View on GitHub

Notes

reference notes

Protocols are sets of agreed upon rules that have been created by standards organizations. Models give you a way to visualize the rules and their place in your network.

The Rules

Video - Devices in a Bubble

Communications Fundamentals

Elements of a communication method:

Communication Protocols

Rule Establishment

Before comunication some rules need to be established.

To successfully communicate, Protocols must account for the following:

Network Protocol Requirements

Common computer protocols include the following requirements:

Message Encoding

Its the process the process od converting information into another acceptable format for transmission. decoding reverses this process to interpret the information.

Message Formatting and Encapsulation

Message formats depend on the type of message and the channel that is being used to send the message.

The process of placing one message format (the letter) inside another message format (the envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the recipient and the letter is removed from the envelope.

Message Size

Message Timing

Message Delivery Options

May be one of the following methods:

Protocols

Network Protocol Overview

Protocol type Description
Network Communications Protocols Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.
Network Security Protocols Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
Routing Protocols Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).
Service Discovery Protocols Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.

Network Protocol Functions

Function Description
Addressing identifies the sender and receiver of a message using a defined addressing scheme. such as IPv4 and IPv6.
Reliability provides garenteed delivery mechanisms in case messages are lost or corrupted in transit. TCP is the most common protocol used for reliability.
Flow control ensures that data flows at an efficient rate. TCP provides this.
Sequencing uniquely lables each transmitted segement of data. the receiving device uses this to reassemble the data in the correct order. useful if data segments are lost or arrive out of order. TCP provides this.
Error detection determines if data became corrupted during transmission. many protocols provide including Ethernet, TCP, IPv4, and IPv6.
Application interface contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.

Protocol Interaction

Common network protocols used when a device sends a request to a web server for its web page:

Protocol Suites

Network Protocol Suites

Evolution of Protocol Suites

There were several compering types of protocol suites:

  1. Internet protocol suite or TCP/IP - the most common and relevant protocol suite used today. its an open standard protocol suit maintained by the Internet Engineering Task Force (IETF).
  2. Open system interconnection (OSI) protocols - developed jointly in 1977 by the international organization for standerdization (ISO) and the International Telecommunications Union (ITU). it includes seven layer model called the OSI model. replaced by the TCP/IP suite.
  3. AppleTalk - developed by Apple in 1985. it was used in Apple computers and networks. in 1995 Apple discontinued AppleTalk and replaced it with TCP/IP.
  4. Novell NetWare - developed by Novell in 1983. it was used in Novell networks. in 1995 Novell discontinued NetWare and replaced it with TCP/IP to replace IPX.

TCP/IP Protocol Suite

The two most important aspects of TCP/IP for vendors and manufacturers are:

TCP/IP Communication Process​

Standards Organizations

Open Standards

Open standards encourage:

Standards organizations are:

Internet Standards

Organizations involved with the development of TCP/IP:

Electronic and Communications Standards

Reference Models

The Benefits of Using a Layered Model

The OSI Reference Model

OSI Model Layer Description
7 - Application The application layer contains protocols used for process-to-process communications.
6 - Presentation The presentation layer provides for common representation of the data transferred between application layer services.
5 - Session The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.
4 - Transport The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.
3 - Network The network layer provides services to exchange the individual pieces of data over the network between identified end devices.
2 - Data Link The data link layer protocols describe methods for exchanging data frames between devices over a common media
1 - Physical The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.

The TCP/IP Protocol Model

TCP/IP Model Layer Description
4 - Application Represents data to the user, plus encoding and dialog control.
3 - Transport Supports communication between various devices across diverse networks.
2 - Internet Determines the best path through the network.
1 - Network Access Controls the hardware devices and media that make up the network.

OSI and TCP/IP Model Comparison

The two models differ in how they relate to the layers above and below each layer:

Data Encapsulation

Segmenting Messages

Segmenting messages has two primary benefits:​

  1. Increases speed - Large amounts of data can be sent over the network without tying up a communications link.​
  2. Increases efficiency - Only segments which fail to reach the destination need to be retransmitted, not the entire data stream.​

Sequencing

Protocol Data Units(PDUs)

Encapsulation is the process where protocols add their information to the data.​

PDUs passing down the stack are as follows:​

  1. Data (Data Stream)​
  2. Segment​
  3. Packet​
  4. Frame​
  5. Bits (Bit Stream)

Data Encapsulation & Decapsulation

Data Access

Addressing

The network and data link layers are responsible for delivering the data from the source device to the destination device. protocols at both layers contain a source and destination address, but their addresses have different purposes:

Layer 3 Logical Address

The IP packet contains two IP addresses:​

These addresses may be on the same link or remote.

Devices on the Same Network

When devices are on the same network the source and destination will have the same number in network portion of the address.​ e.g. PC1 – 192.168.1.110​ FTP Server – 192.168.1.9

Devices on a Remote Network

The IP address of the destination device will represent hosts on different networks.​ e.g. PC1 – 192.168.1.110 Web Server: 172.16.1.99

Since data link addressing is local addressing, it will have a source and destination for each segment or hop of the journey to the destination.​

The MAC addressing for the first segment is:​

Source – (PC1 NIC) sends frame​

Destination – (First Router- DGW interface) receives frame​