Chapter 3. Network Protocols and Communications
Chapter 3. Network Protocols and Communications
Objectives
Upon completion of this chapter, you will be able to answer the following
questions:
How are the TCP/IP model and the OSI model used to facilitate standard-
ization in the communication process?
Key Terms
This chapter uses the following key terms. You can find the definitions in
the Glossary.
More and more, it is networks that connect us. People communicate on-
line from everywhere. Conversations in classrooms spill into instant mes-
sage chat sessions, and online debates continue at school. New services
are being developed daily to take advantage of the network.
Rather than developing unique and separate systems for the delivery of
each new service, the network industry as a whole has adopted a devel-
opmental framework that allows designers to understand current net-
work platforms, and maintain them. At the same time, this framework is
used to facilitate the development of new technologies to support future
communications needs and technology enhancements.
Within this chapter, you will learn about these models, as well as the
standards that make networks work, and how communication occurs
over a network.
CLASS ACTIVITY 3.0.1.2: DESIGNING A COMMUNICATIONS SYSTEM
You have just purchased a new automobile for your personal use. After
driving the car for a week or so, you find that it is not working correctly.
After discussing the problem with several of your peers, you decide to
take it to an automotive repair facility that they highly recommend. It is
the only repair facility located in close proximity to you.
When you arrive at the repair facility, you find that all the mechanics
speak another language. You are having difficulty explaining the
automobile’s performance problems, but the repairs really need to be
done. You are not sure you can drive it back home to research other
options.
You must find a way to work with the repair facility to ensure that your
automobile is fixed correctly.
How will you communicate with the mechanics in this firm? Design a
communications model to ensure that the car is properly repaired.
Think of how many different rules or protocols govern all the different
methods of communication that exist in the world today.
Establishing the Rules (3.1.1.2)
As shown in Figure 3-3, the protocols that are used in network communi-
cations share many of the fundamental traits as those protocols used to
govern successful human conversations. In addition to identifying the
source and destination, computer and network protocols define the de-
tails of how a message is transmitted across a network to answer the pre-
vious requirements. While there are many protocols that must interact,
common computer protocols include
Message encoding
Message size
Message timing
One of the first steps to sending a message is encoding it. Encoding is the
process of converting information into another, acceptable form for
transmission. Decoding reverses this process to interpret the information.
Imagine a person planning a holiday trip with a friend, and calling the
friend to discuss the details of where they want to go. To communicate
the message, the sender must first convert, or encode, his thoughts and
perceptions about the location into words. The words are spoken into the
telephone using the sounds and inflections of spoken language that con-
vey the message. On the other end of the telephone line, the person listen-
ing to the description receives and decodes the sounds to visualize the im-
age of the sunset described by the sender.
Letter writing is one of the most common forms of written human com-
munication. For centuries, the agreed-upon format for personal letters
has not changed. In many cultures, a personal letter contains the follow-
ing elements:
A salutation or greeting
A closing phrase
In addition to having the correct format, most personal letters must also
be enclosed, or encapsulated, in an envelope for delivery, as shown in
Figure 3-4. The envelope has the address of the sender and receiver on it,
each located at the proper place on the envelope. If the destination ad-
dress and formatting are not correct, the letter is not delivered. The
process of placing one message format (the letter) inside another message
format (the envelope) is called encapsulation. Deencapsulation occurs
when the process is reversed by the recipient and the letter is removed
from the envelope.
A letter writer uses an accepted format to ensure that the letter is deliv-
ered and understood by the recipient. In the same way, a message that is
sent over a computer network follows specific format rules for it to be de-
livered and processed. Just as a letter is encapsulated in an envelope for
delivery, so too are computer messages encapsulated. Each computer
message is encapsulated in a specific format, called a frame, before it is
sent over the network. A frame acts like an envelope; it provides the ad-
dress of the intended destination and the address of the source host, as
shown in Figure 3-5.
The format and contents of a frame are determined by the type of mes-
sage being sent and the channel over which it is communicated. Messages
that are not correctly formatted are not successfully delivered to or pro-
cessed by the destination host.
Message Size (3.1.1.5)
Likewise, when a long message is sent from one host to another over a
network, it is necessary to break the message into smaller pieces. The
rules that govern the size of the pieces, or frames, communicated across
the network are very strict. They can also be different, depending on the
channel used. Frames that are too long or too short are not delivered.
