DMET602 Lecture 2: Network Protocols and Standards
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which message delivery method involves one-to-many communication, typically not to all destinations?

  • Unicast
  • Multicast (correct)
  • Broadcast
  • Anycast

Which message delivery option is exclusively used in IPv4 networks and not available in IPv6?

  • Anycast
  • Multicast
  • Unicast
  • Broadcast (correct)

What is the primary function of network communication protocols?

  • To encrypt network traffic
  • To physically connect devices
  • To define a common set of rules for communication (correct)
  • To manage network hardware

Which of the following can implement network protocols?

<p>Both software and hardware (A)</p> Signup and view all the answers

What are the key attributes associated with Protocols?

<p>Function, Format, and Rules (C)</p> Signup and view all the answers

What is a protocol suite?

<p>A group of inter-related protocols necessary to perform a communication function (A)</p> Signup and view all the answers

In the context of protocol suites, how are protocols typically viewed?

<p>In terms of layers (B)</p> Signup and view all the answers

Which protocol governs how a web server and a web client interact and defines content format?

<p>HTTP (D)</p> Signup and view all the answers

Which protocol is responsible for delivering messages globally from sender to receiver?

<p>IP (B)</p> Signup and view all the answers

Which protocol is responsible for managing individual conversations, guaranteeing delivery, and managing flow control?

<p>TCP (D)</p> Signup and view all the answers

Which protocol suite is most commonly used and maintained by the Internet Engineering Task Force (IETF)?

<p>TCP/IP (D)</p> Signup and view all the answers

Which organization developed the Open Systems Interconnection (OSI) protocols?

<p>ISO and ITU (B)</p> Signup and view all the answers

Which layers do TCP/IP protocols operate at?

<p>Application, Transport, and Internet (D)</p> Signup and view all the answers

What characterizes TCP/IP?

<p>An open standard protocol suite freely available for public use (B)</p> Signup and view all the answers

When a web server encapsulates a web page for sending to a client, which of the following occurs?

<p>The web server adds headers to the data as it moves down the protocol stack (D)</p> Signup and view all the answers

Which of the following is a function of the Internet Architecture Board (IAB)?

<p>Managing and developing Internet standards (B)</p> Signup and view all the answers

Which organization coordinates IP address allocation and domain name management?

<p>ICANN (A)</p> Signup and view all the answers

Which standards organization focuses on electrical and electronics standards, including those for power, healthcare, and telecommunications?

<p>IEEE (D)</p> Signup and view all the answers

What is the purpose of using a layered model in networking?

<p>To simplify complex network operations (B)</p> Signup and view all the answers

Which of the following is a benefit of using a layered model in network design?

<p>It allows products from different vendors to work together (C)</p> Signup and view all the answers

Which layer of the OSI model is responsible for process-to-process communications?

<p>Application (A)</p> Signup and view all the answers

Which layer in the TCP/IP model is responsible for representing data to the user and includes encoding and dialog control?

<p>Application (C)</p> Signup and view all the answers

What is the primary benefit of segmenting messages in data encapsulation?

<p>Improved speed and efficiency (B)</p> Signup and view all the answers

Which protocol is responsible for sequencing individual segments of data during data encapsulation?

<p>TCP (B)</p> Signup and view all the answers

What is the correct order of Protocol Data Units (PDUs) as they pass down the TCP/IP stack during encapsulation?

<p>Data, Segment, Packet, Frame, Bits (A)</p> Signup and view all the answers

During de-encapsulation, what action does a layer perform upon completing its process?

<p>Strips off its header (B)</p> Signup and view all the answers

Which layers use addressing to deliver data from source to destination?

<p>Data link and network layers (B)</p> Signup and view all the answers

If devices are connected to the same Ethernet network, how will the data link frame use the actual MAC address?

<p>The actual MAC address of the destination NIC (C)</p> Signup and view all the answers

In a scenario where the destination is on a remote network, what role does the default gateway play in data transmission?

