Protocols are sets of agreed upon rules that have been created by standards organizations. Models give you a way to visualize the rules and their place in your network.
The Rules
Video - Devices in a Bubble
- The only thing a device(pc, phone, etc…) knows is its own addressing information.
- How does a device know its ip and what network it belongs to?
How does it know if the destination device it nedds to send info to is on the same network or not?
If the destination device is on a different network, how does it know how to get there?
How does a source device know if the info sent was received?
How to know if it needs to resend the info?
- The answer to all of these questions is Protocols. the rules that govern how devices communicate with each other.
- TCP is the protocol that ensures Reliability.
Communications Fundamentals
Elements of a communication method:
- Message source(sender) - the device that is sending the message to the destination device.
- Message destination(receiver) - the device that is receiving the message from the source device and interpreting it.
- Channel - the medium that the message is sent over.
Communication Protocols
- All communications are governed by protocols.
- Protocols are the rules that communications will follow.
- These rules vary depending on the protocol.
Rule Establishment
Before comunication some rules need to be established.
To successfully communicate, Protocols must account for the following:
- An identified sender and receiver
- Common language and grammar(format)
- Speed and timing of delivery
- Confirmation of acknowledgement requirements
Network Protocol Requirements
Common computer protocols include the following requirements:
- Message encoding
- Message formatting and encapsulation
- Message size
- Message timing
- Message delivery options
Message Encoding
Its the process the process od converting information into another acceptable format for transmission. decoding reverses this process to interpret the information.
Message Formatting and Encapsulation
Message formats depend on the type of message and the channel that is being used to send the message.
The process of placing one message format (the letter) inside another message format (the envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the recipient and the letter is removed from the envelope.
Message Size
- Messages sent across the network are converted to bits. not sent all at once, but in packets. The size of the packets is determined by the protocol.
- The bits are then encoded into a pattern of light, sound, or electrical impulses depending on the channel used to send the message.
- The destination device receives the message and decodes it back to interptet the message.
Message Timing
- Flow control - the process of managing the rate of data transmission to prevent the sender from overwhelming the receiver.
- Response timeout - hosts on the network use network protocols that specify how long to wait for responses and what action to take if no response is received.
- Acess method - determins when someone can send a message. It is used to prevent collisions on a shared medium. So it checks if the medium is available before sending a message.
Message Delivery Options
May be one of the following methods:
- Unicast - a message is sent to a single device. one to one.
- Multicast - a message is sent to multiple devices. one to many(not all).
- Broadcast - a message is sent to all devices on the network. one to all. (used in IPv4 but not an option in IPv6)
Protocols
Network Protocol Overview
Protocol type | Description |
---|---|
Network Communications Protocols | Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more. |
Network Security Protocols | Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS). |
Routing Protocols | Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). |
Service Discovery Protocols | Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation. |
Network Protocol Functions
Function | Description |
---|---|
Addressing | identifies the sender and receiver of a message using a defined addressing scheme. such as IPv4 and IPv6. |
Reliability | provides garenteed delivery mechanisms in case messages are lost or corrupted in transit. TCP is the most common protocol used for reliability. |
Flow control | ensures that data flows at an efficient rate. TCP provides this. |
Sequencing | uniquely lables each transmitted segement of data. the receiving device uses this to reassemble the data in the correct order. useful if data segments are lost or arrive out of order. TCP provides this. |
Error detection | determines if data became corrupted during transmission. many protocols provide including Ethernet, TCP, IPv4, and IPv6. |
Application interface | contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes. |
Protocol Interaction
Common network protocols used when a device sends a request to a web server for its web page:
- Hypertext Transfer Protocol (HTTP) - controls the way how the web server an web client communicate. it defines the content and formatting of the request and response that are exchanged. both client and server software implement this protocol as part of the application. it relies on other protocols to provide the underlying transport and network services.
- Transmission Control Protocol (TCP) - manages individual conversations. its responsible for garanteeinf the reliable delivery of data and managing flow control.
- Internet Protocol (IP) - responsible for delivering data from one device to another. its used by routers to forward message from one network to another.
- Ethernet - responsible for delivering message from one NIC(network interface card) to another on the same Ethernet local area network LAN.
Protocol Suites
Network Protocol Suites
-
A protocol suite is a group of inter-related(work together) protocols necessary to perform a communication function.
-
A protocol stack shows how the individual protocols within a suite are implemented.
-
The protocols are viewed in terms of layers, with each higher-level service depending on the functionality defined by the protocols shown in the lower levels.
-
Lower layers are concerned with moving data over the network and providing services to the higher layers.
-
Higher layers are concerned with the content of the message being sent.
Evolution of Protocol Suites
There were several compering types of protocol suites:
- Internet protocol suite or TCP/IP - the most common and relevant protocol suite used today. its an open standard protocol suit maintained by the Internet Engineering Task Force (IETF).
- Open system interconnection (OSI) protocols - developed jointly in 1977 by the international organization for standerdization (ISO) and the International Telecommunications Union (ITU). it includes seven layer model called the OSI model. replaced by the TCP/IP suite.
- AppleTalk - developed by Apple in 1985. it was used in Apple computers and networks. in 1995 Apple discontinued AppleTalk and replaced it with TCP/IP.
- Novell NetWare - developed by Novell in 1983. it was used in Novell networks. in 1995 Novell discontinued NetWare and replaced it with TCP/IP to replace IPX.
TCP/IP Protocol Suite
The two most important aspects of TCP/IP for vendors and manufacturers are:
- Open standard protocol suite - its freely avaliable to anyone who wants to use it.
- Standard-based protocol suite - its been endorsed by the network industry and approved by a standards organization.
