3.0.1 Welcome 3.0.1.1 Chapter 3: Network Protocols and Communications
3.0.1 Welcome 3.0.1.1 Chapter 3: Network Protocols and Communications
3.0.1 Welcome 3.0.1.1 Chapter 3: Network Protocols and Communications
3.0 Introduction
3.0.1 Welcome
3.0.1.1 Chapter 3: Network Protocols and Communications
More and more, it is networks that connect us. People communicate online from everywhere.
Conversations in classrooms spill into instant message chat sessions, and online debates continue at
school. New services are being developed daily to take advantage of the network.
Rather than developing unique and separate systems for the delivery of each new service, the network
industry as a whole has adopted a developmental framework that allows designers to understand
current network platforms, and maintain them. At the same time, this framework is used to facilitate the
development of new technologies to support future communications needs and technology
enhancements.
Central to this developmental framework, is the use of generally-accepted models that describe network
rules and functions.
Within this chapter, you will learn about these models, as well as the standards that make networks
work, and how communication occurs over a network.
3.0.1.2 Class Activity - Designing a Communications System
You have just purchased a new automobile for your personal use. After driving the car for a week or so,
you find that it is not working correctly.
After discussing the problem with several of your peers, you decide to take it to an automotive repair
facility they highly recommend. It is the only repair facility located near you.
When you arrive at the repair facility, you find all of the mechanics speak another language. You are
having difficulty explaining the automobile’s performance problems, but the repairs really need to be
done. You are not sure you can drive it back home to research other options.
You must find a way to work with the repair facility to ensure that your automobile is fixed correctly.
How will you communicate with the mechanics in this form? Design a communications model to
ensure the car is properly repaired.
Class Activity - Designing a Communications System
3.1 Rules of Communication
3.1.1 The Rules
3.1.1.1 Communication Fundamentals
A network can be as complex as devices connected across the Internet, or as simple as two computers
directly connected to one another with a single cable, and anything in-between. Networks can vary in
size, shape, and function. However, simply having a wired or wireless physical connection between end
devices is not enough to enable communication. For communication to occur, devices must know
“how” to communicate.
People exchange ideas using many different communication methods. However, regardless of the
method chosen, all communication methods have three elements in common. The first of these
elements is the message source, or sender. Message sources are people, or electronic devices, that need
to send a message to other individuals or devices. The second element of communication is the
destination, or receiver, of the message. The destination receives the message and interprets it. A third
element, called a channel, consists of the media that provides the pathway over which the message
travels from source to destination.
Communication begins with a message, or information, that must be sent from a source to a
destination. The sending of this message, whether by face-to-face communication or over a network, is
governed by rules called protocols. These protocols are specific to the type of communication method
occurring. In our day-to-day personal communication, the rules we use to communicate over one
medium, like a telephone call, are not necessarily the same as the protocols for using another medium,
such as sending a letter.
For example, consider two people communicating face-to-face, as shown in Figure 1. Prior to
communicating, they must agree on how to communicate. If the communication is using voice, they
must first agree on the language. Next, when they have a message to share, they must be able to format
that message in a way that is understandable. For example, if someone uses the English language, but
poor sentence structure, the message can easily be misunderstood. Each of these tasks describe
protocols put in place to accomplish communication. This is also true of computer communication, as
shown in Figure 2.Many different rules or protocols govern all methods of communication that exist in
the world today.
Figure 1 is an animation of a conversation taking place between two people. This shows that in order for
successful communication there needs to be a message, a transmitter, a medium in which to transmit the
message, a receiver and a message destination. The words that the person wants to tell the other is the message,
the transmitter is the speaking person, the medium is the air carrying the voice, and the receiver is the ears of
the person who is the receiver of the message. Figure 2 is an animation of a conversation taking place between
two computers. This shows that in order for successful communication there needs to be a message, a
transmitter, a medium in which to transmit the message, a receiver and a message destination. Here the message
is a data packet being sent by the computers network card, which is the transmitter. This data travels over
network cables acting as the transmission medium and is received by the network card of the destination
computer.
