Module 3 - DDC
Module 3 - DDC
The process of sending a letter is similar to Notice how it is difficult to read the message because it
communication that occurs in computer networks. is not formatted properly. It should be written using
rules (i.e., protocols) that are necessary for effective
Analogy communication. The example shows the message which
is now properly formatted for language and grammar.
Message encoding
Message size
3.1.7. Message Formatting and Encapsulation
Message timing
When a message is sent from source to destination, it
Message delivery options must use a specific format or structure. Message
formats depend on the type of message and the
3.1.6. Message Encoding channel that is used to deliver the message.
One of the first steps to sending a message is encoding. Analogy
Encoding is the process of converting information into
another acceptable form, for transmission. Decoding A common example of requiring the correct format in
reverses this process to interpret the information. human communications is when sending a letter.
Analogy
Network
3.2. Protocols
This function
uniquely labels each
transmitted 3.2.3. Protocol Interaction
segment of data.
A message sent over a computer network typically
The receiving device
requires the use of several protocols, each one with its
uses the sequencing
own functions and format. The figure shows some
information to
common network protocols that are used when a device
reassemble the
sends a request to a web server for its web page.
information
correctly. This is
useful if the data
segments are lost,
delayed or received
out-of-order. TCP
provides sequencing
Sequencing services.
Application Layer
Transport layer
Internet Layer
Application Layer
3.3.4. TCP/IP Protocol Suite
Name System
Today, the TCP/IP protocol suite includes many protocols
DNS - Domain Name System. Translates domain
and continues to evolve to support new services. Some
names such as cisco.com, into IP addresses.
of the more popular ones are shown in the figure.
Host Config
You cannot actually watch real packets travel across a 3.5.2. The OSI Reference Model
real network, the way you can watch the components of
The OSI reference model provides an extensive list of
a car being put together on an assembly line. so, it helps
functions and services that can occur at each layer. This
to have a way of thinking about a network so that you
type of model provides consistency within all types of
can imagine what is happening. A model is useful in
network protocols and services by describing what must
these situations.
be done at a particular layer, but not prescribing how it
Complex concepts such as how a network operates can should be accomplished.
be difficult to explain and understand. For this reason, a
It also describes the interaction of each layer with the
layered model is used to modularize the operations of a
layers directly above and below. The TCP/IP protocols
network into manageable layers.
discussed in this course are structured around both the
These are the benefits of using a layered model to OSI and TCP/IP models. The table shows details about
describe network protocols and operations: each layer of the OSI model. The functionality of each
layer and the relationship between layers will become
Assisting in protocol design because protocols more evident throughout this course as the protocols
that operate at a specific layer have defined are discussed in more detail.
information that they act upon and a defined
interface to the layers above and below
instance, the physical layer is referred to as Layer 1 of
OSI Model Description
the OSI model, data link layer is Layer2, and so on.
Layer
3.5.3. The TCP/IP Protocol Model
The application layer contains The TCP/IP protocol model for internetwork
7– protocols used for process-to- communications was created in the early 1970s and is
Application process communications. sometimes referred to as the internet model. This type
of model closely matches the structure of a particular
The presentation layer provides protocol suite. The TCP/IP model is a protocol model
for common representation of the because it describes the functions that occur at each
6– data transferred between layer of protocols within the TCP/IP suite. TCP/IP is also
Presentation application layer services. used as a reference model. The table shows details
about each layer of the OSI model.
Note: Whereas the TCP/IP model layers are referred to Controls the hardware
only by name, the seven OSI model layers are more 1 – Network devices and media that
often referred to by number rather than by name. For Access make up the network.
At the network access layer, the TCP/IP protocol suite This simulation activity is intended to provide a
does not specify which protocols to use when foundation for understanding the TCP/IP protocol suite
transmitting over a physical medium; it only describes and the relationship to the OSI model. Simulation mode
the handoff from the internet layer to the physical allows you to view the data contents being sent across
network protocols. OSI Layers 1 and 2 discuss the the network at each layer.
necessary procedures to access the media and the
As data moves through the network, it is broken down
physical means to send data over a network.
into smaller pieces and identified so that the pieces can
be put back together when they arrive at the
destination. Each piece is assigned a specific name and
is associated with a specific layer of the TCP/IP and OSI
models. The assigned name is called a protocol data unit
(PDU). Using Packet Tracer simulation mode, you can
view each of the layers and the associated PDU. The
following steps lead the user through the process of
requesting a web page from a web server by using the
web browser application available on a client PC.
