0% found this document useful (0 votes)
57 views33 pages

3 Communication Principles

The document discusses network communication protocols and standards. It explains that protocols define rules for communication and standards ensure all devices implement protocols the same way. It also describes layered models like TCP/IP and OSI that organize network functions and how protocols interact at different layers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views33 pages

3 Communication Principles

The document discusses network communication protocols and standards. It explains that protocols define rules for communication and standards ensure all devices implement protocols the same way. It also describes layered models like TCP/IP and OSI that organize network functions and how protocols interact at different layers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

System and Network Administration 2

BSCPE
Main Objective:
Explain the importance of standards and protocols in network
communications
Topic Title Topic Objective

Communication Protocols Describe network communication protocols.

Communication Standards Describe network communication standards.

Network Communication Models Compare the OSI and TCP/IP models.

System and Network Administration 2


• What method of communication should we use?
• What language should we use?
• Do we need to confirm that our messages are received?

System and Network Administration 2


METHOD

System and Network Administration 2


LANGUAGE

System and Network Administration 2


CONFIRMATION

System and Network Administration 2


These rules, or protocols, must be followed in order for the message to
be successfully delivered and understood.
Among the protocols that govern successful human communication
are these:
• An identified sender and receiver
• Agreed upon method of communicating (face-to-face, telephone,
letter, photograph)
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements

System and Network Administration 2


Why Protocols matter?

Protocols are required for computers to properly communicate across


the network.

A local network is defined as an area where all hosts must “speak the
same language” - in computer term means they must “share a
common protocol”.

Networking protocols define many aspects of communication over the


local network.
System and Network Administration 2
Protocol
Description
Characteristics

When a message is sent, it must use a specific format or structure. Message


Message format formats depend on the type of message and the channel that is used to deliver
the message.

The rules that govern the size of the pieces communicated across the network
are very strict. They can also be different, depending on the channel used.
Message size When a long message is sent from one host to another over a network, it may
be necessary to break the message into smaller pieces in order to ensure that
the message can be delivered reliably.

Many network communication functions are dependent on timing. Timing


determines the speed at which the bits are transmitted across the network. It
Timing
also affects when an individual host can send data and the total amount of
data that can be sent in any one transmission.

System and Network Administration 2


Protocol
Description
Characteristics

Messages sent across the network are first converted into bits by the sending host. Each bit is
encoded into a pattern of sounds, light waves, or electrical impulses depending on the
Encoding
network media over which the bits are transmitted. The destination host receives and
decodes the signals in order to interpret the message.

Each message transmitted on a network must include a header that contains addressing
information that identifies the source and destination hosts, otherwise it cannot be delivered.
Encapsulation Encapsulation is the process of adding this information to the pieces of data that make up
the message. In addition to addressing, there may be other information in the header that
ensures that the message is delivered to the correct application on the destination host.

Some messages require an acknowledgment before the next message can be sent. This type
of request/response pattern is a common aspect of many networking protocols. However,
Message Pattern
there are other types of messages that may be simply streamed across the network, without
concern as to whether they reach their destination.
System and Network Administration 2
Question

Kora, a Filipino traveler in Tokyo, Japan, stops and asks Tanjiro for
directions to the Senso-ji Temple. They verbally communicate and
determine that they both speak English. After receiving directions in
English to the temple, Kora repeats them to Tanjiro. Tanjiro says, "Yes,
that is correct." What is the order of the communication protocols used
in this scenario?

