Module 5 Communication Principles
Module 5 Communication Principles
Module 5 Communication Principles
All communication begins with a message, or information, that must be sent from one individual or
device to another. The methods used to send, receive, and interpret messages change over time as
technology advances.
All communication methods have three elements in common. The first of these elements is the
message source, or sender. Message sources are people, or electronic devices, that need to communicate
a message to other individuals or devices. The second element of communication is the destination, or
receiver, of the message. The destination receives the message and interprets it. The third element is called
a transmission medium, or channel. It provides the pathway over which the message can travel from source
to destination.
• Analogy - Prior to communicating, they must agree on how to communicate. If the communication
is using voice, they must first agree on the language. Next, when they have a message to share,
they must be able to format that message in a way that is understandable. If someone uses the
English language, but poor sentence structure, the message can easily be misunderstood. Each of
these tasks describe protocols that are used to accomplish communication.
• Network - Prior to communicating, the devices must agree on how to communicate. They must
also format the message in a way that is understandable.
Communication Protocols
Communication in our daily lives takes many forms and occurs in many environments. We have
different expectations depending on whether we are chatting via the internet or participating in a job
interview. Each situation has its corresponding expected behaviors and styles.
Before beginning to communicate with each other, we establish rules or agreements to govern
the conversation. These agreements include the following:
• What method of communication should we use?
• What language should we use?
• Do we need to confirm that our messages are received?
These rules, or protocols, must be followed in order for the message to be successfully delivered
and understood. Among the protocols that govern successful human communication are these:
• An identified sender and receiver
• Agreed upon method of communicating (face-to-face, telephone, letter, photograph)
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements
The techniques that are used in network communications share these fundamentals with human
conversations.
Think about the commonly accepted protocols for sending text messages to your friends.
Why Protocols Matter
Just like humans, computers use rules, or protocols, in order to communicate. Protocols are
required for computers to properly communicate across the network. In both a wired and wireless
environment, a local network is defined as an area where all hosts must "speak the same language", which,
in computer terms means they must "share a common protocol".
If everyone in the same room spoke a different language, they would not be able to communicate.
Likewise, if devices in a local network did not use the same protocols, they would not be able to
communicate.
Networking protocols define many aspects of communication over the local network. As shown in
the table, these include message format, message size, timing, encoding, encapsulation, and message
patterns.
The rules that govern the size of the pieces communicated across the network
are very strict. They can also be different, depending on the channel used.
Message size When a long message is sent from one host to another over a network, it may
be necessary to break the message into smaller pieces in order to ensure that
the message can be delivered reliably.
Messages sent across the network are first converted into bits by the sending
host. Each bit is encoded into a pattern of sounds, light waves, or electrical
Encoding impulses depending on the network media over which the bits are transmitted.
The destination host receives and decodes the signals in order to interpret the
message.
A standard is a set of rules that determines how something must be done. Networking and internet
standards ensure that all devices connecting to the network implement the same set of rules or protocols
in the same manner. Using standards, it is possible for different types of devices to send information to
each other over the internet. For example, the way in which an email is formatted, forwarded, and received
by all devices is done according to a standard. If one person sends an email via a personal computer,
another person can use a mobile phone to receive and read the email as long as the mobile phone uses
the same standards as the personal computer.
The separation of functions enables each layer in the stack to operate independently of others. For
example, you can use your laptop computer connected to a cable modem at home to access your favorite
website, or view the same website on your laptop using a wireless connection at the library. The function
of the web browser is not affected by the change in the physical location, nor the method of connectivity.
The first layered model for internetwork communications was created in the early 1970s and is
referred to as the internet model. It defines four categories of functions that must occur in order for
communications to be successful. The suite of TCP/IP protocols that are used for internet communications
follows the structure of this model, as shown in the figure. Because of this, the internet model is commonly
referred to as the TCP/IP model.
Application Represents data to the user, plus encoding and dialog control.
