W3 Module Network Protocols and Communication
W3 Module Network Protocols and Communication
1
Week 3: Network Protocols and Communication
Rules of Communication
Computer networks use rules for communications, similar to rules used in
human communications. In order for two devices to communicate they must
use the same rules.
A network can be as complex as devices connected across the Internet, or as simple
as two computers directly connected to one another with a single cable, and anything
in-between.
Communication Fundamentals
All communication methods have three elements in common.
Source or sender-Message sources are people, or electronic devices, that
need to send a message to other individuals or devices.
Destination or receiver-Destination receives the message and interprets it.
Channel or media-channel, consists of the media that provides the pathway
over which the message travels from source to destination.
Protocol-The sending of this message, whether by face-to-face communication
or over a network, is governed by rules called protocols.
Course Module
IT6201 – Data Communications and Networking 1 (CISCO 1)
2
Week 3: Network Protocols and Communication
Source: cisco.netacad.com
Figure 1. Human Communication Elements
Source: cisco.netacad.com
Figure 2. Computer Communications
Rule Establishment
Before communicating with one another, individuals must use established
rules or agreements to govern the conversation.
An identified sender and receiver
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledgment requirements
Protocols used in network communications also define
Message encoding
Message delivery options
Message Formatting and Encapsulation
Message Timing
Message Size
IT6201 – Data Communications and Networking 1 (CISCO 1)
3
Week 3: Network Protocols and Communication
Message Encoding
One of the first steps to sending a message is encoding. Encoding is the
process of converting information into another acceptable form for
transmission. Decoding reverses this process in order to interpret the
information.
Encoding between hosts must be in an appropriate format for the
medium. Messages sent across the network are first converted into
bits by the sending host.
Each bit is encoded into a pattern of sounds, light waves, or electrical
impulses depending on the network media over which the bits are
transmitted.
The destination host receives and decodes the signals in order to
interpret the message.
Message Formatting and Encapsulation
When a message is sent from source to destination, it must use a specific format or
structure. Message formats depend on the type of message and the channel that is used to
deliver the message.
Letter writing is one of the most common forms of written human
communication which can be compared to networks.
There is an agreed format for letters and addressing letters which is required for
proper delivery.
The process of placing one message format (the letter) inside another message
format (the envelope) is called encapsulation. On the other hand, De-
encapsulation occurs when the process is reversed by the recipient and the letter
is removed from the envelope.
Each computer message is encapsulated in a specific format, called a frame,
before it is sent over the network.
A frame acts like an envelope providing destination address and source address.
Message Size
Imagine what it would be like to read this course if it all appeared as one long
sentence; it would not be easy to read and comprehend.
Humans break long messages into smaller parts or sentences.
Long messages must also be broken into smaller pieces to travel
across a network.
o Each piece is sent in a separate frame.
o Each frame has its own addressing information.
o A receiving host will reconstruct multiple frames into the original
message.
Course Module
IT6201 – Data Communications and Networking 1 (CISCO 1)
4
Week 3: Network Protocols and Communication
Message Timing
Access Method
Hosts on a network need to know when to begin sending messages
and how to respond when collisions occur.
Flow Control
Source and destination hosts use flow control to negotiate correct
timing to avoid overwhelming the destination and ensure
information is received.
Response Timeout
Hosts on the network have rules that specify how long to wait for
responses and what action to take if a response timeout occurs.
Network Protocols
Networking protocols define a common format and set of rules for
exchanging messages between devices.
Some common networking protocols are Hypertext Transfer
Protocol (HTTP), Transmission Control Protocol (TCP), and
Internet Protocol (IP).
IT6201 – Data Communications and Networking 1 (CISCO 1)
5
Week 3: Network Protocols and Communication
Source: cisco.netacad.com
Figure 3. Structure of Communication Pieces
Network Protocols
Communication between a web server and web client is an example of an
interaction between several protocols:
o HTTP - an application protocol that governs the way a web server
and a web client interact.
o TCP - transport protocol that manages the individual
conversations.
o IP – encapsulates the TCP segments into packets, assigns
addresses, and delivers to the destination host.
o Ethernet - allows communication over a data link and the physical
transmission of data on the network media.
Source: cisco.netacad.com
Figure 4. TCP/IP Protocol Suite
Course Module
IT6201 – Data Communications and Networking 1 (CISCO 1)
6
Week 3: Network Protocols and Communication
Standard Organizations
Standard organizations create the standards that allow devices to
communicate independent of any specific vendor.
Open Standards
Open standards encourage interoperability, competition, and innovation. The
following are the I.T standards organization.
Internet Society (ISOC) –promotes open development and evolution
of Internet use globally.
Internet Architecture Board (IAB) - management and development
of Internet standards.
Internet Engineering Task Force (IETF) - develops, updates, and
maintains Internet and TCP/IP technologies.
Internet Research Task Force (IRTF) - focused on long-term
research related to Internet and TCP/IP protocols.
IT6201 – Data Communications and Networking 1 (CISCO 1)
7
Week 3: Network Protocols and Communication
TCP/IP Model
Course Module
IT6201 – Data Communications and Networking 1 (CISCO 1)
8
Week 3: Network Protocols and Communication
Data Encapsulation
To move through the network, data must be properly encapsulated with
sufficient control and addressing information to allow it to move from the
sender to the receiver
Message Segmentation
Large streams of data are divided into smaller, more manageable pieces to send
over the network.
By sending smaller pieces, many different conversations can be interleaved on the
network, called multiplexing.
Each piece must be labeled.
If part of the message fails to make it to the destination, only the missing pieces
need to be retransmitted.
Encapsulation Example
The encapsulation process works from top to bottom:
o Data is divided into segments.
o The TCP segment is encapsulated in the IP Packet.
o The IP packet is encapsulated in the Ethernet Frame.
IT6201 – Data Communications and Networking 1 (CISCO 1)
9
Week 3: Network Protocols and Communication
Source: cisco.netacad.com
Figure 6. Encapsulation
De-encapsulation Example
The de-encapsulation process works from bottom to top.
De-encapsulation is the process used by a receiving device to remove one or
more of the protocol headers.
The data is de-encapsulated as it moves up the stack toward the end-user
application.
Network Addresses
Network layer source and destination addresses - Responsible for delivering
the IP packet from the original source to the final destination.
o Source IP address - The IP address of the sending device, the original
source of the packet.
o Destination IP address - The IP address of the receiving device, the final
destination of the packet.
Source: cisco.netacad.com
Figure 7. Network Addresses
Course Module
IT6201 – Data Communications and Networking 1 (CISCO 1)
10
Week 3: Network Protocols and Communication
Source: cisco.netacad.com
Figure 8. Devices on the Same Network
The router removes the received Layer 2 information and adds new
data link information before forwarding out the exit interface.
Course Module