The size restrictions of frames require the source host to break a long
message into individual pieces that meet both the minimum and maxi-
mum size requirements. This is known as segmenting. Each segment is
encapsulated in a separate frame with the address information, and is
sent over the network. At the receiving host, the messages are deencapsu-
lated and put back together to be processed and interpreted.
Another factor that affects how well a message is received and under-
stood is timing. People use timing to determine when to speak, how fast
or slow to talk, and how long to wait for a response. These are the rules of
engagement.
Access Method
Flow Control
Timing also affects how much information can be sent and the speed in
which it can be delivered. If one person speaks too quickly, it is difficult
for the other person to hear and understand the message. The receiving
person must ask the sender to slow down. In network communication, a
sending host can transmit messages at a faster rate than the destination
host can receive and process. Source and destination hosts use flow con-
trol to negotiate correct timing for successful communication.
Response Timeout
If a person asks a question and does not hear a response within an ac-
ceptable amount of time, the person assumes that no answer is coming
and reacts accordingly. The person might repeat the question or might go
on with the conversation. Hosts on the network also have rules that spec-
ify how long to wait for responses and what action to take if a response
timeout occurs.
If all hosts on the network need to receive the message at the same time, a
broadcast is used. Broadcasting represents a one-to-all message delivery
option. Additionally, hosts have requirements for acknowledged versus
unacknowledged messages.
Protocols (3.2.1)
One of the best ways to visualize how the protocols within a suite interact
is to view the interaction as a stack. A protocol stack shows how the indi-
vidual protocols within a suite are implemented. The protocols are
viewed in terms of layers, with each higher-level service depending on
the functionality defined by the protocols shown in the lower levels. The
lower layers of the stack are concerned with moving data over the net-
work and providing services to the upper layers, which are focused on
the content of the message being sent. As shown in Figure 3-6, we can use
layers to describe the activity occurring in our face-to-face communica-
tion example. At the bottom layer, the physical layer, we have two people,
each with a voice that can say words out loud. At the second layer, the
rules layer, we have an agreement to speak in a common language. At the
top layer, the content layer, there are words that are actually spoken. This
is the content of the communication.
At the human level, some communication rules are formal and others are
simply understood based on custom and practice. For devices to success-
fully communicate, a network protocol suite must describe precise re-
quirements and interactions. Networking protocols define a common for-
mat and set of rules for exchanging messages between devices. Some
common networking protocols are IP, HTTP, and DHCP.
How and when error and system messages are passed between devices,
as shown in Figure 3-7c
The protocols IP, HTTP, and DHCP are all part of the Internet protocol
suite known as Transmission Control Protocol/IP (TCP/IP). The TCP/IP pro-
tocol suite is an open standard, meaning that these protocols are freely
available to the public, and any vendor is able to implement these proto-
cols on its hardware or in its software.
Figure 3-9 shows some common protocol suites and industry standards.
Figure 3-9 Protocol Suites and Industry Standards
In 1973, Robert Kahn and Vinton Cerf began work on TCP to develop the
next generation of the ARPANET. TCP was designed to replace ARPANET’s
current Network Control Program (NCP). In 1978, TCP was divided into
two protocols: TCP and IP. Later, other protocols were added to the TCP/IP
suite of protocols, including Telnet, FTP, DNS, and many others.
Some important dates in the development of network protocols and ap-
plications are
1969: On October 29, 1969, the first message is transmitted from an SDS
Sigma 7 mainframe computer at the University of California, Los Angeles
(UCLA) to an SDS 940 mainframe computer at Stanford Research Institute.
1981: The TCP and IP protocols are formalized (RFC 793 and RFC 791).
1986: Cisco launches its first routing innovation, the AGS multiprotocol
router.
1991: Tim Bemers-Lee and Robert Cailliau release the specifications for
WWW.
1995: The first specifications for IPv6 (the eventual successor to IPv4)
are released (RFC 1883).
2011: The first World IPv6 Day (June 8, 2011). Many websites and
Internet service providers around the world, including Google, Facebook,
and Yahoo!, participate with more than 1000 other companies for a
worldwide trial of IPv6.
Figure 3-11 and the following list show the complete communication
process using an example of a web server transmitting data to a client.
7. The client receives the data-link frames that contain the data, and each
protocol header is processed and then removed in the opposite order that
it was added. The Ethernet information is processed and removed, fol-
lowed by the IP protocol information, then the TCP information, and fi-
nally the HTTP information.
8. The web page information is then passed on to the client’s web browser
software.