<p>It acts as the local router to forward the data (D)</p> Signup and view all the answers

Flashcards

Unicast

One-to-one communication method.

Multicast

One-to-many communication, not to all.

Broadcast

One-to-all communication method.

Network Protocol

A set of rules for network communication.

Signup and view all the flashcards

Protocol Suite

Protocols required to perform a communication function.

Signup and view all the flashcards

HTTP

Governs web server and client interaction; defines content.

Signup and view all the flashcards

TCP

Manages conversations, guarantees delivery, and controls flow.

Signup and view all the flashcards

IP

Delivers messages globally from sender to receiver.

Signup and view all the flashcards

TCP/IP

A common protocol suite maintained by IETF.

Signup and view all the flashcards

Segmenting

Breaking messages into smaller units for transmission.

Signup and view all the flashcards

Sequencing

Numbering segments so that the message may be reassembled.

Signup and view all the flashcards

Encapsulation

The process of adding protocol headers to data.

Signup and view all the flashcards

De-encapsulation

The process of removing protocol headers from data.

Signup and view all the flashcards

Network Layer Addresses

Network layer source and destination addresses which are responsible for delivering the IP packet.

Signup and view all the flashcards

Source IP Address

The address of the sending device.

Signup and view all the flashcards

Destination IP Address

The address of the receiving device, final destination of the packet.

Signup and view all the flashcards

Data Link Layer Addresses

Delivering the data link frame from one NIC to another NIC on the same network.

Signup and view all the flashcards

Bandwidth

The capacity at which a medium can carry data.

Signup and view all the flashcards

Throughput

The actual rate of data transfer across the network

Signup and view all the flashcards

Goodput

Usable data transferred, accounting for overhead.

Signup and view all the flashcards

Physical Layer

Physical standards are implemented in hardware

Signup and view all the flashcards

Data Link Layer

Is responsible for communications between end device network interface cards.

Signup and view all the flashcards

Media Access Control

Media access control is the equivalent of traffic rules that regulate the entrance of motor vehicles onto a roadway.

Signup and view all the flashcards

Point-to-Point

Consists of a permanent link between two endpoints.

Signup and view all the flashcards

Bus

All end systems chained together and terminated on each end.

Signup and view all the flashcards

Ring

ach end system is connected to its respective neighbors to form a ring.

Signup and view all the flashcards

Controlled Access

deterministic Access where each node has its own time to use the medium.

Signup and view all the flashcards

Flow Control Services

Frames that identifies flow control services.

Signup and view all the flashcards

Study Notes

  • DMET602 Lecture 2 covers Networks Protocols and Standardization, Network Access: Data Encapsulation and Data Access, and the Physical and Data Link Layers.

Message Delivery Options

  • Message delivery occurs via Unicast (one-to-one), Multicast (one-to-many, but typically not all), and Broadcast (one-to-all) methods.
  • Broadcasts are only for IPv4 networks, not IPv6; Anycast is an additional option for IPv6 delivery.

Network Protocol Overview

  • Protocols can be implemented in software and hardware.
  • Protocols have their own Function, Format, and set of Rules.
  • Network Communications enable devices to exchange data; Network Security secures data via authentication, data integrity, and encryption
  • Routing enables routers to exchange route information, comparing path information to select the best path.
  • Service Discovery is automatic device or service detection.

Network Protocol Suites

  • Protocols must integrate with each other; A protocol suite is a group of inter-related protocols for communication.
  • Protocol suites are sets of rules that work together to solve a problem.
  • Lower Layers are concerned with moving data with the Upper Layers providing services.

Protocol Interaction

  • Networks use several protocols, each with its own function/format.
  • Hypertext Transfer Protocol (HTTP) governs the way a web server and a web client interact by defining content/format.
  • Transmission Control Protocol (TCP) manages conversations, guarantees delivery, and manages flow control.
  • Internet Protocol (IP) delivers messages from senders to receivers globally.
  • Ethernet delivers messages across a Local Area Network (LAN).
  • TCP Internet Protocol Suite or TCP/IP protocol is the most common and is maintained by the Internet Engineering Task Force (IETF)
  • Open Systems Interconnection (OSI) protocols are developed by the ISO and ITU.
  • AppleTalk and Novell NetWare are proprietary suites by Apple Inc. and Novell Inc., respectively.

