NETACAD MODULE 3 Flashcards
What requirements must protocols account for to successfully deliver a message?
An identified sender and receiver
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledgment requirements
What is encoding?
Encoding is the process of converting information into another acceptable form, for transmission. Decoding reverses this process to interpret the information.
Encoding between hosts must be in an appropriate format for the medium. Messages sent across the network are first converted into bits by the sending host. Each bit is encoded into a pattern of voltages on copper wires, infrared light in optical fibers, or microwaves for wireless systems. The destination host receives and decodes the signals to interpret the message.
Explain message formatting and encapsulation
When a message is sent from source to destination, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message.
Similar to sending a letter, a message that is sent over a computer network follows specific format rules for it to be delivered and processed. As application data is passed down the protocol stack on its way to be transmitted across the network media, various protocol information is added at each level. This is known as the encapsulation process.
Internet Protocol (IP) is a protocol with a similar function to the envelope example. In the figure, the fields of the Internet Protocol version 6 (IPv6) packet identify the source of the packet and its destination. IP is responsible for sending a message from the message source to destination over one or more networks.
How does message size affect the transmission of a message?
The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. The long message will be sent in separate frames, with each frame containing a piece of the original message. Each frame will also have its own addressing information. At the receiving host, the individual pieces of the message are reconstructed into the original message.
What does message timing entail?
- Flow Control - This is the process of managing the rate of data transmission. Flow control defines how much information can be sent and the speed at which it can be delivered. For example, if one person speaks too quickly, it may be difficult for the receiver to hear and understand the message. In network communication, there are network protocols used by the source and destination devices to negotiate and manage the flow of information.
- Response Timeout - If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly. The person may repeat the question or instead, may go on with the conversation. Hosts on the network use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs.
- Access method - This determines when someone can send a message. When a device wants to transmit on a wireless LAN, it is necessary for the WLAN network interface card (NIC) to determine whether the wireless medium is available.
What are the three types of data communications?
Unicast - Information is being transmitted to a single end device.
Multicast - Information is being transmitted to a one or more end devices.
Broadcast - Information is being transmitted to all end devices.
Describe the following functions of protocols: Addressing, Reliability, Flow Control, Sequencing, Error Detection, Application Interface
Addressing- This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.
Reliability- This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.
Flow control- This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.
Sequencing- This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.
Error Detection- This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.
Application Interface- This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.
Describe the following protocols: HTTP, TCP, IP and Ethernet
HyperText Transfer Protocol- Defines the content and formatting of the requsts and responses exachanged between a web server and web client
Transmission Control Protocol (TCP)- Responsible for guaranteeing the reliable delivery of information and managing flow control between the end devices
Internet Protocol (IP) - Responsible for delivering messages from the sender to the receiver. Used by routers to forward messages across multiple networks
Ethernet- Responsible for delivery of messages from one NIC to another NIC on the same Ethernet LAN
BGP and OSPF are examples of which type of protocol?
Routing
Give examples of service discovery protocols
DNS and DHCP
What is a protocol suite and give a brief description
A protocol suite is a group of inter-related protocols necessary to perform a communication function.
One of the best ways to visualize how the protocols within a suite interact is to view the interaction as a stack. A protocol stack shows how the individual protocols within a suite are implemented. The protocols are viewed in terms of layers, with each higher-level service depending on the functionality defined by the protocols shown in the lower levels. The lower layers of the stack are concerned with moving data over the network and providing services to the upper layers, which are focused on the content of the message being sent.
Which TCP/IP Protocols are in which layers?
Application- HTTP
Transport- TCP
Internet- IP
Network Access- There are no TCP/IP protocols in the network access layer. The most common network access layer LAN protocols are Ethernet and WLAN (wireless LAN) protocols
- Network access layer protocols are responsible for delivering the IP packet over the physical medium.
Give a detailed list of TCP/IP protocols in each network layer
- APPLICATION
- Name System- DNS
- Host Config- DHCPv4, DHCPv6, SLAAC
- Email- SMTP, POP3(Post Office Protocol version 3. Enables clients to retrieve email from a mail server and download the email to the client’s local mail application.), IMAP(Internet Message Access Protocol. Enables clients to access email stored on a mail server as well as maintaining email on the server.)
- File Transfer- FTP(Sets the rules that enable a user on one host to access and transfer files to and from another host over a network.), SFTP(SSH File Transfer Protocol. As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session), TFTP(Trivial File Transfer Protocol. A simple, connectionless file transfer protocol with best-effort)
- Web service- HTTP, HTTPS, REST(Representational State Transfer. A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications
2.TRANSPORT
Connection oriented- TCP
Connectionless- UDP( User Datagram Protocol. Enables a process running on one host to send packets to a process running on another host.)
- INTERNET
- Internet Protocol- IPv4(Receives message segments from the transport layer, packages messages into packets, and addresses packets for end-to-end delivery over a network., IPv6, NAT(Network Address Translation. Translates IPv4 addresses from a private network into globally unique public IPv4 addresses.)
- Messaging- ICMPv4( Internet Control Message Protocol for IPv4. Provides feedback from a destination host to a source host about errors in packet delivery), ICMPv6, ICMPv6 ND
- Routing- OSPF(Open Shortest Path First. Link-state routing protocol that uses a hierarchical design based on areas. OSPF is an open standard interior routing protocol.), EIGRP( Enhanced Interior Gateway Routing Protocol. Uses a composite metric based on bandwidth, delay, load and reliability), BGP( Border Gateway Protocol. An open standard exterior gateway routing protocol used between Internet Service Providers (ISPs).)
4.NETWORK ACCESS
Address resolution- ARP(Address Resolution Protocol. Provides dynamic address mapping between an IPv4 address and a hardware address.)
Data link Protocols-Ethernet(Defines the rules for wiring and signaling standards of the network access layer.), WLAN( Wireless Local Area Network. Defines the rules for wireless signaling across the 2.4 GHz and 5 GHz radio frequencies.)
What are the two important aspects of TCP/IP for vendors and manufacturers
Open Standard Protocol suite- Freely available to the public
Standards based Protocol suite- Has been endorsed by the networking industry and approved by a standards organization
What are the advantages of the use of open standards?
Open standards encourage interoperability, competition, and innovation. They also guarantee that the product of no single company can monopolize the market or have an unfair advantage over its competition.