Communication Principles Notes
Communication Protocols
- Communication occurs in various forms and environments in daily life.
- Expectations vary depending on the communication method (e.g., internet chat vs. job interview).
- Each situation has expected behaviors and styles.
- Before communicating, rules or agreements are established:
- What method of communication should be used?
- What language should be used?
- Is confirmation of message receipt needed?
Why Protocols Matter
- Computers use protocols to communicate, similar to humans.
- Protocols are essential for correct communication across networks.
- Local networks require all hosts to use a common protocol to communicate.
- Networking protocols define aspects of network communication.
Protocol Characteristics
- Message format: A specific structure is used for a sent message, depending on the message type and channel.
- Message size: Rules govern the size of pieces communicated across the network. Long messages are broken into smaller pieces for reliable delivery.
- Timing: Affects the speed of bit transmission and the timing of data sending and the total data sent in a transmission.
- Encoding: Messages are converted into bits by the sending host, encoded into patterns (sounds, light waves, or electrical impulses), and decoded by the destination host.
- Encapsulation: Each message includes a header with addressing information (source and destination) to ensure delivery to the correct application on the destination host.
- Message pattern: Some messages require acknowledgment before the next message is sent (request/response). Other messages may be streamed without confirmation.
Communication Standards
- Internet standards manage changes and reliably deliver services (e.g., email).
- A standard is a set of rules for how something must be done.
- Networking and internet standards ensure uniform implementation of rules or protocols.
- Different devices use standards to send information over the internet.
Network Standards Organizations
- Internet standards are developed through discussion, problem-solving, and testing.
- Various organizations develop, publish, and maintain these standards.
- The development and approval process of a proposed standard are recorded in a numbered RFC (Request for Comments) document.
- The IETF (Internet Engineering Task Force) publishes and manages RFCs for internet standards.
Network Communication Models
The TCP/IP Model
- Layered models visualize how protocols work together for network communications.
- Layered models depict protocol operations within each layer and interactions between layers.
- Benefits of layered models:
- Assists protocol design by defining information and interfaces for each layer.
- Fosters competition by enabling products from different vendors to work together.
- Enables technology changes at one layer without affecting others.
- Provides a common language for describing networking functions.
- The first layered model was created in the early 1970s and was referred to as the internet model.
- It defines four categories of functions for successful communication.
TCP/IP Model Layers and Descriptions
- Application: Represents data to the user, including encoding and dialog control.
- Transport: Supports communication between devices across diverse networks.
- Internet: Determines the best path through the network.
- Network Access: Controls the hardware devices and media that make up the network.
- The TCP/IP model is a protocol model because it describes the functions at each layer of protocols within the TCP/IP suite.
The OSI Reference Model
Two basic types of models exist for network communication functions:
- Protocol model: Closely matches a particular protocol suite (e.g., TCP/IP model).
- Reference model: Describes functions to be completed at each layer but doesn't specify how (e.g., OSI model).
The OSI (Open Systems Interconnection) project created the most widely known internetwork reference model.
It is used for data network design, operation specifications, and troubleshooting.
This model refers to the OSI model.
OSI Model Layers and Descriptions
- 7 - Application: Protocols for process-to-process communications.
- 6 - Presentation: Provides a typical representation of data transferred between application layer services.
- 5 - Session: Services to organize dialogue and manage data exchange.
- 4 - Transport: Services to segment, transfer, and reassemble data for communications between end devices.
- 3 - Network: Services to exchange individual data over the network between identified end devices.
- 2 - Data Link: Protocols describe methods for exchanging data frames between devices over shared media.
- 1 - Physical: Protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for bit transmission.
OSI Model and TCP/IP Model Comparison
- The TCP/IP model visualizes interactions of protocols within the TCP/IP suite.
- It describes networking functions specific to TCP/IP protocols.
- Protocols in the TCP/IP suite are described in terms of the OSI reference model.
- Functions at the internet layer in TCP/IP are in the network layer of the OSI model.
- Transport layer functionality is the same in both models.
- OSI Layer 3 (network) maps to the TCP/IP internet layer, handling routing and addressing.
- OSI Layer 4 (transport) maps to the TCP/IP transport layer, handling reliable data delivery.
- The TCP/IP application layer includes protocols for end-user applications.
- OSI model Layers 5, 6, and 7 are used as references by application developers.
- The OSI model separates the data link layer from the physical layer
Data Encapsulation
- Encapsulation is the process where protocols add their information to the data.
- At each stage of the process, a PDU (Protocol Data Unit) has a different name to reflect its new functions.
- PDUs passing down the stack:
- Data (Data Stream)
- Segment
- Packet
- Frame
- Bits (Bit Stream)
- Encapsulation is a top-down process where each layer adds its header and passes it down.
De-encapsulation
- Data is de-encapsulated as it moves up the stack.
- Each layer strips off its header and passes the data up to the next layer.
- Process:
- Received as Bits (Bit Stream)
- Frame
- Packet
- Segment
- Data (Data Stream)
Data Access
- Both the data link and network layers use addressing to deliver data from source to destination.
- Network layer addresses are responsible for delivering the IP packet from the original source to the final destination.
- Data link layer addresses are responsible for delivering the data link frame from one NIC to another on the same network.
Layer 3 Logical Addresses
- The IP packet contains two IP addresses:
- Source IP address: The IP address of the sending device (original source).
- Destination IP address: The IP address of the receiving device (final destination).
- An IP address contains two parts:
- Network portion (IPv4) or Prefix (IPv6): The left-most part, indicating the network group.
- Host portion (IPv4) or Interface ID (IPv6): The remaining part, identifying a specific device.
Devices on the Same Network
- Devices on the same network share the network portion of the address.
Role of Data Link Layer Addresses
- When devices are on the same Ethernet network, the data link frame uses the MAC address of the destination NIC.
- MAC addresses are physically embedded into the Ethernet NIC and are local addressing.
- The Source MAC address is that of the originator on the link.
- The Destination MAC address is always on the same link as the source.
Devices on a Remote Network
When the source and destination have a different network portion, they are on different networks.
When the final destination is remote, Layer 3 provides Layer 2 with the local default gateway IP address (router address).
The default gateway (DGW) is the router interface IP address that is part of the LAN and serves as the "door" to other locations.
All devices on the LAN must know this address.
Once Layer 2 on PC1 forwards to the default gateway (Router), the router then can start the routing process of getting the information to actual destination.
The MAC addressing for the first segment is :
- Source – AA-AA-AA-AA-AA-AA (PC1) Sends the frame.
- Destination – 11-11-11-11-11-11 (R1- Default Gateway MAC) Receives the frame.
Data Link Addresses
- Data link addressing is local, so it has a source and destination for each segment.
- The MAC addressing for the first segment is:
- Source: (PC1 NIC) sends frame
- Destination: (First Router- DGW interface) receives frame
- The MAC addressing for the second hop is:
- Source: (First Router- exit interface) sends frame
- Destination: (Second Router) receives frame
- The MAC addressing for the last segment is:
- Source: (Second Router- exit interface) sends frame
- Destination: (Web Server NIC) receives frame
- The L3 IP addressing does not change from segment to segment like the L2 MAC addressing.
- The L3 addressing remains the same since it is global and the ultimate destination is still the Web Server.