ACTIVITY 3.2.2.4: MAPPING THE PROTOCOLS OF THE TCP/IP SUITE
The Internet Architecture Board (IAB) is responsible for the overall man-
agement and development of Internet standards. The IAB provides over-
sight of the architecture for protocols and procedures used by the
Internet. The IAB consists of 13 members, including the chair of the
Internet Engineering Task Force (IETF). IAB members serve as individuals
and not representatives of any company, agency, or other organization.
The IEEE has more than 400,000 members in more than 160 countries.
More than 107,000 of those members are student members. IEEE provides
educational and career enhancement opportunities to promote the skills
and knowledge with the electronics industry.
The IEEE 802.3 and IEEE 802.11 standards are significant IEEE standards
in computer networking. The IEEE 802.3 standard defines Media Access
Control (MAC) for wired Ethernet. This technology is usually for LANs,
but also has wide-area network (WAN) applications. The 802.11 standard
defines a set of standards for implementing wireless local-area networks
(WLAN). This standard defines the Open Systems Interconnection (OSI)
physical and data link MAC for wireless communications.
ISO (3.2.3.4)
You might be familiar with some of the products that use ISO standards.
The ISO file extension is used on many CD images to signify that it uses
the ISO 9660 standard for its file system. ISO is also responsible for creat-
ing standards for routing protocols.
A layered model, such as the TCP/IP model, is often used to help visualize
the interaction between various protocols. A layered model depicts the
operation of the protocols occurring within each layer, as well as the in-
teraction of protocols with the layers above and below each layer.
The OSI model is the most widely known internetwork reference model.
It is used for data network design, operation specifications, and
troubleshooting.
The TCP/IP and OSI models, shown in Figure 3-12, are the primary mod-
els used when discussing network functionality. Designers of network
protocols, services, or devices can create their own models to represent
their products. Ultimately, designers are required to communicate to the
industry by relating their product or service to either the OSI model or
the TCP/IP model, or to both.
Figure 3-12 OSI and TCP/IP Models
Initially the OSI model was designed by the ISO to provide a framework
on which to build a suite of open systems protocols. The vision was that
this set of protocols would be used to develop an international network
that would not be dependent on proprietary systems.
The OSI model provides an extensive list of functions and services that
can occur at each layer. It also describes the interaction of each layer with
the layers directly above and below it. Although the content of this course
is structured around the OSI reference model, the focus of discussion is
the protocols identified in the TCP/IP protocol model. Table 3-3 lists the
function of each of the layers found in the OSI reference model.
NOTE
The RFCs also contain technical and organizational documents about the
Internet, including the technical specifications and policy documents pro-
duced by the IETF.
The protocols that make up the TCP/IP protocol suite can be described in
terms of the OSI reference model. In the OSI model, the network access
layer and the application layer of the TCP/IP model are further divided to
describe discrete functions that must occur at these layers.
At the network access layer, the TCP/IP protocol suite does not specify
which protocols to use when transmitting over a physical medium; it only
describes the hand-off from the Internet layer to the physical network
protocols. OSI Layers 1 and 2 discuss the necessary procedures to access
the media and the physical means to send data over a network.
As shown in Figure 3-14, the critical parallels between the two network
models occur at OSI Layers 3 and 4. OSI Layer 3, the network layer, is al-
most universally used to describe the range of processes that occur in all
data networks to address and route messages through an internetwork.
IP is the TCP/IP suite protocol that includes the functionality described at
OSI Layer 3.
Figure 3-14 Comparing the OSI Model and the TCP/IP Model
Layer 4, the transport layer of the OSI model, describes general services
and functions that provide ordered and reliable delivery of data between
source and destination hosts. These functions include acknowledgement,
error recovery, and sequencing. At this layer, the TCP/IP protocols TCP
and User Datagram Protocol (UDP) provide the necessary functionality.
IN ACTION
As data moves through the network, it is broken down into smaller pieces
and identified so that the pieces can be put back together when they ar-
rive at the destination. Each piece is assigned a specific name (protocol
data unit [PDU]) and associated with a specific layer of the TCP/IP and OSI
models. Packet Tracer simulation mode enables you to view each of the
layers and the associated PDU. The following steps lead the user through
the process of requesting a web page from a web server by using the web
browser application available on a client PC.
The form that a piece of data takes at any layer is called a protocol data
unit (PDU). During encapsulation, each succeeding layer encapsulates the
PDU that it receives from the layer above in accordance with the protocol
being used. At each stage of the process, a PDU has a different name to re-
flect its new functions. This is shown in Figure 3-16.