TCP/IP Protocol Example

  • TCP/IP protocols operate at the application, transport, and internet layers.
  • The most common network access layer LAN protocols are Ethernet and WLAN.
  • TCP/IP is the protocol suite used by the internet, with an open standard freely available to the public and any vendor.
  • It is a standards-based protocol suite endorsed by the networking industry and approved by a standards organization to ensure interoperability

TCP/IP Communication Process

  • A web server encapsulates and sends a web page to a client.
  • A Client de-encapsulates the web page for a web browser.

Standards Organizations

  • Open standards encourage Interoperability, competition and innovation
  • Open standard organizations are vendor-netural, non-profit organizations that were established to created open standards
  • Internet Society (ISOC) promotes open development of the internet, and Internet Architecture Board (IAB) manages internet standards.
  • Internet Engineering Task Force (IETF) develops, updates, and maintains internet and TCP/IP technologies with the Internet Research Task Force (IRTF) focused on long-term research.
  • Internet Corporation for Assigned Names and Numbers (ICANN) coordinates IP address allocation, domain name management, and other information assignment; overseen/managed by the Internet Assigned Numbers Authority (IANA).
  • Institute of Electrical and Electronics Engineers (IEEE) creates power/energy, healthcare, telecommunications, and networking standards.
  • Telecommunications Industry Association (TIA) develops communication standards for radio equipment, cellular towers, Voice over IP (VoIP), & satellite communications
  • International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL)

Benefits of Using a Layered Model

  • Layered models are used because complex networks are difficult to understand.
  • Models include Open System Interconnection (OSI) and TCP/IP.
  • Protocol design is assisted since designed that operate at a specific layer have defined information that they act upon and a defined interface to the layers above an below
  • Foster competition is improved since products from different vendors can work together
  • Prevent technology or capacity changes in a single layer from affecting other layers above and below
  • Provides a common language to describe networking functions
  • OSI Model layers from 7 to 1 include: Application, Presentation, Session, Transport, Network, Data Link, and Physical.
  • TCP/IP layers include Application, Transport, Internet, and Network Access.

Data Encapsulation

  • Encapsulation is a process where protocols add information to data.
  • Segmentation is the process of breaking messages into smaller units and Multiplexing interleaves streams of segmented data together.
  • Segmentation increases the speed large data goes through a network and minimizes information that has to retransmitted.

Data Sequencing

  • Data Sequencing is needed so that segments can be reassembled at the destination.
  • Transmission Control Protocol (TCP) handles the sequencing of the segments.

Protocol Data Units (PDU)

  • Protocol Data Units (PDUs) at each stage has unique names to reflect new function.

  • In the TCP/IP model, PDUs are named according to the protocol suite:

    • Data (Data Stream)
    • Segment
    • Packet
    • Frame
    • Bits (Bit Stream)
  • Encapsulation follows a top-down process

  • De-encapsulation occurs as data moves up the stack, using processes at each layer that strips off it's header

Data Access Addresses

  • Data link and network layers both use addressing to deliver data from source to destination.
  • Network layer addresses deliver IP packets from the original source to final destination.
  • Data link layer addresses deliver data link frames from one NIC to another NIC on the same network.

