Network Protocols and Services
Network Protocols and Services
Network Protocols and Services
Communications Protocols
Simply having a wired or wireless physical connection between end devices
is not enough to enable communication. For communication to occur,
devices must know “how” to communicate. Communication, whether by
face-to-face or over a network, is governed by rules called protocols. These
protocols are specific to the type of communication method occurring.
1 | Page
A protocol suite is a set of protocols that work together to provide
comprehensive network communication services. A protocol suite may be
specified by a standards organization or developed by a vendor.
For devices to successfully communicate, a network protocol suite must
describe precise requirements and interactions. Networking protocols define
a common format and set of rules for exchanging messages between
devices. Some common networking protocols are Hypertext Transfer
Protocol (HTTP), Transmission Control Protocol (TCP), and Internet Protocol
(IP).
NB
IP in this course refers to both the IPv4 and IPv6 protocols. IPv6 is the most
recent version of IP and will eventually replace the more common IPv4.
2 | Page
Table 1 TCP/IP Protocols and Standards Descriptions
3 | Page
4 | Page
Format, Size, and Timing
Protocols define the format, size, and timing of different forms of messages.
Format
When you send an email, protocols of the TCP/IP protocol suite are used by
your device to format your message for sending on the network. This is
similar to you sending a letter in the mail. You place your letter in an
envelope. The envelope has the address of the sender and receiver, each
located at the proper place on the envelope. If the destination address and
5 | Page
formatting are not correct, the letter is not delivered. The process of placing
one message format (the letter) inside another message format (the
envelope) is called encapsulation. De-encapsulation occurs when the
process is reversed by the recipient and the letter is removed from the
envelope.
Size
Another rule of communication is size. When people communicate in person
or over the phone, a conversation is usually made up of many smaller
sentences to ensure that each part of the message is received and
understood. Likewise, when a long message is sent from one host to another
over a network, it is necessary to break the message into many frames.
Timing
Timing includes the access method (when can a host send), flow control
(how much information can a host send at one time), and response timeout
(how long to wait for a response).
6 | Page
Figure 3 Unicast Message
If all hosts on the network need to receive the message at the same time, a
broadcast may be used. Broadcasting represents a one-to-all message
delivery option, as shown in Figure 5.
7 | Page
Figure 5 Broadcast Message
Reference Models
As you learned earlier, the TCP/IP protocol suite is represented by a four-
layer model: Application, Transport, Internet, and Network Access. Another
popular reference model is the Open Systems Interconnection (OSI) model,
which uses a seven-layer model, as shown Figure 6. In networking
literature, when a layer is referred to by a number, such as Layer 4, then
the reference is using the Open Systems Interconnection (OSI) model.
Reference to layers in the TCP/IP model use the name of the layer, such as
the transport layer.
8 | Page
Three Addresses
Network protocols require that addresses be used for network
communication. Addressing is used by the client to send requests and other
data to a server. The server uses the client’s address to return the requested
data to the client that requested it.
Protocols operate at layers. The OSI transport, network, and data link layers
all use addressing in some form. The transport layer uses protocol addresses
in the form of port numbers to identify network applications that should
handle client and server data.
The network layer specifies addresses that identify the networks that clients
and servers are attached to and the clients and servers themselves – IP or
logical address.
Finally, the data link layer specifies the devices on the local LAN that should
handle data frames – MAC or physical address. All three addresses are
required for client-server communication.
Encapsulation
Data is divided into smaller, more manageable pieces to send over the
network. This division of data into smaller pieces is called segmentation.
The form that an encapsulated piece of data takes at any layer is called a
protocol data unit (PDU). Each succeeding layer encapsulates the PDU that it
receives from the layer above in accordance with the protocol being used. At
each stage of the process, a PDU has a different name to reflect its new
functions.
Exercise: Give PDU names for each layer.
10 | P a g e
Ethernet
The Ethernet Protocol
Ethernet operates in the data link layer and the physical layer. It is a family
of networking technologies that are defined in the IEEE 802.2 and 802.3
standards. Ethernet relies on the two separate sub layers of the data link
layer to operate, the Logical Link Control (LLC) and the Media Access Control
(MAC) sub layers
If the size of a transmitted frame is less than the minimum or greater than
the maximum, the receiving device drops the frame. Dropped frames are
likely to be the result of collisions or other unwanted signals and are
therefore considered invalid.
Figure 7 shows the structure of the Ethernet II frame.
EtherType field
This 2-byte field identifies the upper layer protocol encapsulated in the
Ethernet frame. Common values are, in hexadecimal, 0x800 for IPv4,
0x86DD for IPv6, and 0x806 for ARP.
Data field
This field (46–1500 bytes) contains the encapsulated data from a higher
layer, which is a generic Layer 3 PDU, or more commonly, an IPv4 packet.
All frames must be at least 64 bytes long. If a small packet is encapsulated,
additional bits called a pad are used to increase the size of the frame to this
minimum size.
12 | P a g e
MAC Address Format
An Ethernet MAC address is a 48-bit binary value expressed as 12
hexadecimal digits (4 bits per hexadecimal digit). Hexadecimal digits use the
numbers 0 to 9 and the letters A to F. Figure 8 shows the equivalent decimal
and hexadecimal values for binary 0000 to 1111. Hexadecimal is commonly
used to represent binary data. IPv6 addresses are another example of
hexadecimal addressing.