Network Access Controls the hardware devices and media that make up the network.
• Protocol model - This model closely matches the structure of a particular protocol suite. A protocol
suite includes the set of related protocols that typically provide all the functionality required for
people to communicate with the data network. The TCP/IP model is a protocol model because it
describes the functions that occur at each layer of protocols within the TCP/IP suite.
• Reference model - This type of model describes the functions that must be completed at a
particular layer, but does not specify exactly how a function should be accomplished. A reference
model is not intended to provide a sufficient level of detail to define precisely how each protocol
should work at each layer. The primary purpose of a reference model is to aid in clearer
understanding of the functions and processes necessary for network communications.
The most widely known internetwork reference model was created by the Open Systems
Interconnection (OSI) project at the International Organization for Standardization (ISO). It is used for data
network design, operation specifications, and troubleshooting. This model is commonly referred to as the
OSI model.
The presentation layer provides for common representation of the data transferred
6 - Presentation
between application layer services.
The session layer provides services to the presentation layer to organize its
5 - Session
dialogue and to manage data exchange.
The transport layer defines services to segment, transfer, and reassemble the data
4 - Transport
for individual communications between the end devices.
The network layer provides services to exchange the individual pieces of data over
3 - Network
the network between identified end devices.
The data link layer protocols describe methods for exchanging data frames
2 - Data Link
between devices over a common media
OSI Model Layer Description
The physical layer protocols describe the mechanical, electrical, functional, and
1 - Physical procedural means to activate, maintain, and de-activate physical connections for a
bit transmission to and from a network device.
For example, in a vehicle manufacturing plant, the entire vehicle is not assembled by one person.
Rather, the vehicle moves from station to station where specialized teams add specific components. The
complex task of assembling a vehicle is made easier by breaking it into manageable and logical tasks. This
process also makes troubleshooting easier. When a problem occurs in the manufacturing process, it is
possible to isolate the problem to the specific task where the defect was introduced, and then fix it.
In a similar manner, the OSI model helps us troubleshoot by focusing on a specific layer to identify
and resolve network problems. Networking teams often refer to different functions occurring on a network
by the number of the OSI model layer that specifies that functionality. For example, the process of encoding
the data bits for transmission across the media occurs at Layer 1, the physical layer. The formatting of data
so it can be interpreted by the network connection in your laptop or phone is described at Layer 2, the data
link layer.
Layer Layer
Group Common Network Components Associated with this Layer
Number Name
7 Application
• Network aware applications
6 Presentation • Email
Upper Layers • Web browsers and servers
• File transfer
5 Session • Name resolution
• IP addressing
3 Network
Lower Layers • Routing
The TCP/IP model is a method of visualizing the interactions of the various protocols that make up
the TCP/IP protocol suite. It does not describe general functions that are necessary for all networking
communications. It describes the networking functions specific to those protocols in use in the TCP/IP
protocol suite. For example, at the network access layer, the TCP/IP protocol suite does not specify which
protocols to use when transmitting over a physical medium, nor the method of encoding the signals for
transmission. OSI Layers 1 and 2 discuss the necessary procedures to access the media and the physical
means to send data over a network.
The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI
reference model. The functions that occur at the internet layer in the TCP/IP model are contained in the
network layer of the OSI Model, as shown in the figure. The transport layer functionality is the same between
both models. However, the network access layer and the application layer of the TCP/IP model are further
divided in the OSI model to describe discrete functions that must occur at these layers.
Chapter 5.4 – Ethernet
As networks became more widespread, standards were developed that defined rules by which
network equipment from different vendors operated. Standards are beneficial to networking in many ways:
• Facilitate design
• Simplify product development
• Promote competition
• Provide consistent interconnections
• Facilitate training
• Provide more vendor choices for customers
There is no official local area networking standard protocol, but over time, one technology, Ethernet,
has become more common than the others. Ethernet protocols define how data is formatted and how it is
transmitted over the wired network. The Ethernet standards specify protocols that operate at Layer 1 and
Layer 2 of the OSI model. Ethernet has become a de facto standard, which means that it is the technology
used by almost all wired local area networks, as shown in the figure.
