Protocols and Models Flashcards
Communication Rules
Necessary rules for successful communication.
Networks can vary in size and complexity. It is not enough to have a connection,
devices must agree on “how” to communicate.
There are three elements to any communication:
* There will be a source (sender).
* There will be a destination (receiver).
* There will be a channel (media) that provides for the path of communications to
occur.
Communications Fundamentals
Networks can vary in size and complexity. It is not enough to have a connection,
devices must agree on “how” to communicate.
There are three elements to any communication:
* There will be a source (sender).
* There will be a destination (receiver).
* There will be a channel (media) that provides for the path of communications to
occur.
Rule Establishment
- Individuals must use established rules or agreements to govern the conversation.
- The first message is difficult to read because it is not formatted properly. The second shows
the message properly formatted
Protocols must account for the following requirements:
* An identified sender and receiver
* Common language and grammar
* Speed and timing of delivery
* Confirmation or acknowledgment requirements
Data Encapsulation
Encapsulation is the process where protocols add their information to the data.
- At each stage of the process, a PDU has a
different name to reflect its new functions.* There is no universal naming convention for PDUs, in this course, the PDUs are named according to the protocols of the TCP/IP suite. * PDUs passing down the stack are as follows: 1. Data (Data Stream) 2. Segment 3. Packet 4. Frame 5. Bits (Bit Stream)
- Encapsulation is a top down
process. - The level above does its
process and then passes it
down to the next level of the
model. This process is
repeated by each layer until
it is sent out as a bit stream. - Data is de-encapsulated as it moves up
the stack. - When a layer completes its process,
that layer strips off its header and
passes it up to the next level to be
processed. This is repeated at each
layer until it is a data stream that the
application can process.- Received as Bits (Bit Stream)
- Frame
- Packet
- Segment
- Data (Data Stream)
Network Protocol Requirements
Common computer protocols must be in agreement and include the following
requirements:
* Message encoding
* Message formatting and encapsulation
* Message size
* Message timing
* Message delivery options
Message Encoding
- Encoding is the process of converting information into another acceptable form for
transmission. - Decoding reverses this process to interpret the information.
Message Formatting and Encapsulation
- When a message is sent, it must use a specific format or structure.
- Message formats depend on the type of message and the channel that is used to
deliver the message.
Message Size
Encoding between hosts must be in an appropriate format for the medium.
* Messages sent across the network are converted to bits
* The bits are encoded into a pattern of light, sound, or electrical impulses.
* The destination host must decode the signals to interpret the message.
Message Timing
Message timing includes the following:
Flow Control – Manages the rate of data transmission and defines how much information
can be sent and the speed at which it can be delivered.
Response Timeout – Manages how long a device waits when it does not hear a reply from
the destination.
Access method - Determines when someone can send a message.
* There may be various rules governing issues like “collisions”. This is when more than one
device sends traffic at the same time and the messages become corrupt.
* Some protocols are proactive and attempt to prevent collisions; other protocols are
reactive and establish a recovery method after the collision occurs.
Message Delivery Options
Message delivery may one of the following methods:
* Unicast – one to one communication
* Multicast – one to many, typically not all
* Broadcast – one to all
Note: Broadcasts are used in IPv4 networks, but are not an option for IPv6. Later we will also
see “Anycast” as an additional delivery option for IPv6.
Managing Message Size
Converting messages into transmissible bits.
Network protocols
Define a common set of rules.
Network Protocol Functions
- Devices use agreed-upon protocols
to communicate .- Protocols may have may have one
or functions.
- Protocols may have may have one
Addressing
Identifies sender and receiver
Reliability
Provides guaranteed delivery