Figure 3-16 Encapsulation
Data: The general term for the PDU used at the application layer
Bits: A PDU used when physically transmitting data over the medium
Encapsulation (3.3.1.3)
Data encapsulation is the process that adds additional protocol header in-
formation to the data before transmission. In most forms of data commu-
nications, the original data is encapsulated or wrapped in several proto-
cols before being transmitted.
The application layer protocol, HTTP, begins the process by delivering the
HTML-formatted web page data to the transport layer. There the applica-
tion data is broken into TCP segments. Each TCP segment is given a label,
called a header, containing information about which process running on
the destination computer should receive the message. It also contains the
information that enables the destination process to reassemble the data
to its original format.
The transport layer encapsulates the web page HTML data within the seg-
ment and sends it to the Internet layer, where the IP protocol is imple-
mented. Here the entire TCP segment is encapsulated within an IP packet,
which adds another label, called the IP header. The IP header contains
source and destination host IP addresses, as well as information neces-
sary to deliver the packet to its corresponding destination process.
Next, the IP packet is sent to the network access layer, where it is encap-
sulated within a frame header and trailer. Each frame header contains a
source and destination physical address. The physical address uniquely
identifies the devices on the local network. The trailer contains error-
checking information. Finally, the bits are encoded onto the media by the
server network interface card (NIC).
Deencapsulation (3.3.1.4)
Network Address
The data link, or Layer 2, physical address has a different role. The pur-
pose of the data-link address is to deliver the data-link frame from one
network interface to another network interface on the same network.
Before an IP packet can be sent over a wired or wireless network, it must
be encapsulated in a data-link frame so that it can be transmitted over the
physical medium, the actual network. Ethernet LANs and wireless LANs
are two examples of networks that have different physical media, each
with its own type of data-link protocol.
Network Addresses
Source IP address: The IP address of the sending device, the client com-
puter PC1: 192.168.1.110.
When the sender and receiver of the IP packet are on the same network,
the data-link frame is sent directly to the receiving device. On an Ethernet
network, the data-link addresses are known as Ethernet MAC addresses.
MAC addresses are 48-bit addresses that are physically embedded on the
Ethernet NIC. A MAC address is also known as the physical address or
burned-in address (BIA).
Source MAC address: This is the data-link address, or the Ethernet MAC
address, of the device that sends the IP packet, PC1. The MAC address of
the Ethernet NIC of PC1 is AA-AA-AA-AA-AA-AA.
The source and destination addresses are added to the Ethernet frame.
The frame with the encapsulated IP packet can now be transmitted from
PC1 directly to the FTP server.
MAC Addresses
It should now be clear that to send data to another host on the same LAN,
the source host must know both the physical and logical addresses of the
destination host. After this is known, it can create a frame and send it out
on the network media. The source host can learn the destination IP ad-
dress in a number of ways. For example, it can learn the IP address
through the use of the Domain Name System (DNS), or it can know the
destination IP address because the address is entered in the application
manually, such as when a user specifies the IP address of a destination
FTP server. But how does a host determine the Ethernet MAC address of
another device?
In the example shown in Figure 3-20, the hosts on the LAN are using R1
as the default gateway with its 192.168.1.1 address configured in their
TCP/IP settings. If the destination of a PDU is on a different IP network,
the hosts send the PDUs to the default gateway on the router for further
transmission.
But what are the roles of the network layer address and the data link
layer address when a device is communicating with a device on a remote
network? In this example, shown in Figure 3-21, we have a client com-
puter, PC1, communicating with a server, named Web Server, on a differ-
ent IP network.
Network Addresses
IP addresses indicate the network and device addresses of the source and
destination. When the sender of the packet is on a different network from
the receiver, the source and destination IP addresses will represent hosts
on different networks. This will be indicated by the network portion of
the IP address of the destination host.
Source IP address: The IP address of the sending device, the client com-
puter PC1: 192.168.1.110.
When the sender and receiver of the IP packet are on different networks,
the Ethernet data-link frame cannot be sent directly to the destination
host because the host is not directly reachable in the network of the
sender. The Ethernet frame must be sent to another device known as the
router or default gateway. In our example, the default gateway is R1. R1
has an interface and an IP address that is on the same network as PC1.
This allows PC1 to reach the router directly.
Source MAC address: The Ethernet MAC address of the sending device,
PC1. The MAC address of the Ethernet interface of PC1 is AA-AA-AA-AA-
AA-AA.
The Ethernet frame with the encapsulated IP packet can now be transmit-
ted to R1. R1 forwards the packet to the destination, Web Server. This can
mean that R1 forwards the packet to another router or directly to Web
Server if the destination is on a network connected to R1.