A. language, method, confirmation C. method, language, confirmation


B. method, confirmation, language D. confirmation, method, language
System and Network Administration 2
Question

Rory is studying the fields inside an Ethernet frame for an upcoming test
and notices that the destination Media Access Control (MAC) address is
listed first before the source MAC address. Which of the following
protocol characteristics is Rory investigating?
A. Timing
B. Message timing
C. Encapsulation
D. Message Pattern
E. Encoding
System and Network Administration 2
Question

As Rory continues to study Ethernet, he discovers that a frame can


typically be 64 to 1518 bytes of information that is converted into a series
of bits before being sent out on the network.
Which two protocol characteristics did Rory learn about for Ethernet?
A. Encoding
B. Message timing
C. Encapsulation
D. Message Pattern
E. Message size
System and Network Administration 2
System and Network Administration 2
System and Network Administration 2
System and Network Administration 2
System and Network Administration 2
System and Network Administration 2
PROTOCOLS - the rules that govern how devices communicate.
Most network communications are broken up into smaller data units,
which we can refer to as packets.

When packets are sent on a network, many protocols are involved to


help them reach their final destination, each accomplishing a different
task.

System and Network Administration 2


System and Network Administration 2
System and Network Administration 2
System and Network Administration 2
The Internet and Standards

A standard is a set of rules that determines how


something must be done.

Networking and internet standards ensure that all


devices connecting to the network implement the
same set of rules or protocols in the same manner.

System and Network Administration 2


Network Standards Organizations

An internet standard is the result of a comprehensive cycle


of discussion, problem solving, and testing. These different
standards are developed, published, and maintained by a
variety of organizations, as shown in the figure.

System and Network Administration 2


Layered models help us visualize how the various protocols work
together to enable network communications. A layered model
depicts the operation of the protocols occurring within each layer,
as well as the interaction with the layers above and below it.
The layered model has many benefits:
• Assists in protocol design, because protocols that operate at a specific
layer have defined information that they act upon and a defined interface
to the layers above and below.
• Fosters competition because products from different vendors can work
together.
• Enables technology changes to occur at one level without affecting the
other levels.
• Provides a common language to describe networking functions and
capabilities.
System and Network Administration 2
TCP/IP MODEL
The first layered model for internetwork communications was created in
the early 1970s and is referred to as the internet model. The suite of TCP/IP
protocols that are used for internet communications follows the structure
of this model, as shown in the table. Because of this, the internet model is
commonly referred to as the TCP/IP model.

System and Network Administration 2


There are two basic types of models that we use to
describe the functions that must occur in order for network
communications to be successful:

• Protocol model

• Reference model

System and Network Administration 2


Protocol Model: This model closely matches the structure of
a particular protocol suite. A protocol suite includes the set
of related protocols that typically provide all the
functionality required for people to communicate with the
data network. The TCP/IP model is a protocol model
because it describes the functions that occur at each layer
of protocols within the TCP/IP suite.

System and Network Administration 2


Reference model - This type of model describes the
functions that must be completed at a particular layer, but
does not specify exactly how a function should be
accomplished. A reference model is not intended to
provide a sufficient level of detail to define precisely how
each protocol should work at each layer. The primary
purpose of a reference model is to aid in clearer
understanding of the functions and processes necessary
for network communications.

System and Network Administration 2


System and Network Administration 2
Because TCP/IP is the protocol suite in use for internet communications,
why do we need to learn the OSI model as well?

The protocols that make up the TCP/IP protocol suite can be described in terms
of the OSI reference model.

System and Network Administration 2


The key similarities are in the transport and network layers;
however, the two models differ in how they relate to the layers
above and below each layer:

• OSI Layer 3, the network layer, maps directly to the TCP/IP


internet layer. This layer is used to describe protocols that
address and route messages through an internetwork.
• OSI Layer 4, the transport layer, maps directly to the TCP/IP
transport layer. This layer describes general services and
functions that provide ordered and reliable delivery of data
between source and destination hosts.

System and Network Administration 2


• The TCP/IP application layer includes several protocols that
provide specific functionality to a variety of end user
applications. The OSI model Layers 5, 6, and 7 are used as
references for application software developers and vendors to
produce applications that operate on networks.
• Both the TCP/IP and OSI models are commonly used when
referring to protocols at various layers. Because the OSI model
separates the data link layer from the physical layer, it is
commonly used when referring to these lower layers.

System and Network Administration 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy