0% found this document useful (0 votes)
85 views11 pages

Chapter 3 Reviewer

This document discusses network addressing and data communication protocols. It explains that network addresses are used to identify devices on a network and data link addresses are used to deliver frames between network interfaces. It also summarizes the encapsulation process where data is broken into segments, packets and frames with added headers at each layer. Key network communication protocols discussed include TCP/IP, DNS, DHCP, IMAP and TFTP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views11 pages

Chapter 3 Reviewer

This document discusses network addressing and data communication protocols. It explains that network addresses are used to identify devices on a network and data link addresses are used to deliver frames between network interfaces. It also summarizes the encapsulation process where data is broken into segments, packets and frames with added headers at each layer. Key network communication protocols discussed include TCP/IP, DNS, DHCP, IMAP and TFTP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Data Access PPT reviewer

Network Address

 An individual physical or logical address known as a network address is used to identify a


network node or device on a computer or communication network
 Any new device that requests access to the network or that is already a part of the network is
given a network address, which is a numerical number or address.

Network Addresses and Data link addresses

Physical Bits for synchronization and timing

Data Link Addresses of the source and destination in writing

Network Addresses for logical network sources and destinations

Transport Source and destination process numbers

Upper Layers Application data with encryption

Data Link Addresses

 The second tier of the seven-layer OSI model of computer networking is known as the data link
layer or layer
 data link layer provides the functional and procedural means to transfer data between network
entities and may also provide the means to detect and possibly correct errors that may occur in
the physical layer
 This layer is the protocol layer that transfers data between nodes on a network segment across
the physical layer.
Network Addresses

 Source IP address
 Destination IP address
 Responsible for delivering the IP packet from the original source to the final destination,
either on the same network or to a remote network

Data link Addresses

 Source data link address


 Destination data link address
 Responsible for delivering the data link frame from one network interface card (NIC) to
another NIC on the same network

Device on the same network

In order for devices to be on the same


network, the first number of their IP
addresses has to be the same for both devices

Device on A remote Network

Device that we occasionally find appropriate


and that enables the image acquisition from
Items and transmission through the clearing
procedure is referred to as a remote device.

The supported devices may alter without


giving you prior notice.
Encapsulation Process PPT Reviewer

Message Segmentation

 Large Streams
 Multiplexing

Multiple pieces are labeled for east


direction and re-assembly

Labeling providers for ordering and


assembling the pieces when they
arrive

Protocol Units

 Encapsulation Process
 Protocol Data Units

Data
(Email Data)

Segment
(Data3x, transport, Data)

Packet
(Network Header, Transport
Header, Data)

Frame [medium dependent]


(Frame Header, Network Header,
Transport Header, Data, Frame
Trailer)

Bits
110001010100010110010100101001
Encapsulation Process

Works from top to bottom

 Data
 (TCP)Segments
 IP Packets
 Ethernet Frame

5 Steps of Encapsulation
Application [DATA]

Transport [TCP DATA]

Network [IP TCP DATA]

Data Link [DATA LINK IP TCP DATA]

Physical [Transmission Bits]

De Encapsulation Process
Communication Fundamentals PPT Reviewer

The primary purpose of any network is to provide a method to communicate and share information

Human Communication
Message source – Transmitter – Transmission Medium – Receiver – Message Destination

Communication Protocols

 What method of communication should you use?


 What language should you use?
 Do you need to confirm that your messages are received

Data Communications

 transmission of this digital data between two or more computers

Computer Network

 or data network is a telecommunications network that allows computers to exchange data

Characteristics of Data Communication

Delivery:

The data should be delivered to the correct destination and correct user.

Accuracy:

The communication system should deliver the data accurately, without introducing any errors.
The data may get corrupted during transmission affecting the accuracy of the delivered data.

Timeliness:

Audio and Video data has to be delivered in a timely manner without any delay; such a data
delivery is called real time transmission of data.

Jitter:

It is the variation in the packet arrival time. Uneven Jitter may affect the timeliness of data being
transmitted
Computer Communication
Message source – Transmitter – Transmission Medium – Receiver – Message Destination

RULE ESTABLISHMENT

PROTOCOLS

 Identified sender or receiver


 Common language and grammar
 Speed and timing of delivery
 Confirmation/Acknowledgment
 Requirements
 Encoding
 Delivery Options
 Formatting and Encapsulation
 Timing
 Size

RULE ESTABLISHMENT

 FILIPINO BISAYA
 IBON LANGGAM

Message Encoding
Message Source – Encoder – Transmission – Transmission Medium – Receiver – Decoder – Message Destination
Protocol Suites PPT Reviewer
AppleTalk

is a discontinued proprietary suite of


networking protocols developed by Apple
Computer for their Macintosh computers. 