How does the sending device determine the MAC address of the router?
Each device knows the IP address of the router through the default gate-
way address configured in its TCP/IP settings. The default gateway ad-
dress is the address of the router interface connected to the same local
network as the source device. All devices on the local network use the de-
fault gateway address to send messages to the router. After the host
knows the default gateway IP address, it can use ARP to determine the
MAC address of that default gateway. The MAC address of the default
gateway is then placed in the frame.
PACKET TRACER ACTIVITY 3.3.3.3: EXPLORE A NETWORK
You have just completed the Chapter 3 content regarding network proto-
cols and standards.
Assuming that you resolved the beginning of this chapter’s modeling ac-
tivity, how would you compare the following steps taken to design a com-
munications system to the networking models used for communications?
Dividing the message into small steps, delivered a little at a time, to fa-
cilitate understanding of the problem
Checking to see whether the data has been delivered fully and correctly
Data networks are systems of end devices, intermediary devices, and the
media connecting the devices. For communication to occur, these devices
must know how to communicate.
The most widely used networking models are the OSI and TCP/IP models.
Associating the protocols that set the rules of data communications with
the different layers of these models is useful in determining which de-
vices and services are applied at specific points as data passes across
LANs and WANs.
Data that passes down the stack of the OSI model is segmented into pieces
and encapsulated with addresses and other labels. The process is re-
versed as the pieces are deencapsulated and passed up the destination
protocol stack. The OSI model describes the processes of encoding, for-
matting, segmenting, and encapsulating data for transmission over the
network.
The TCP/IP protocol suite is an open standard protocol that has been en-
dorsed by the networking industry and ratified, or approved, by a stan-
dards organization. The Internet protocol suite is a suite of protocols re-
quired for transmitting and receiving information using the Internet.
Protocol data units (PDU) are named according to the protocols of the
TCP/IP suite: data, segment, packet, frame, and bits.
Practice
The following activities provide practice with the topics introduced in this
chapter. The labs and class activities are available in the companion The
Introduction to Networks Lab Manual (ISBN 978-1-58713-312-1). The
Packet Tracer Activities PKA files are found in the online course.
Class Activities
Labs
Packet Tracer Activity 3.2.4.6: Investigating the TCP/IP and OSI Models in
Action
Complete all the review questions listed here to test your understanding
of the topics and concepts in this chapter. The appendix “Answers to the
‘Check Your Understanding’ Questions” lists the answers.
A. Source
B. Keyboard
C. Channel
D. Default gateway
E. Receiver
2. What happens to frames that are too long or too short for the channel
used?
C. They clog the network and block the delivery of other frames.
D. They are returned to the sender.
A. Access method
B. Delay speed
C. Flow control
D. Response timeout
A. Unicast
B. Multicast
C. Broadcast
D. Manycast
A. Functional collection
B. Functional protocol
C. Protocol suite
D. Protocol stack
A. Application protocol
B. Transport protocol
C. Internet protocol
A. TCP/IP
B. ISO
C. AppleTalk
D. Novell NetWare
A. ISOC
B. IAB
C. IETF
D. IEEE
E. ISO
A. IAB
B. IETF
C. IRTF
D. IEEE
E. ISO
11. Which of the following TCP/IP protocols exist at the transport layer of
the TCP/IP reference model? (Choose two.)
A. HTTP
B. FTP
C. TCP
D. DNS
E. UDP
12. Which of the following OSI model layers have the same functionality
as the network access layer in the TCP/IP model? (Choose two.)
A. Application
B. Transport
C. Session
D. Physical
E. Presentation
F. Data link
G. Network
13. Which OSI reference model layer is responsible for common repre-
sentation of the data transferred between application layer services?
A. Application
B. Transport
C. Session
D. Physical
E. Presentation
F. Data link
G. Network
14. Which TCP/IP model layer is responsible for providing the best path
through the network?
A. Application
B. Transport
C. Internet
D. Network access
15. Which application layer protocol allows users on one network to reli-
ably transfer files to and from a host on another network?
A. HTTP
B. FTP
C. IMAP
D. TFTP
E. DHCP
A. Data
B. Segment
C. Packet
D. Frame
E. Bit
18. What pieces of information are required for a host to access resources
on the local network? (Choose three.)
A. Physical address
B. Network address
E. Host name
19. What pieces of information are required for a host to access resources
on a remote network? (Choose four.)
A. Physical address
B. Network address
E. Host name