3.1.1.2 Rule Establishment
Before communicating with one another, individuals must use established rules or agreements to
govern the conversation. For example, consider Figure 1, protocols are necessary for effective
communication. These rules, or protocols, must be followed in order for the message to be successfully
delivered and understood. Protocols must account for the following requirements:
• An identified sender and receiver
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements
The protocols that are used in network communications share many of these fundamental traits. In
addition to identifying the source and destination, computer and network protocols define the details of
how a message is transmitted across a network. Common computer protocols include the requirements
shown in Figure 2. Each of these will be discussed in more detail.
Figure 1 has two sentences used to represent the importance of establishing rules for communication. The first
sentence is a long sentence that does not have any spaces between the words, which makes it difficult to read. A
second sentence is written in Spanish, and could be hard to understand if the receiver doesn’t speak the
language. There is a Translate button that the learner can select that will add the spaces between the words and
also translate form Spanish to English. Figure 2 is a star diagram that has Protocols as the central word and the
branches are characteristics of protocols. These characteristics include message encoding, message formatting
and encapsulation, message size, message timing and message delivery options.
3.1.1.3 Message Encoding
One of the first steps to sending a message is encoding. Encoding is the process of converting
information into another acceptable form, for transmission. Decoding reverses this process in order to
interpret the information.
Imagine a person planning a holiday trip with a friend, and calling the friend to discuss the details of
where they want to go, as shown in Figure 1. To communicate the message, she converts her thoughts
into an agreed upon language. She then speaks the words using the sounds and inflections of spoken
language that convey the message. Her friend listens to the description and decodes the sounds to
understand the message he received.
Encoding also occurs in computer communication, as shown in Figure 2. Encoding between hosts must
be in an appropriate format for the medium. Messages sent across the network are first converted into
bits by the sending host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses
depending on the network media over which the bits are transmitted. The destination host receives and
decodes the signals in order to interpret the message.
Figure 1 A communication process between two people. A woman is thinking of a message, she formulates the
message and transmits it to a man who receives the message. This is used to demonstrate the communication
process. Figure 2 is an animation of the communication process between two computers. A data packet is formed
on a computer and then the message is transmitted to a receiving computer.
3.1.1.4 Message Formatting and Encapsulation
When a message is sent from source to destination, it must use a specific format or structure. Message
formats depend on the type of message and the channel that is used to deliver the message.
Letter writing is one of the most common forms of written human communication. For centuries, the
agreed format for personal letters has not changed. In many cultures, a personal letter contains the
following elements:
• An identifier of the recipient
• A salutation or greeting
• The message content
• A closing phrase
• An identifier of the sender
In addition to having the correct format, most personal letters must also be enclosed in an envelope for
delivery, as shown in Figure 1. The envelope has the address of the sender and receiver, each located at
the proper place on the envelope. If the destination address and formatting are not correct, the letter is
not delivered. The process of placing one message format (the letter) inside another message format
(the envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the
recipient and the letter is removed from the envelope.
A message that is sent over a computer network follows specific format rules for it to be delivered and
processed. Just as a letter is encapsulated in an envelope for delivery, so too are computer messages.
Each computer message is encapsulated in a specific format, called a frame, before it is sent over the
network. A frame acts like an envelope; it provides the address of the destination and the address of the
source host, as shown in Figure 2. Notice the frame has a source and destination in both the frame
addressing portion and in the encapsulated message. The distinction between these two types of
addresses will be explained later in this chapter.
The format and contents of a frame are determined by the type of message being sent and the channel
over which it is communicated. Messages that are not correctly formatted are not successfully delivered
to or processed by the destination host.
Figure 1 is an animation used to demonstrate the rules used in communication. The figure shows an envelope that has a
recipient address and a return address on it. These represent the location address of the recipient and the location address
of the sender of the message. The letter inside represents the message being sent. The greeting such as “Dear” on the
message aligns with the start of message indicator. The name following Dear such as “Jane” represents the identity of the
recipient. The contents of the letter represent the encapsulated data and the signing of the letter is the source identifier. The
stamp represents transmitting the message.
Figure 2 shows the format and contents of a frame. This encapsulation has the frame addressing on one end and the frame
indicator on the other end with the message in between.
Flow Control
Timing also affects how much information can be sent and the speed that it can be delivered. If one
person speaks too quickly, it is difficult for the other person to hear and understand the message. In
network communication, source and destination hosts use flow control methods to negotiate correct
timing for successful communication.