TCP/IP Communication Process
- A web server encapsulating and sending a web page to a client.
- A client de-encapsulating the web page for the web browser
Standards Organizations
Open Standards
Open standards encourage:
- interoperability - the ability of different devices to work together.
- competition - the ability of different vendors to compete for business.
- innovation - the ability of different vendors to develop new products and services.
Standards organizations are:
- vendor-neutral - they are not owned or controlled by any one vendor.
- non-profit organizations - they are not owned or controlled by any one vendor.
- established to develop and promote open standards.
Internet Standards
- Internet society promotes the open development and evolution of the Internet.
- Internet architecture board (IAB) - responsible for management and development of the Internet standards.
- Internet engineering task force (IETF) - develops, updates, and maintains Internet and TCP/IP technologies.
- Internet research task force (IRTF) - long-term researches and develops new Internet technologies.
Organizations involved with the development of TCP/IP:
- Internet corporation for assigned names and numbers (ICANN) - Coordinates IP address allocation, the management of domain names, and assignment of other information
- Internet assigned numbers authority (IANA) - Oversees and manages IP address allocation, domain name management, and protocol identifiers for ICANN
Electronic and Communications Standards
- Institute of Electrical and Electronics Engineers (IEEE, pronounced “I-triple-E”) - dedicated to creating standards in power and energy, healthcare, telecommunications, and networking
- Electronic Industries Alliance (EIA) - develops standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment
- Telecommunications Industry Association (TIA) - develops communication standards in radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more
- International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) - defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL)
Reference Models
The Benefits of Using a Layered Model
- Assisting in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below
- Fostering competition because products from different vendors can work together
- Preventing technology or capability changes in one layer from affecting other layers above and below
- Providing a common language to describe networking functions and capabilities
The OSI Reference Model
OSI Model Layer | Description |
---|---|
7 - Application | The application layer contains protocols used for process-to-process communications. |
6 - Presentation | The presentation layer provides for common representation of the data transferred between application layer services. |
5 - Session | The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange. |
4 - Transport | The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices. |
3 - Network | The network layer provides services to exchange the individual pieces of data over the network between identified end devices. |
2 - Data Link | The data link layer protocols describe methods for exchanging data frames between devices over a common media |
1 - Physical | The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device. |
The TCP/IP Protocol Model
TCP/IP Model Layer | Description |
---|---|
4 - Application | Represents data to the user, plus encoding and dialog control. |
3 - Transport | Supports communication between various devices across diverse networks. |
2 - Internet | Determines the best path through the network. |
1 - Network Access | Controls the hardware devices and media that make up the network. |
OSI and TCP/IP Model Comparison
The two models differ in how they relate to the layers above and below each layer:
- OSI layer 3, the network layer, is equivalent to the TCP/IP model’s Internet layer.
- OSI layer 4, the transport layer, is equivalent to the TCP/IP model’s transport layer.
- OSI layer 5,6, and 7, the session, presentation, and application layers, are equivalent to the TCP/IP model’s application layer.
- OSI layer 1 and 2, the physical and data link layers, are equivalent to the TCP/IP model’s network access layer.
Data Encapsulation
Segmenting Messages
- Segmenting is the process of breaking up messages into smaller units.
- Multiplexing is the processes of taking multiple streams of segmented data and interleaving them together.
Segmenting messages has two primary benefits:
- Increases speed - Large amounts of data can be sent over the network without tying up a communications link.
- Increases efficiency - Only segments which fail to reach the destination need to be retransmitted, not the entire data stream.
Sequencing
-
Sequencing messages is the process of numbering the segments so that the message may be reassembled at the destination.
-
TCP is responsible for sequencing the individual segments.
Protocol Data Units(PDUs)
Encapsulation is the process where protocols add their information to the data.
-
At each stage of the process, a PDU has a different name to reflect its new functions.
-
There is no universal naming convention for PDUs, in this course, the PDUs are named according to the protocols of the TCP/IP suite.
PDUs passing down the stack are as follows:
- Data (Data Stream)
- Segment
- Packet
- Frame
- Bits (Bit Stream)
Data Encapsulation & Decapsulation
-
Encapsulation is a top down process.The level above does its process and then passes it down to the next level of the model. This process is repeated by each layer until it is sent out as a bit stream.
-
Data is de-encapsulated as it moves up the stack. When a layer completes its process, that layer strips off its header and passes it up to the next level to be processed. This is repeated at each layer until it is a data stream that the application can process.
Data Access
Addressing
The network and data link layers are responsible for delivering the data from the source device to the destination device. protocols at both layers contain a source and destination address, but their addresses have different purposes:
- Network layer source and destination addresses - Responsible for delivering the IP packet from the original source to the final destination, which may be on the same network or a remote network.
- Data link layer source and destination addresses - Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network.
Layer 3 Logical Address
The IP packet contains two IP addresses:
- Source IP address - The IP address of the sending device, original source of the packet.
- Destination IP address - The IP address of the receiving device, final destination of the packet.
These addresses may be on the same link or remote.
Devices on the Same Network
When devices are on the same network the source and destination will have the same number in network portion of the address. e.g. PC1 – 192.168.1.110 FTP Server – 192.168.1.9
Devices on a Remote Network
The IP address of the destination device will represent hosts on different networks. e.g. PC1 – 192.168.1.110 Web Server: 172.16.1.99
Data Link Addresses
Since data link addressing is local addressing, it will have a source and destination for each segment or hop of the journey to the destination.
The MAC addressing for the first segment is:
Source – (PC1 NIC) sends frame
Destination – (First Router- DGW interface) receives frame