Home PageStudent Resources
Connect with us: Full Length Courses
Short Courses
Class WikisSocialsEnd Navigation |
Main /
Chapter 3 - Network Protocols and Communications3.0 Network Protocols and Communications3.0.1 Introduction >3.0.1.1 IntroductionUpon completion of this learner you will be able to:
3.0.1 Introduction >3.0.1.2 Class Activity - Designing a Communication SystemThe image on this page shows the following common standards organizations:
The description given for this image is " Network Protocols and Standards make network communication easier." ObjectivesExplain the role of protocols and standards organizations in facilitating interoperability in network communications.
In this activity, you will determine ways to communicate when standards are not present or agreed upon. You will also resolve a communication issue by establishing standards for communication.
3.1 Rules of Communication3.1.1 The Rules >3.1.1.1 what is Communication?Figure 1 on this page is an animation of a conversation taking place between two people. This shows that in order for successful communication there needs to be:
Figure 2 on this page is an animation of a conversation taking place between two computers. This shows that in order for successful communication between computers there also needs to be:
3.1.1 The Rules >3.1.1.2 Establishing the RulesFigure 1 on this page is a box displaying the following two sentences used to represent the importance of establishing rules for communication:
There is a Translate button that the learner can activate that will add the spaces between the words and also translate form Spanish to English.
Figure 2 on this page is a star diagram with the word protocols in the center and the following branches:
3.1.1 The Rules >3.1.1.3 Message encodingFigure 1 on this page is an animation of the communication process between two people. A woman is thinking of a message, she formulates the message and transmits it to a man who receives the message. This is used to demonstrate the communication process. Figure 2 on this page is an animation of the communication process between two computers. A data packet is formed on a computer and then the message is transmitted to a receiving computer. 3.1.1 The Rules >3.1.1.4 Message formatting and EncapsulationFigure 1 on this page is an animation used to demonstrate the rules used in communication. The figure shows an envelope that has a recipient address and a return address on it. The components of the letter represent the following:
Figure 2 on this page illustrates the format and contents of a frame. This encapsulation has the frame addressing on one end, made up of Destination (physical/hardware address) and Source (physical/hardware address), the encapsulated message in the middle, made up of Start Flag (start of message indicator), Recipient (destination identifier), Sender (source identifier) and Encapsulated Data (bits). At the end is the End of Frame (end of message indicator). 3.1.1 The Rules >3.1.1.5 Message sizeFigure 1 on this page is an animation of the following communication process between two people, specifically on the message size:
This represents segmenting of data. Figure 2 on this page is an animation of the following communication process between two computers:
3.1.1 The Rules >3.1.1.6 Message timingFigure 1 on this page shows a woman calling a man on the phone and each is asking the other a question at the same time. Neither one can understand the other. This represents access method. Figure 2 on this page shows the woman asking if the man can hear her, and the man doesn’t answer because he cannot understand the woman. This represents the need for flow control. Figure 3 on this page shows the man not answering her, so she repeats the question. This is representing the response timeout of a communication. 3.1.1 The Rules >3.1.1.7 Message delivery OptionsFigure 1 on this page shows the following three ways of sending a message:
Figure 2 on this page shows a computer sending a message to a switch that has four other computers connected to it. The different processes are:
3.2.1 Protocols >3.2.1.1 Protocols: Rules that Govern CommunicationThe figure on this page illustrates the following example of a communication session between two people. One person is asking another person where the cafeteria is:
3.2.1 Protocols >3.2.1.2 Network ProtocolsFigure 1 on this page shows the role of protocols in data transfer as follows:
Figure 2 on this page shows routers sharing information about pathways to other networks as follows:
It is common for routers to share information. Figure 3 on this page shows routers communicating with each other regarding a slow path due to another path that is down as follows:
This sharing of information is critical to a network. Figure 4 on this page shows the setup and termination of a data transfer session between a host and a server as follows:
3.2.1 Protocols >3.2.1.3 Interaction of ProtocolsThe figure on this page depicts the protocol stack interaction during a web server and a web client communication as follows:
3.2.2 Protocols suites3.2.2 Protocols suites >3.2.2.1 Protocol Suites and Industry standardsThe figure on this page is a table that illustrates the four different protocol suites as follows:
3.2.2 Protocols suites >3.2.2.2 Creation of the Internet and Development of TCP/IPThe figure on this page is a timeline that shows the evolution of the Internet starting from 1965. A few highlights in time are as follows:
3.2.2 Protocols suites >3.2.2.3 TCP/IP Protocol Suite and Communication ProcessFigure 1 on this page lists the many TCP/IP protocols organised in layers using the TCP/IP protocol model.
