Protocols and Models Flashcards
What are the three main elements of communication methods?
1) Message source: sender
2)Message destination:receiver, the destination receives the message and analyzes it
3)Channel: media which provides the message’s pathway
What should the devices do prior to communicating?
Must agree on how to communicate and must also format he message in an understandable way
What are the requirements protocols must account for in order to successfully send a message that is understood by the receiver?
1) An identified sender and receiver
2) Common language and grammar
3) Speed and timing of the delivery
4) Confirmation or acknowledgement requirements
What are the requirements computer protocol include?
1) Message encoding
2) Message formatting and encapsulation
3) Message size
4) Message timing
5) Message delivery options
Explain message encoding
Encoding is the process of converting information into another acceptable form. Decoding reverses this process to interpret the information.
Encoding between hosts must be in an appropriate format for the medium, messages sent into the network are first converted into bits by the host. Each bit is encoded into patterns of voltages on copper wires, infrared lights in optical fibers or microwaves for wireless systems. The destination host receives and decodes the signal to interpret the message.
Explain message format and encapsulation
Message format depend on the type of message, and the channel that is used to deliver the message.
A message that is sent over a computer needs to follow specific format rules in order to be delivered.
IPv6 identifies the source of the packet and it’s destination.
IP is responsible for sending a message from message source to destination over one or more networks.
Explain message size
The size restrictions (very strict) of frames require the source host to break a long message into individual pieces to that meets size requirements. The long message will e sent in separate frames, each contain a piece of the original message and its own addressing info. At the destination host, the individual pieces of messages will be reconstructed into the original message.
Note: Rules also depend on the channel used
Explain message timing
1) Flow Control
2) Response Time out
3) Access Method
Explain flow control
The process of managing the rate of data transmission. Flow control defines how much data can be sent and the speed at which it an be delivered. In network communication, there are network protocols used by the source and destination devices to negotiate and manage the flow of information.
Explain Response Time out
Hosts on the network use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs.
Explain Access method
This determines when someone can send a message. When a device wants to transmit on a wireless LAN, it is necessary for the WLAN network interface card (NIC) to determine whether the wireless medium is available.
Explain message delivery options
1) Unicast - Information is being transmitted to a single end device.
2) Multicast - Information is being transmitted to a one or more end devices.
3) Broadcast - Information is being transmitted to all end devices.
Explain Node Icon
Networking documents and topologies often represent networking and end devices using a node icon. Nodes are typically represented as a circle.
Define Network Protocols
a common format and set of rules for exchanging messages between devices.
They are implemented by end devices and intermediary devices in software, hardware or both.
What are the protocols needed to enable communications across one or more networks?
1) Network Communication Protocols
2) Network Security Protocols
3) Routing Protocols
4) Service Discovery Protocols
Define Network Communication Protocols
Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP)…
Define Network Security Protocols
Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
Define Routing Protocols
Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).
Define Service Discovery Protocols
Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.
What are the functions of the agreed-upon protocols that are used to communicate between computers and network devices?
1) Addressing
2) Reliability
3) Flow Control
4) Sequencing
5) Error Detection
6) Application Interface