Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
3 views

Chapter 3-Protocols and Models - Part I(1)

Chapter 3 discusses the importance of communication protocols in network communication, outlining the necessary rules for successful data exchange. It explains the TCP/IP and OSI models, data encapsulation, and how local hosts access resources. The chapter also details various network protocol requirements, functions, and the interaction between different protocols within a suite.

Uploaded by

alaahafiz1514
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Chapter 3-Protocols and Models - Part I(1)

Chapter 3 discusses the importance of communication protocols in network communication, outlining the necessary rules for successful data exchange. It explains the TCP/IP and OSI models, data encapsulation, and how local hosts access resources. The chapter also details various network protocol requirements, functions, and the interaction between different protocols within a suite.

Uploaded by

alaahafiz1514
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

CHAPTER 3

PROTOCOLS AND
MODELS

PART-I
Chapter Objectives
PART-I
• Describe the types of rules that are necessary to successfully communicate.
• Explain why protocols are necessary in network communication.
• Explain the purpose of adhering to a protocol suite.

PART-II
• Explain how the TCP/IP model and the OSI model are used to facilitate standardization in
the communication process.
• Explain how data encapsulation allows data to be transported across the network.
• Explain how local hosts access local resources on a network
Communication Fundamentals
Networks can vary in size and complexity. It is not enough to have a connection, devices must
agree on “how” to communicate.

There are three elements to any communication:


• There will be a source (sender).
• There will be a destination (receiver).
• There will be a channel (media) that provides for the path of communications to occur.
Communication Protocols
• All communications are governed by protocols.
• Protocols are the rules that communications will follow.
• These rules will vary depending on the protocol.

Two people communicating face-to-face Communication between two devices


Rule Establishment
• Individuals must use established rules or agreements to govern the conversation.
• The first message is difficult to read because it is not formatted properly. The
second shows the message properly formatted
• Protocols must account for the following requirements:
 An identified sender and receiver
 Common language and grammar
 Speed and timing of delivery
 Confirmation or acknowledgment requirements
Network Protocol Requirements
Common computer protocols must be in agreement and include the following requirements:
• Message encoding
• Message formatting and encapsulation
• Message size
• Message timing
• Message delivery options
Message Encoding
• Encoding is the process of converting information into another acceptable form for
transmission.
• Decoding reverses this process to interpret the information.

Message encoding and decoding occurs in computer communication


Message Formatting and Encapsulation
• When a message is sent, it must use a specific format or structure.
• Message formats depend on the type of message and the channel that is used to deliver the
message.

Correct format of addresses is required in human Fields of the Internet Protocol version 6 (IPv6) packet
communications when sending a letter identify the source of the packet and its destination
Message Size
Encoding between hosts must be in an appropriate format for the medium.
• Messages sent across the network are converted to bits
• The bits are encoded into a pattern of light, sound, or electrical impulses.
• The destination host must decode the signals to interpret the message.

It is necessary to break a long message into smaller pieces before sending it over the network
Message Timing
Message timing includes the following:

Flow Control – Manages the rate of data transmission and defines how much information can
be sent and the speed at which it can be delivered.

Response Timeout – Manages how long a device waits when it does not hear a reply from the
destination.

Access method - Determines when someone can send a message.


• There may be various rules governing issues like “collisions”. This is when more than one device
sends traffic at the same time and the messages become corrupt.
• Some protocols are proactive and attempt to prevent collisions; other protocols are reactive and
establish a recovery method after the collision occurs.
Message Delivery Options
Message delivery may one of the following methods:
• Unicast – one to one communication
• Multicast – one to many, typically not all
• Broadcast – one to all
Note: Broadcasts are used in IPv4 networks, but are not an option for IPv6.

Three types of data communications


Network Protocol Overview
Network protocols define a
common set of rules. Protocol Type Description
Network enable two or more devices to
• Can be implemented on devices
Communications communicate over one or more networks
in:
 Software Network Security secure data to provide authentication,
 Hardware data integrity, and data encryption
 Both Routing enable routers to exchange route
information, compare path information,
• Protocols have their own: and select best path
 Function Service Discovery used for the automatic detection of
 Format devices or services
 Rules
Network Protocol Functions
• Devices use agreed-upon protocols to communicate.
• Protocols may have one or many functions.

How does the computer send a message, across several


network devices, to the server?

Function Description
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
Flow Control Ensures data flows at an efficient rate
Sequencing Uniquely labels each transmitted segment of data
Error Detection Determines if data became corrupted during transmission
Application Interface Process-to-process communications between network applications
Protocol Interaction
• Networks require the use of several protocols.
• Each protocol has its own function and format.

Some common network protocols that are used when a device


sends a request to a web server for its web page.

Protocol Function
Hypertext Transfer  Governs the way a web server and a web client interact
Protocol (HTTP)  Defines content and format
Transmission Control  Manages the individual conversations
Protocol (TCP)  Provides guaranteed delivery
 Manages flow control
Internet Protocol (IP) Delivers messages globally from the sender to the receiver
Ethernet Delivers messages from one NIC to another NIC on the same Ethernet Local
Area Network (LAN)
Network Protocol Suites
Protocols must be able to work with other
protocols.
Protocol suite:
• A group of inter-related protocols
necessary to perform a communication
function
• Sets of rules that work together to help
solve a problem
The protocols are viewed in terms of layers:
• Higher Layers
• Lower Layers- concerned with moving Face-to-face communication described in terms of layers
data and provide services to upper
layers
TCP/IP Protocol Example
• TCP/IP protocols operate at the
application, transport, and internet
layers.
• The most common network access
layer LAN protocols are Ethernet and
WLAN (wireless LAN).

An example of the three TCP/IP protocols used to send packets


between the web browser of a host and the web server.
TCP/IP Protocol Suite
• TCP/IP is the protocol suite used by
the internet and includes many
protocols.
• TCP/IP is:
 An open standard protocol suite
that is freely available to the
public and can be used by any
vendor
 A standards-based protocol suite
that is endorsed by the
networking industry and
approved by a standards
organization to ensure Some popular protocols in the TCP/IP protocol suite
interoperability
TCP/IP Communication Process

A web server encapsulating and sending a A client de-encapsulating the web page
web page to a client. for the web browser

You might also like