OSI Layer 4, the transport layer, maps directly to Knowing the OSI reference model and the TCP/IP
the TCP/IP transport layer. This layer describes protocol model will come in handy when you learn
general services and functions that provide about how data is encapsulated as it moves across a
ordered and reliable delivery of data between network. It is not as simple as a physical letter being
source and destination hosts. sent through the mail system.
The TCP/IP application layer includes several In theory, a single communication, such as a video or an
protocols that provide specific functionality to a email message with many large attachments, could be
variety of end user applications. The OSI model sent across a network from a source to a destination as
Layers 5, 6, and 7 are used as references for one massive, uninterrupted stream of bits. However,
application software developers and vendors to this would create problems for other devices needing to
produce applications that operate on networks. use the same communication channels or links. These
large streams of data would result in significant delays.
Both the TCP/IP and OSI models are commonly Further, if any link in the interconnected network
used when referring to protocols at various infrastructure failed during the transmission, the
layers. Because the OSI model separates the complete message would be lost and would have to be
data link layer from the physical layer, it is retransmitted in full.
commonly used when referring to these lower
layers. A better approach is to divide the data into smaller,
more manageable pieces to send over the network.
3.5.5. Packet Tracer – Investigate the TCP/IP and OSI Segmentation is the process of dividing a stream of data
Models in Action into smaller units for transmissions over the network.
Segmentation is necessary because data networks use
the TCP/IP protocol suite send data in individual IP shown in the figure. TCP is responsible for sequencing
packets. Each packet is sent separately, similar to the individual segments.
sending a long letter as a series of individual postcards.
Packets containing segments for the same destination
can be sent over different paths.
Packet – Network layer PDU As you just learned, it is necessary to segment messages
in a network. But those segmented messages will not go
Frame – Data Link layer PDU
anywhere if they are not addressed properly. This topic
Bits – Physical layer PDU used when physically gives an overview of network addresses. You will also
transmitting data over the medium get the chance to use the Wireshark tool, which will
help you to ‘view’ network traffic.
Note: If the Transport header is TCP, then it is a
segment. If the Transport header is UDP then it is a The network and data link layers are responsible for
datagram. delivering the data from the source device to the
destination device. As shown in the figure, protocols at
3.6.4. Encapsulation Example both layers contain a source and destination address,
When messages are being sent on a network, the but their addresses have different purposes:
encapsulation process works from top to bottom. At Network layer source and destination
each layer, the upper layer information is considered addresses – Responsible for delivering the IP
data within the encapsulated protocol. For example, the packet from the original source to the final
TCP segment is considered data within the IP packet. destination, which may be on the same network
or a remote network.
This process is reversed at the receiving host and is 3.7.2. Layer 3 Logical Address
known as de-encapsulation. De-encapsulation is the
An IP address is the network layer, or Layer 3, logical
process used by a receiving device to remove one or
address used to deliver the IP packet from the original
more of the protocol headers. The data is de-
source to the final destination, as shown in the figure.
encapsulated as it moves up the stack toward the end-
user application.
When the sender and receiver of the IP packet are on 3.7.8. Data Link Addresses
different networks, the Ethernet data link frame cannot
The data link Layer 2 physical address has a different
be sent directly to the destination host because the host
role. The purpose of the data link address is to deliver
is not directly reachable in the network of the sender.
the data link frame from one network interface to
The Ethernet frame must be sent to another device
another network interface on the same network.
known as the router or default gateway. In our example,
the default gateway is R1. R1 has an Ethernet data link Before an IP packet can be sent over a wired or wireless
address that is on the same network as PC1. This allows network, it must be encapsulated in a data link frame,
PC1 to reach the router directly. so it can be transmitted over the physical medium.
Source MAC address – The Ethernet MAC Host to Router
address of the sending device, PC1. The MAC
Destination data link address – The physical
address of the NIC that is receiving the data link
frame. This address is either the next hop router
or the address of the final destination device.
Router to Router
Router to Server