NetWare

is a discontinued computer network operating


system developed by Novell, Inc. It initially
used cooperative multitasking to run various
services on a personal computer, using the IPX
network protocol.

Development of TCP/IP

 TCP/IP was developed in the 1970s and adopted as the protocol standard for ARPANET (the
predecessor to the Internet) in 1983.
 (Commonly known as TCP/IP)? It is the set of communications protocols used for the Internet
and other similar networks.

Why was the TCP IP model developed?

 TCP/IP was developed by the U.S. Department of Defense to specify how computers transfer
data from one device to another.

 TCP/IP puts a lot of emphasis on accuracy, and it has several steps to ensure that data is
correctly transmitted between the two computers.

What is TCP IP protocol suite?

TCP/IP is an abbreviation for Transmission


Control Protocol/Internet Protocol

it refers to a set of communication protocols


used to connect network devices on the
internet.

TCP/IP is also used in a private computer


network as a communications protocol (an
intranet or extranet).
 Domain Name System (DNS)
DNS, or the Domain Name System, translates human readable domain names (for
example, www.amazon.com) to machine readable IP addresses (for example, 192.0.
2.44).

 DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)


is a client/server protocol that automatically assigns an IP address and other
configuration information to an Internet Protocol (IP) host, such as the subnet mask and
default gateway.

 INTERNET MESSAGE ACCESS PROTOCOL (IMAP)


With IMAP accounts, messages are stored in a remote server. Users can log in via
multiple email clients on computers or mobile device and read the same messages.

 Trivial File Transfer Protocol (TFTP)


is a simple protocol for exchanging files between two TCP/IP machines.

 Hypertext transfer protocol (http)


It was created to facilitate communication between web browsers and web servers, but
it can also be used for other applications.

 User Datagram Protocol (UDP)


is a communications protocol that is primarily used to establish low-latency and loss-
tolerating connections between applications on the internet.

Protocol Operation – Sending a Message Protocol Operation – Receiving a Message


Standard Organization PPT Reviewer

Standards organizations

 are important in maintaining an open Internet with freely accessible specifications and protocols
that can be implemented by any vendor
 may draft a set of rules entirely on its own or in other cases may select a proprietary protocol as
the basis for the standard.
 If a proprietary protocol is used, it usually involves the vendor who created the protocol

Open Standards

 Electronics and Communications Standard Organizations


 Also guarantee that no single company’s product can monopolize the market, or have an unfair
advantage over its competition

Internet Standards

 The Internet Society (ISOC)


 The Internet Architecture Board (IAB)
 The Internet Engineering Task Force (IETF)
 The Institute of Electrical and Electronics Engineers (IEEE)
 The International Organization for Standardization (ISO)
 Internet Research Task Force (IRTF)
 Internet Assigned Numbers Authority (IANA)
 ICANN (Internet Corporation for Assigned Names and Numbers) was created

An internet standard (STD) is a specification that has been approved by the Internet Engineering Task
Force (IETF)

Such standard helps to promote a consistent and universal use of the internet worldwide

Electronics and Communications Standard Organizations

Institute of Electrical and Electronic Engineers (IEEE) Professional organization of engineers. An example
is the IEEE-754 standard for representing floating point numbers

Electronics Industries Association (EIA)

Telecommunications Industry Association (TIA) 35


Protocol PPT Reviewer

Rules that Govern Communications

Protocol suites are implemented by


hosts and networking devices in
software, hardware or both.

The protocols are


viewed in terms of
layers, with each
higher-level service
depending on the
functionality defined
by the protocols
shown in the lower
levels.

Some common networking protocols are IP, HTTP, and DHCP.

HTTP - an application protocol that governs the way a


web server and a web client interact.

TCP - transport protocol that manages the individual


conversations.

IP – encapsulates the TCP segments into packets,


assigns addresses, and delivers to the destination host.

Ethernet - allows communication over a data link and


the physical transmission of data on the network
media
Rule of Communication PPT Reviewer

MESSAGE FORMATTING AND ENCAPSULATION

Personal letter contains the following elements

• An identifier of the recipient


• A salutation or greetings
• The message contents
• A closing phrases
• An identifier of the sender

Message Size

• The source host breaks a long message into individual pieces or frames that
meet both the minimum and maximum size requirements.
• Each frame will also have its own addressing information
• At the receiving host, the pieces are reconstructed to be processed and
interpreted

Message Timing

• Access Method
• Flow Method
• Response Timeout

Message Delivery Option

 Unicast (one to one)


 Multicast (one to many)
 Broadcast (one to all)

You might also like