Figure 2 on this page is an animation that depicts the protocol encapsulation process involved when a web server sends a web page to a client across a network. A detailed description is in the page notes. Figure 3 on this page is an animation that depicts the protocol de-encapsulation process involved when a web client receives a web page from a web server across a network. This is the reverse of figure 2. 3.2.2 Protocols suites >3.2.2.4 Activity-mapping the protocols of the TCP/IP suiteThe figure on this page displays the following list of TCP/IP protocols:
A 4 column table is also displayed with the following column headings representing various layers of the TCP/IP model:
The user is asked to match each of the TCP/IP protocols with the corresponding layer of the TCP/IP model. 3.2.3 Standards Organizations >3.2.3.1 Open StandardsThe image on this page shows common standards organizations including:
3.2.3 Standards Organizations >3.2.3.2 I SOC, IAB and IETFThe figure on this page shows the organizational chart for the Internet Society (ISOC). The Internet Architecture Board (IAB) is the only branch off of the Internet Society, and it has two branches, the Internet Engineering Task Force and the Internet Research Task Force. 3.2.3 Standards Organizations >3.2.3.3 IEEThe figure on this page lists many IEEE 8 0 2 working groups and study groups as follows:
3.2.3 Standards Organizations >3.2.3.4 ISOThe figure on this page shows the symbol for the International Organization for Standardization, also known as the ISO. 3.2.3 Standards Organizations >3.2.3.5 Other Standards OrganisationsThe figure on this page shows common standards organizations as follows:
3.2.3 Standards Organizations >3.2.3.6 Lab - Researching Networking StandardsSee Lab Descriptions. 3.2.3 Standards Organizations >3.2.3.7 Activity - Standards Body Scavenger HuntOn this page, links are displayed to the six standards organisations that are responsible for creating, developing and monitoring many of the protocols/standards used in today's communications world. The links are:
A 7 column table is also displayed. The first column lists the following descriptions or functions:
The remaining columns have the six organisation names as column headings. The user is asked to read the page provided for each organisation and match the standards organisation to its description (or function). 3.2.4 Reference models >3.2.4.1 The Benefits of Using a Layered ModelThe figure on this page shows the two competing networking models side by side, the seven layer OSI model and the four layer TCP/IP model. The main TCP/IP suite protocols are listed for each of the layers as follows:
IC MP v 4 and ICMP v 6.
3.2.4 Reference models >3.2.4.2 The OSI Reference modelThe figure on this page lists the seven layers of the OSI model and the following brief descriptions of what each layer provides: 7. Application: The application layer provides the means for the end-to-end connectivity between individual in human network using data networks. 6. Presentation: The Presentation Layer provides for common representation of the data transferred between application layer services. 5. Session: The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange. 4. Transport: The Transport Layer define services to segment transfer, and reassemble the data for individual communications between the end devices. 3. Network: The network layer provides services to exchange the individual pieces of data over the network between the identified end devices. 2. Data Link: The data link layer protocol describes the methods for exchanging the data frames between devices over a common media . 1. Physical: The physical layer protocol describes the mechanical,electrical,functional and procedural means to activate,maintain,d-activate physical connections for bit transmissions to and from a network device. 3.2.4 Reference models >3.2.4.3 The TCP/IP Protocol modelThe figure on this page lists the four layers of the TCP/IP model and the following brief descriptions of what each layer provides:
3.2.4 Reference models >3.2.4.4 Comparing the O S I Model with the TCP/IP ModelThe figure on this page lines up the OSI Model and the TCP/IP Model side by side and shows the correlation between layers as follows:
The description given for this figure is "The key similarities are in the Transport and Network layers, however, the two models differ in how they relate to the layers above and below each layer." 3.2.4 Reference models >3.2.4.5 Activity - identify Layers and FunctionsFigure 1 on this page lists the following 7 OSI layers: 7. Application 6. Presentation 5. Session 4. Transport 3. Network2. Data Link 1. Physical The OSI layer functional descriptions are also listed as follows:
The user is asked to match each layer with its functional description Figure 2 on this page lists the following 4 TCP/IP layers:
The TCP/IP layer functional descriptions are also listed as follows:
