Protocols and Models Flashcards

1
Q

Communication Rules

A

Necessary rules for successful communication.

Networks can vary in size and complexity. It is not enough to have a connection,
devices must agree on “how” to communicate.
There are three elements to any communication:
* There will be a source (sender).
* There will be a destination (receiver).
* There will be a channel (media) that provides for the path of communications to
occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Communications Fundamentals

A

Networks can vary in size and complexity. It is not enough to have a connection,
devices must agree on “how” to communicate.
There are three elements to any communication:
* There will be a source (sender).
* There will be a destination (receiver).
* There will be a channel (media) that provides for the path of communications to
occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rule Establishment

A
  • Individuals must use established rules or agreements to govern the conversation.
  • The first message is difficult to read because it is not formatted properly. The second shows
    the message properly formatted

Protocols must account for the following requirements:
* An identified sender and receiver
* Common language and grammar
* Speed and timing of delivery
* Confirmation or acknowledgment requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Encapsulation

A

Encapsulation is the process where protocols add their information to the data.

  • At each stage of the process, a PDU has a
    different name to reflect its new functions.
                                     * There is no universal naming convention for 
                                      PDUs, in this course, the PDUs are named 
                                      according to the protocols of the TCP/IP 
                                      suite. 
    
                                     * PDUs passing down the stack are as 
                                      follows:
                                      1. Data (Data Stream)
                                      2. Segment
                                      3. Packet
                                      4. Frame
                                      5. Bits (Bit Stream)
  • Encapsulation is a top down
    process.
  • The level above does its
    process and then passes it
    down to the next level of the
    model. This process is
    repeated by each layer until
    it is sent out as a bit stream.
  • Data is de-encapsulated as it moves up
    the stack.
  • When a layer completes its process,
    that layer strips off its header and
    passes it up to the next level to be
    processed. This is repeated at each
    layer until it is a data stream that the
    application can process.
    1. Received as Bits (Bit Stream)
    2. Frame
    3. Packet
    4. Segment
    5. Data (Data Stream)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Protocol Requirements

A

Common computer protocols must be in agreement and include the following
requirements:
* Message encoding
* Message formatting and encapsulation
* Message size
* Message timing
* Message delivery options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Message Encoding

A
  • Encoding is the process of converting information into another acceptable form for
    transmission.
  • Decoding reverses this process to interpret the information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Message Formatting and Encapsulation

A
  • When a message is sent, it must use a specific format or structure.
  • Message formats depend on the type of message and the channel that is used to
    deliver the message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Message Size

A

Encoding between hosts must be in an appropriate format for the medium.
* Messages sent across the network are converted to bits
* The bits are encoded into a pattern of light, sound, or electrical impulses.
* The destination host must decode the signals to interpret the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Message Timing

A

Message timing includes the following:
Flow Control – Manages the rate of data transmission and defines how much information
can be sent and the speed at which it can be delivered.
Response Timeout – Manages how long a device waits when it does not hear a reply from
the destination.
Access method - Determines when someone can send a message.
* There may be various rules governing issues like “collisions”. This is when more than one
device sends traffic at the same time and the messages become corrupt.
* Some protocols are proactive and attempt to prevent collisions; other protocols are
reactive and establish a recovery method after the collision occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Message Delivery Options

A

Message delivery may one of the following methods:
* Unicast – one to one communication
* Multicast – one to many, typically not all
* Broadcast – one to all

Note: Broadcasts are used in IPv4 networks, but are not an option for IPv6. Later we will also
see “Anycast” as an additional delivery option for IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Managing Message Size

A

Converting messages into transmissible bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network protocols

A

Define a common set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Protocol Functions

A
  • Devices use agreed-upon protocols
    to communicate .
    • Protocols may have may have one
      or functions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Addressing

A

Identifies sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reliability

A

Provides guaranteed delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flow Control

A

Ensures data flows at an efficient rate

17
Q

Sequencing

A

Uniquely labels each transmitted segment of data

18
Q

Error Detection

A

Determines if data became corrupted during transmission

19
Q

Application Interface

A

Process-to-process communications between network applications

20
Q

Protocol Interaction

A
  • Networks require the use of several
    protocols.
    • Each protocol has its own function and format
21
Q

Hypertext Transfer

A

Governs the way a web server and a web client interact

22
Q

Protocol (HTTP)

A

Defines content and format

23
Q

Transmission Control

A

Manages the individual conversations

24
Q

Protocol (TCP)

A

Provides guaranteed delivery

25
Q

Internet Protocol (IP)

A

Delivers messages globally from the sender to the receiver

26
Q

Ethernet

A
  • Delivers messages from one NIC to another NIC on the same Ethernet Local
  • Area Network (LAN)