TCP/IP to replace AppleTalk
Novell NetWare
A short-lived proprietary protocol suite and network operating system developed by Novell Inc. in 1983 using the IPX network protocol. In 1995, Novell adopted
TCP/IP Protocol Example
TCP/IP protocols are available for the application, transport, and internet layers. There are no TCP/IP protocols in the network access layer. The most common network access layer LAN protocols are Ethernet and WLAN (wireless LAN) protocols. Network access layer protocols are responsible for delivering the IP packet over the physical medium.
Web Server Internet
(Layer Name | Protocol Stack)
Application | Hypertext Transfer Protocol (HTTP)
Transport | Transmission Control Protocol (TCP)
Internet | Internet Protocol (IP)
Network Access | Ethernet
TCP/IP Protocol Suite
TCP/IP Layers
Application Layer:
- Name System
DNS
- Host Config
DHCPv4
DHCPv6
SLAAC - Email
SMTP
POP3
IMAP - File Transfer
FTP
SFTP
TFTP - Web Service
HTTP
HTTPS
REST
Transport Layer
- Connection-Oriented
TCP
- Connectionless
UDP
Internet Layer: - Internet Protocol IPv4 IPv6 NAT
- Messaging
ICMPv4
ICMPv6
ICMPv6 ND - Routing Protocols
OSPF
EIGRP
BGP
Network Access Layer:
- Address Resolution
ARP
- Data Link Protocols
Ethernet
WLAN
TCP/IP has two important aspects for vendors and manufacturers:
- Open standard protocol suite - This means it is freely available to the public and can be used by any vendor on their hardware or in their software
- Standards-based protocol suite - This means it has been endorsed by the networking industry and approved by a standards organization. This ensures that products from different manufacturers can interoperate successfully.