Response Timeout
If a person asks a question and does not hear a response within an acceptable amount of time, the
person assumes that no answer is coming and reacts accordingly. The person may repeat the question,
or may go on with the conversation. Hosts on the network also have rules that specify how long to wait
for responses and what action to take if a response timeout occurs.
3.1.1.7 Message Delivery Options
A message can be delivered in different ways, as shown in Figure 1. Sometimes, a person wants to
communicate information to a single individual. At other times, the person may need to send
information to a group of people at the same time, or even to all people in the same area.
There are also times when the sender of a message needs to be sure that the message is delivered
successfully to the destination. In these cases, it is necessary for the recipient to return an
acknowledgment to the sender. If no acknowledgment is required, the delivery option is referred to as
unacknowledged.
Hosts on a network use similar delivery options to communicate, as shown in Figure 2.
A one-to-one delivery option is referred to as a unicast, meaning there is only a single destination for
the message.
When a host needs to send messages using a one-to-many delivery option, it is referred to as a
multicast. Multicasting is the delivery of the same message to a group of host destinations
simultaneously. If all hosts on the network need to receive the message at the same time, a broadcast
may be used. Broadcasting represents a one-to-all message delivery option. Some protocols use a
special multicast message that is sent to all devices, making it essentially the same as a broadcast.
Additionally, hosts may be required to acknowledge the receipt of some messages while not needing to
acknowledge others.
3.2 Network Protocols and standards
3.2.1 Protocols
3.2.1.1 Rules that Govern Communications
A group of inter-related protocols necessary to perform a communication function is called a protocol
suite. Protocol suites are implemented by hosts and networking devices in software, hardware or both.
One of the best ways to visualize how the protocols within a suite interact is to view the interaction as a
stack. A protocol stack shows how the individual protocols within a suite are implemented. The
protocols are viewed in terms of layers, with each higher level service depending on the functionality
defined by the protocols shown in the lower levels. The lower layers of the stack are concerned with
moving data over the network and providing services to the upper layers, which are focused on the
content of the message being sent.
1. In Figure 1, the animation begins with the web server preparing the Hypertext Markup Language
(HTML) page as data to be sent.
2. The application protocol HTTP header is added to the front of the HTML data. The header contains
various information, including the HTTP version the server is using and a status code indicating it has
information for the web client.
3. The HTTP application layer protocol delivers the HTML-formatted web page data to the transport
layer. The TCP transport layer protocol is used to manage individual conversations, in this example
between the web server and web client.
4. Next, the IP information is added to the front of the TCP information. IP assigns the appropriate
source and destination IP addresses. This information is known as an IP packet.
5. The Ethernet protocol adds information to both ends of the IP packet, known as a data link frame.
This frame is delivered to the nearest router along the path towards the web client. This router removes
the Ethernet information, analyzes the IP packet, determines the best path for the packet, inserts the
packet into a new frame, and sends it to the next neighboring router towards the destination. Each
router removes and adds new data link information before forwarding the packet.
6. This data is now transported through the internetwork, which consists of media and intermediary
devices.
7. In Figure 2, the animation begins with the client receiving the data link frames that contain the data.
Each protocol header is processed and then removed in the opposite order it was added. The Ethernet
information is processed and removed, followed by the IP protocol information, the TCP information,
and finally the HTTP information.
8. The web page information is then passed on to the client’s web browser software.
Electronic Industries Alliance (EIA) - Best known for its standards related to electrical wiring,
connectors, and the 19-inch racks used to mount networking equipment.
Telecommunications Industry Association (TIA) - Responsible for developing communication
standards in a variety of areas including radio equipment, cellular towers, Voice over IP (VoIP) devices,
satellite communications, and more. Figure 2 shows an example of an Ethernet cable meeting TIA/EIA
standards.
International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) -
One of the largest and oldest communication standard organizations. The ITU-T defines standards for
video compression, Internet Protocol Television (IPTV), and broadband communications, such as a
digital subscriber line (DSL).
3.2.3.4 Lab - Researching Networking Standards
In this lab, you will complete the following objectives:
• Part 1: Research Networking Standards Organizations
• Part 2: Reflect on Internet and Computer Networking Experience
Lab - Researching Networking Standards
3.2.4 Reference Models
3.2.4.1 The Benefits of Using a Layered Model
The benefits to using a layered model to describe network protocols and operations include:
• Assisting in protocol design because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below.
• Fostering competition because products from different vendors can work together.