The user is asked to match each layer with its functional description. 3.2.4 Reference models >3.2.4.6 Packet Tracer - Investigating the TCP/IP and OSI Models in ActionObjectivesPart 1: Examine HTTP Web Traffic Part 2: Display Elements of the TCP/IP Protocol Suite 3.2.4 Reference models >3.2.4.7 Lab - Researching RFC'sSee Lab Descriptions 3.3 Moving data in the Network3.3.1 Data Encapsulation >3.3.1.1 Communicating the messagesFigure 1 has two animations as follows:
Figure 2 shows the labelling of segments to provide ordering and assembling of the segments as they are sent from the source and as they arrive at their destination.\ Multiple pieces are labelled for easy direction and re-assembly. Labelling provides for ordering and assembling the pieces when they arrive. 3.3.1 Data Encapsulation >3.3.1.2 Protocol Data Units (PDU's)The figure on this page shows the data encapsulation process as a message is passed down the protocol stack as follows. The example is an e-mail and it starts as data at layer seven:
3.3.1 Data Encapsulation >3.3.1.3 EncapsulationThe figure on this page is an animation of protocol operations sending a message. In the animation a web page is being sent from a web server to a web client as follows:
3.3.1 Data Encapsulation >3.3.1.4 De-encapsulationThe figure on this page is an animation of protocol operations receiving a message. In this figure the data is taken apart in the reverse order that it was encapsulated in as follows:
3.3.1 Data Encapsulation >3.3.1.5 Activity - Identify the PDU layerThe figure on this page lists the following 5 PDU's:
The user is asked to organise the PDU's in the proper order in the stack to illustrate the order of the encapsulation process for sending a message. 3.3.2 Accessing Local Resources >3.3.2.1 Network Addresses and Data Link addressesThe figure on this page shows a Network addresses and data link addresses representation in each OSI layer as follows:
3.3.2 Accessing Local Resources >3.3.2.2 Communicating with a Device on the Same NetworkThe figure on this page shows the source and destination MAC addresses being added to an Ethernet frame as follows:
These two MAC addresses are placed into the frame header. 3.3.2 Accessing Local Resources >3.3.2.3 MAC and IP AddressesThe figure on this page is an animation showing the ARP process that occurs on a local area network. The sending computer is PC1 and it is sending data to an FTP server. The computer knows the IP address of the server, which is 192.168.1.9. However it does not have the server’s MAC address in its ARP cache, so it will send out an ARP request. This ARP request will ask for the device with a specified IP address to respond with its MAC address. The ARP request is sent to the switch which will broadcast it out to all ports. The device with the specified IP address will respond to the initiating device with its MAC address. 3.3.3 Accessing remote resources >3.3.3.1 Default GatewayThe figure on this page shows the process of a computer on a local network using its default gateway to send a message to a destination outside of the local network. In the network there are two computers and one FTP server all on the same segment. They all have the same IP address for a default gateway, which is 192.168.1.1, and this device is the closest router port to each of the devices. 3.3.3 Accessing remote resources >3.3.3.2 Communicating with a Device on a Remote NetworkThe figure on this page shows a computer communicating with a device on a remote network as follows:
The point here is that the switch needs to send the data to the router to be routed, and it only knows the router by MAC address. 3.3.3 Accessing remote resources >3.3.3.3 Packet Tracer - Explore a NetworkObjectivesPart 1: Examine Internetwork Traffic at Branch Part 2: Examine Internetwork Traffic to Central Part 3: Examine Internet Traffic from Branch 3.3.3 Accessing remote resources >3.3.3.4 Lab - Using Wireshark to View Network TrafficSee Lab Descriptions. 3.4 Summary3.4.1 Summary >3.4.1.1 Activity - Guaranteed to WorkingThe figure on this page shows the two competing networking models side-by-side and lists some common TCP/IP protocols used at each layer. The description given for this figure is "Using network protocols and standards facilitates quality data delivery in a timely manner." ObjectivesExplain the role of protocols and standards organizations in facilitating interoperability in network communications.
In this activity, the learner is asked to demonstrate how network communications can be compared to everyday activities using established procedures and standards.
3.4.1 Summary >3.4.1.2 SummaryThe figure on this page shows the two competing networking models side-by-side, the seven layer OS I model and the four layer TCP/IP model. The description given for this figure is "The key parallels are in the Transport and Network layers" End of learner 3: Network Protocols and Communications. Next - learner 4: Network Access. |