Module 3
Module 3
❖ Rule Establishment
▪ Individuals must use established rules or agreements to govern the conversation.
▪ The first message is difficult to read because it is not formatted properly. The second shows
the message properly formatted
|Page1
❖ Network Protocol Requirements
Common computer protocols must be in agreement and include the following requirements:
▪ Message encoding
▪ Message formatting and encapsulation
▪ Message size
▪ Message timing
▪ Message delivery options
Message Encoding
• Encoding is the process of converting information into another acceptable form for
transmission.
• Decoding reverses this process to interpret the information.
|Page2
Message Size
• Encoding between hosts must be in an appropriate format for the medium.
• Messages sent across the network are converted to bits
• The bits are encoded into a pattern of light, sound, or electrical impulses.
• The destination host must decode the signals to interpret the message.
Message Timing
Message timing includes the following:
• Flow Control – Manages the rate of data transmission and defines how much information
can be sent and the speed at which it can be delivered.
• Response Timeout – Manages how long a device waits when it does not hear a reply from
the destination.
• Access method - Determines when someone can send a message.
• There may be various rules governing issues like “collisions”. This is when more
than one device sends traffic at the same time and the messages become corrupt.
• Some protocols are proactive and attempt to prevent collisions; other protocols are
reactive and establish a recovery method after the collision occurs.
Message Delivery Options
Message delivery may one of the following methods:
• Unicast – one to one communication
• Multicast – one to many, typically not all
• Broadcast – one to all
Note: Broadcasts are used in IPv4 networks, but are NOT an option for IPv6. Later we will
also see “Anycast” as an additional delivery option for IPv6.
|Page3
➢ 3.2 Protocols
Network Protocol Overview
Network protocols define a common set of rules.
Can be implemented on
devices in:
• Software
• Hardware
• Both
Function Description
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
Flow Control Ensures data flows at an efficient rate
Sequencing Uniquely labels each transmitted segment of data
Error Detection Determines if data became corrupted during transmission
Application Interface Process-to-process communications between network applications
Addressing Identifies sender and receiver
|Page4
Protocol Interaction
• Networks require the use of several protocols.
• Each protocol has its own function and format.
Protocol Function
Hypertext Transfer • Governs the way a web server and a web client interact
Protocol (HTTP) • Defines content and format
Transmission Control • Manages the individual conversations
Protocol (TCP) • Provides guaranteed delivery
• Manages flow control
Internet Protocol (IP) • Delivers messages globally from the sender to the receiver
Ethernet • Delivers messages from one NIC to another NIC on the same
Ethernet Local Area Network (LAN)
|Page5
There are several protocol suites.
• Internet Protocol Suite or TCP/IP- The most common protocol suite and maintained by
the Internet Engineering Task Force (IETF)
• Open Systems Interconnection (OSI) protocols- Developed by the International
Organization for Standardization (ISO) and the International Telecommunications Union
(ITU)
• AppleTalk- Proprietary suite release by Apple Inc.
• Novell NetWare- Proprietary suite developed by Novell Inc.
|Page6
TCP/IP Protocol Suite
• TCP/IP is the protocol suite used by the internet and includes many protocols.
TCP/IP is:
• An open standard protocol suite that is freely available to the public and can be used by any
vendor
• A standards-based protocol suite that is endorsed by the networking industry and approved
by a standards organization to ensure interoperability
|Page7
➢ 3.4 Standards Organizations
Open Standards
Open standards encourage:
• Interoperability التوافقيه
• Competition التنافس
• Innovationاالبتكار
|Page8
➢ 3.5 Reference Models
The Benefits of Using a Layered Model
Complex concepts such as how a network operates can be difficult to explain and understand.
For this reason, a layered model is used.
Two layered models describe
network operations:
• Open System Interconnection
(OSI) Reference Model
|Page9
The OSI Reference Model
OSI Model Layer Description
7 - Application Contains protocols used for process-to-process communications.
Provides for common representation of the data transferred between
6 - Presentation
application layer services.
Provides services to the presentation layer and to manage data
5 - Session
exchange.
Defines services to segment, transfer, and reassemble the data for
4 - Transport
individual communications.
Provides services to exchange the individual pieces of data over the
3 - Network
network.
2 - Data Link Describes methods for exchanging data frames over a common media.
Describes the means to activate, maintain, and de-activate physical
1 - Physical
connections.
OSI and TCP/IP Model Comparison
• The OSI model divides the network access layer and the application layer of the TCP/IP
model into multiple layers.