• Preventing technology or capability changes in one layer from affecting other layers above and
below.
• Providing a common language to describe networking functions and capabilities.
As shown in the figure, the TCP/IP model and the Open Systems Interconnection (OSI) model are the
primary models used when discussing network functionality. They each represent a basic type of
layered networking models:
• Protocol model - This type of model closely matches the structure of a particular protocol suite.
The TCP/IP model is a protocol model because it describes the functions that occur at each layer
of protocols within the TCP/IP suite. TCP/IP is also used as a reference model.
• Reference model - This type of model provides consistency within all types of network
protocols and services by describing what has to be done at a particular layer, but not
prescribing how it should be accomplished. The OSI model is a widely known internetwork
reference model, but is also a protocol model for the OSI protocol suite.
3.2.4.2 The OSI Reference Model
The OSI model provides an extensive list of functions and services that can occur at each layer. It also
describes the interaction of each layer with the layers directly above and below. The TCP/IP protocols
discussed in this course are structured around both the OSI and TCP/IP models. Click each layer of the
OSI model to view the details.
The functionality of each layer and the relationship between layers will become more evident
throughout this course as the protocols are discussed in more detail.
Note: Whereas the TCP/IP model layers are referred to only by name, the seven OSI model layers are
more often referred to by number rather than by name. For instance, the physical layer is referred to as
Layer 1 of the OSI model.
3.2.4.3 The TCP/IP Protocol Model
The TCP/IP protocol model for internetwork communications was created in the early 1970s and is
sometimes referred to as the Internet model. As shown in the figure, it defines four categories of
functions that must occur for communications to be successful. The architecture of the TCP/IP protocol
suite follows the structure of this model. Because of this, the Internet model is commonly referred to as
the TCP/IP model.
Most protocol models describe a vendor-specific protocol stack. Legacy protocol suites, such as Novell
Netware and AppleTalk, are examples of vendor-specific protocol stacks. Because the TCP/IP model is
an open standard, one company does not control the definition of the model. The definitions of the
standard and the TCP/IP protocols are discussed in a public forum and defined in a publicly available
set of RFCs.
3.3.1.4 De-encapsulation
This process is reversed at the receiving host, and is known as de-encapsulation. De-encapsulation is
the process used by a receiving device to remove one or more of the protocol headers. The data is de-
encapsulated as it moves up the stack toward the end-user application.
3.3.1.5 Activity
Before an IP packet can be sent over a wired or wireless network, it must be encapsulated in a data link
frame so it can be transmitted over the physical medium.
As the IP packet travels from host-to-router, router-to-router, and finally router-to-host, at each point
along the way the IP packet is encapsulated in a new data link frame. Each data link frame contains the
source data link address of the NIC card sending the frame, and the destination data link address of the
NIC card receiving the frame.
The Layer 2, data link protocol is only used to deliver the packet from NIC-to-NIC on the same
network. The router removes the Layer 2 information as it is received on one NIC and adds new data
link information before forwarding out the exit NIC on its way towards the final destination.
The IP packet is encapsulated in a data link frame that contains data link information, including a:
• Source data link address - The physical address of the device’s NIC that is sending the data
link frame.
• Destination data link address - The physical address of the NIC that is receiving the data link
frame. This address is either the next hop router or of the final destination device.
The data link frame also contains a trailer which will be discussed in later chapters.
3.3.2.3 Devices on the Same Network
To understand how devices communicate within a network, it is important to understand the roles of
both the network layer addresses and the data link addresses.
Role of the Network Layer Addresses
The network layer addresses, or IP addresses, indicate the original source and final destination. An IP
address contains two parts:
• Network portion – The left-most part of the address that indicates which network the IP
address is a member. All devices on the same network will have the same network portion of the
address.
• Host portion – The remaining part of the address that identifies a specific device on the
network. The host portion is unique for each device on the network.
Note: The subnet mask is used to identify the network portion of an address from the host portion. The
subnet mask is discussed in later chapters.
In this example we have a client computer, PC1, communicating with an FTP server on the same IP
network.
• Source IP address - The IP address of the sending device, the client computer PC1:
192.168.1.110.
• Destination IP address - The IP address of the receiving device, FTP server: 192.168.1.9.
Notice in the figure that the network portion of both the source IP address and destination IP address
are on the same network.