Ethernet Evolution
The Institute of Electrical and Electronic Engineers, or IEEE (pronounced eye-triple-e), maintains
the networking standards, including Ethernet and wireless standards. IEEE committees are responsible for
approving and maintaining the standards for connections, media requirements and communications
protocols. Each technology standard is assigned a number that refers to the committee that is responsible
for approving and maintaining the standard. The committee responsible for the Ethernet standards is 802.3.
Since the creation of Ethernet in 1973, standards have evolved for specifying faster and more flexible
versions of the technology. This ability for Ethernet to improve over time is one of the main reasons that it
has become so popular. Each version of Ethernet has an associated standard. For example, 802.3
100BASE-T represents the 100 Megabit Ethernet using twisted-pair cable standards. The standard notation
translates as:
• 100 is the speed in Mbps
• BASE stands for baseband transmission
• T stands for the type of cable, in this case, twisted-pair.
Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of Ethernet operate
at 10 Gigabits per second and more. Imagine how much faster these new versions are than the original
Ethernet networks.
When your name is called, you listen to the message and respond. Other people in the room may
hear the message, but they ignore it because it is not addressed to them.
On Ethernet networks, a similar method exists for identifying source and destination hosts. Each
host connected to an Ethernet network is assigned a physical address which serves to identify the host on
the network.
Every Ethernet network interface has a physical address assigned to it when it is manufactured.
This address is known as the Media Access Control (MAC) address. The MAC address identifies each
source and destination host on the network.
SUMMARY
The Rules
All communication methods have three elements in common. The first is the message source, or
sender. Message sources are people, or electronic devices, which need to communicate a message to
other individuals or devices. The second is the destination, or receiver, of the message. The destination
receives the message and interprets it. The third is the transmission medium, or channel. It provides the
pathway over which the message can travel from source to destination.
Among the protocols that govern successful human communication are an identified sender and
receiver, an agreed upon method of communicating, common language and grammar, speed and timing of
delivery, and confirmation or acknowledgment requirements. Networking protocols define the message
format, message size, timing, encoding, and message patterns over the local network.
Communication Standards
Networking and internet standards ensure that all devices connecting to the network implement the
same set of rules or protocols in the same manner. Using standards, it is possible for different types of
devices to send information to each other over the internet. These standards are developed, published, and
maintained by a variety of organizations. When a new standard is proposed, each stage of the development
and approval process is recorded in a numbered RFC document so that the evolution of the standard is
tracked. RFCs for internet standards are published and managed by the IETF.
The suite of TCP/IP protocols that is used for internet communications follows the structure of the
stack model. There are two basic types of models to describe the functions that must occur for network
communications to be successful: protocol models and reference models. The most widely known
internetwork reference model is the OSI model. The OSI model breaks network communications down into
multiple processes. Each process is a small part of the larger task.
The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI
reference model. The functions that occur at the internet layer in the TCP/IP model are contained in the
network layer of the OSI Model. The transport layer functionality is the same between both models.
However, the network access layer and the application layer of the TCP/IP model are further divided in the
OSI model to describe discrete functions that must occur at these layers.
Ethernet
There is no official LAN standard protocol, but over time, Ethernet, has become more common than
the others. Ethernet protocols define how data is formatted and how it is transmitted over the wired network.
The Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model. Ethernet
standards have evolved for specifying faster and more flexible versions of the technology. Each version of
Ethernet has an associated standard. Each host connected to an Ethernet network is assigned a physical
address which serves to identify the host on the network. Every Ethernet network interface has a physical
address assigned to it when it is manufactured. This address is known as the Media Access Control (MAC)
address. The MAC address identifies each source and destination host on the network.