• The TCP/IP protocol suite does not specify which protocols to use when transmitting over a
physical medium.
• OSI Layers 1 and 2 discuss the necessary procedures to access the media and the physical
means to send data over a network.
| P a g e 10
➢ 3.6 Data Encapsulation
Segmenting Messages
Segmenting is the process of breaking up messages into smaller units. Multiplexing is the
processes of taking multiple streams of segmented data and interleaving them together.
Segmenting messages has two primary benefits:
• Increases speed - Large amounts of data can be sent over the network without tying up a
communications link.
• Increases efficiency - Only segments which fail to reach the destination need to be
retransmitted, not the entire data stream.
Sequencing
Sequencing messages is the process of numbering the segments so that the message may be
reassembled at the destination.
TCP is responsible for sequencing the individual segments.
| P a g e 11
Protocol Data Units
Encapsulation is the process where protocols add their information to the data.
• At each stage of the process, a PDU has a different name to reflect its new functions.
• There is no universal naming convention for PDUs, in this course, the PDUs are named
according to the protocols of the TCP/IP suite.
Encapsulation Example
• Encapsulation is a top down process.
• The level above does its process and then passes it down to the next level of the model. This
process is repeated by each layer until it is sent out as a bit stream.
| P a g e 12
De-encapsulation Example
• Data is de-encapsulated as it moves up the stack.
• When a layer completes its process, that layer strips off its header and passes it up to the
next level to be processed. This is repeated at each layer until it is a data stream that the
application can process.
| P a g e 13
Layer 3 Logical Address
The IP packet contains two IP addresses:
• Source IP address - The IP address of the sending device, original source of the packet.
• Destination IP address - The IP address of the receiving device, final destination of the
packet.
These addresses may be on the same link or remote.
| P a g e 14
Role of the Data Link Layer Addresses: Same IP Network
• When devices are on the same Ethernet network the data link frame will use the actual
MAC address of the destination NIC.
• MAC addresses are physically embedded into the Ethernet NIC and are local addressing.
• The Source MAC address will be that of the originator on the link.
• The Destination MAC address will always be on the same link as the source, even if the
ultimate destination is remote.
| P a g e 15
Role of the Network Layer Addresses
When the source and destination have a different network portion, this means they are on
different networks.
• PC1 – 192.168.1
• Web Server – 172.16.1
| P a g e 16
The data link addressing is local addressing so it will have a source and destination for each
link.
• The MAC addressing for the first segment is :
• Source – AA-AA-AA-AA-AA-AA (PC1) Sends the frame.
• Destination – 11-11-11-11-11-11 (R1- Default Gateway MAC) Receives the frame.
Note: While the L2 local addressing will change from link to link or hop to hop, the L3
addressing remains the same.
Data Link Addresses
• Since data link addressing is local addressing, it will have a source and destination for each
segment or hop of the journey to the destination.
• The MAC addressing for the first segment is:
• Source – (PC1 NIC) sends frame
• Destination – (First Router- DGW interface) receives frame
| P a g e 17
The MAC addressing for the last segment is:
• Source – (Second Router- exit interface) sends frame
• Destination – (Web Server NIC) receives frame
• Notice that the packet is not modified, but the frame is changed, therefore the L3 IP
addressing does not change from segment to segment like the L2 MAC addressing.
• The L3 addressing remains the same since it is global and the ultimate destination is still the
Web Server.
| P a g e 18
Summery
The Rules
• Protocols must have a sender and a receiver.
• Common computer protocols include these requirements: message encoding, formatting and
encapsulation, size, timing, and delivery options.
Protocols
• To send a message across the network requires the use of several protocols.
• Each network protocol has its own function, format, and rules for communications.
Protocol Suites
• A protocol suite is a group of inter-related protocols.
• TCP/IP protocol suite are the protocols used today.
Standards Organizations
• Open standards encourage interoperability, competition, and innovation.
Reference Models
• The two models used in networking are the TCP/IP and the OSI model.
• The TCP/IP model has 4 layers and the OSI model has 7 layers.
Data Encapsulation
• The form that a piece of data takes at any layer is called a protocol data unit (PDU).
• There are five different PDUs used in the data encapsulation process: data, segment, packet,
frame, and bits
Data Access
• The Network and Data Link layers are going to provide addressing to move data through
the network.
• Layer 3 will provide IP addressing and layer 2 will provide MAC addressing.
• The way these layers handle addressing will depend on whether the source and the
destination are on the same network or if the destination is on a different network from the
source.
| P a g e 19