Layer 3 Logical Address

  • An IP packet contains 2 IP address: Source IP, and Destination IP
  • An IP address contains two parts: the network portion/prefix and the host portion, which is unique fo each device in the network

Devices on the Same Network and Remote Networks

  • On devices on the same network, the source and destination have the same number of the network portion of the address
  • When on the same network, the data link frame uses the actual MAC address of the destination NIC.
  • MAC addresses are local, physically embedded in the Ethernet NIC.
  • The Source MAC address identifies the originator on the link.
  • The Destination MAC address is always be on the same link as the source.
  • Layer 3 provides Layer 2 with DGW(default gateway) or the IP address the router interface
  • All devices on the LAN must be told to direct their to the destination.
  • Once Layer 2 from PC1 forwards to the default gateway(Router), the router starts the routing to start the process of getting the information to the actual destination
  • Data Addressing is local which requires a destination for each link.
  • Unlike L3 addressing, L2 local addressing changes for each link or hop.

The Physical Layer

  • Standards are implemented in hardware with physical layer standards are governed by many organizations including ISO, EIA, TIA, ITU-T, ANSI, IEEE
  • Before any network communications can occur, a physical connection to a local network must be established
  • Physical layer transports bits across the network media as the last step on encapsulation.
  • Next device in the path receives the bits and re-encapsulates, they decides to do with it.
  • Physical Components are the hardware that transmit signals.
  • Encoding converts bits into a data stream recognizable by the next device.
  • Signalling refers to the method by which bit values are represented on the physical medium

Bandwidth Terminology

  • Bandwidth is the rate data can be carried across medium.
  • Digital bandwidth measures the amount of data that can flow in a period of time in bits per second(bps).
  • 1 kbps =1,000 bps, Mbps = 1,000,000 bps, Gbps - 1,000,000,000bps, Tbps = 1,000,000,000,000 bps
  • Latency is the measure of time for data to travel from one point to another with delays.
  • Throughput is the measure of bits transfered, but is less than bandwidth because of overhead
  • Goodput is throughput minus overhead
  • Data link layer is responsible for communications between end-device network interface cards.
  • Allows upper layer protocols to access the physical media and encapsulated Layer 3 packets, preforms error detection and rejects corrupt frames.
  • Two sublayers include Logical Link Control (LLC) and Media Access Control (MAC)
  • The LLC sublayer communicates with network layer and identifies the protocol, MAC defines the media access processes performed by the hardware
  • The MAC sublayer provides access to various network technology.

Topology

  • Media access control is the equivalent of traffic rules that regulate a the motor entrance to the road.
  • Common physical WAN topologies include: the Point-to-point, Hub ad spoke, Mesh
  • LAN's are typically interconnected using a star and extended star topology
  • End devices on LANs require scalable and and easy troubleshooting
  • Bus - End systems chained together with bus and ring topology.

Half and Full Duplex Communication

  • Half-duplex limits access to one device send or receive at a time, used on WLAN and Ethernet hubs.
  • Full-duplex allows both devices to communicate transmits, Ethereal and switches operate in full duplex
  • Media Access Contol methods include Contention and Controlled Based access
  • Contention based access includes nodes that operators in half of duplex with only one can send at a time, examples include CSMA/CD and SM/CA

Media Access Control Methods

  • Carrier Sense Multiple Access / Collision Detection (CSMA/CD) process is used in half-duplex Ethernet LANs, but there are collisions will occur if 2 frames meet at the same time.
  • Data are encapsulated by a data link layer with a header and trailer with data, header, and trailer parts.
  • These include Frame start and stop, addressing, type, control error
  • Also referred to as physical Address are contained within header and are used for local delivery with different types of frames.
  • The logical topology and physical media determine how data is linked.
  • Common frames are eternet, 802.11 wireless, point to point (PPP) and Frame Relay
  • Media access controls are made for logical topologies.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Lecture 2 of DMET602 discusses network protocols, standards, and access methods. It also contrasts message delivery methods like Unicast, Multicast, and Broadcast. The lecture touches on network communication, security, and routing.

More Like This

Cables y Protocolos Ethernet
48 questions
TCP/IP Networking Model Quiz
41 questions

TCP/IP Networking Model Quiz

ExcitedMossAgate3075 avatar
ExcitedMossAgate3075
Use Quizgecko on...
Browser
Browser