Benutzer-Werkzeuge

Webseiten-Werkzeuge


playground:indisoft:notizen

Dies ist eine alte Version des Dokuments!


Directly connecting like-devices, such as two computers, requires what type of UTP Ethernet cable? crossover und straight-through cable geht auch bei modernen Geräten


spiral@intrepid:~$ traceroute wiki.itbs.selfhost.co
traceroute to wiki.itbs.selfhost.co (80.147.0.159), 30 hops max, 60 byte packets

  • 1 console.gl-inet.com (192.168.142.1) 2.059 ms 2.187 ms 2.338 ms
  • 2 10.111.0.1 (10.111.0.1) 16.284 ms 16.464 ms 16.544 ms
  • 3 62.156.244.48 (62.156.244.48) 34.491 ms 34.454 ms 34.605 ms
  • 4 62.156.247.170 (62.156.247.170) 38.902 ms 39.291 ms 43.858 ms
  • 5 m-ea12-i.M.DE.NET.DTAG.DE (62.153.180.62) 60.923 ms 61.600 ms 61.560 ms
  • 6 62.156.247.1 (62.156.247.1) 60.750 ms 154.790 ms 154.639 ms
  • 7 80.147.0.159 (80.147.0.159) 154.590 ms !X * *

Kommunikation

Alle Kommunikationsmethoden haben drei Elemente gemeinsam. Das erste dieser Elemente ist die Nachrichtenquelle oder der Absender. Nachrichtenquellen sind Personen oder elektronische Geräte, die eine Nachricht an andere Personen oder Geräte übermitteln müssen. Das zweite Element der Kommunikation ist das Ziel oder der Empfänger der Nachricht. Das Ziel empfängt die Nachricht und interpretiert sie. Das dritte Element wird als Übertragungsmedium oder Kanal bezeichnet. Es stellt den Pfad bereit, über den die Nachricht von der Quelle zum Ziel gelangen kann.

Bevor wir anfangen, miteinander zu kommunizieren, legen wir Regeln oder Vereinbarungen fest, die das Gespräch regeln. Diese Vereinbarungen umfassen Folgendes:

  1. ? jeweils ein identifizierter Absender und Empfänger
  2. ? Kommunikationsmethode (persönlich, Telefon, Brief, Foto)
  3. ? Gemeinsame Sprache und Grammatik Geschwindigkeit und Zeitpunkt der Zustellung
  4. ? Bestätigungsstrategie Bestätigungs- oder Empfangsanforderungen Müssen wir bestätigen, dass unsere Nachrichten empfangen wurden?

Warum Protokolle wichtig sind?

Sowohl in einer kabelgebundenen als auch einer kabellosen Umgebung wird ein lokales Netzwerk als ein Bereich definiert, in dem alle Hosts „dieselbe Sprache sprechen“ müssen, was in der Computersprache bedeutet, dass sie „ein gemeinsames Protokoll verwenden“ müssen.

Protokollmerkmale

  • Nachrichtenformat
  • Nachrichtengröße
  • Timing
  • Kodierung
  • Kapselung
  • Nachrichtenmuster

Skip to content Communication Principles … Communication Principles Summary

5.5.1 What Did I Learn in this Module? The Rules

All communication methods have three elements in common. The first is the message source, or sender. Message sources are people, or electronic devices, which need to communicate a message to other individuals or devices. The second is the destination, or receiver, of the message. The destination receives the message and interprets it. The third is the transmission medium, or channel. It provides the pathway over which the message can travel from source to destination.

Among the protocols that govern successful human communication are an identified sender and receiver, an agreed upon method of communicating, common language and grammar, speed and timing of delivery, and confirmation or acknowledgment requirements. Networking protocols define the message format, message size, timing, encoding, and message patterns over the local network.

Communication Standards

Networking and internet standards ensure that all devices connecting to the network implement the same set of rules or protocols in the same manner. Using standards, it is possible for different types of devices to send information to each other over the internet. These standards are developed, published, and maintained by a variety of organizations. When a new standard is proposed, each stage of the development and approval process is recorded in a numbered RFC document so that the evolution of the standard is tracked. RFCs for internet standards are published and managed by the IETF.

Network Communication Models

A stack illustrates the protocols as a layered hierarchy, with each higher-level protocol depending on the services of the protocols shown in the lower levels. The separation of functions enables each layer in the stack to operate independently of others.

The layered model has many benefits:

Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below Fosters competition because products from different vendors can work together Enables technology changes to occur at one level without affecting the other levels Provides a common language to describe networking functions and capabilities The suite of TCP/IP protocols that is used for internet communications follows the structure of the stack model. There are two basic types of models to describe the functions that must occur for network communications to be successful: protocol models and reference models. The most widely known internetwork reference model is the OSI model. The OSI model breaks network communications down into multiple processes. Each process is a small part of the larger task.

The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI reference model. The functions that occur at the internet layer in the TCP/IP model are contained in the network layer of the OSI Model. The transport layer functionality is the same between both models. However, the network access layer and the application layer of the TCP/IP model are further divided in the OSI model to describe discrete functions that must occur at these layers.

Ethernet

There is no official LAN standard protocol, but over time, Ethernet, has become more common than the others. Ethernet protocols define how data is formatted and how it is transmitted over the wired network. The Ethernet standards specify protocols that operate at Layer 1 and Layer 2 of the OSI model. Ethernet standards have evolved for specifying faster and more flexible versions of the technology. Each version of Ethernet has an associated standard. Each host connected to an Ethernet network is assigned a physical address which serves to identify the host on the network. Every Ethernet network interface has a physical address assigned to it when it is manufactured. This address is known as the Media Access Control (MAC) address. The MAC address identifies each source and destination host on the network.

5.5.2 Module 5 - Communication Principles Quiz Which organization publishes and manages the Request for Comments (RFC) documents?

Topic 5.2.0 - The Internet Engineering Task Force (IETF) organization publishes and manages the Request for Comments (RFC).

What identifier is used at the data link layer to uniquely identify an Ethernet device?

Topic 5.3.0 - Ethernet frames are identified at the data link layer by their MAC addresses, which are unique to each NIC. IP addresses are used at the network layer, and TCP and UDP port numbers are used at the transport layer. Sequence numbers are fields in TCP headers.

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

Topic 5.3.0 - The TCP/IP model consists of four layers: application, transport, internet, and network access. The OSI model consists of seven layers: application, presentation, session, transport, network, data link, and physical. The top three layers of the OSI model: application, presentation, and session map to the application layer of the TCP/IP model.

Which term refers to the set of rules that define how a network operates?

Topic 5.2.0 - Standards ensure that different devices connecting to the network are able to communicate with each other. In networking there are many standards that define how the network should operate and that all components implement the same protocols.

Which standards organization publishes current Ethernet standards?

Topic 5.4.0 - The IEEE standards describe current Ethernet features. The IEEE standard for Ethernet is 802.3.

Which statement describes a MAC address?

Topic 5.4.0 - The Media Access Control (MAC) address is a physical address assigned to each Ethernet NIC by manufacturers. It is 48-bits in length. The MAC address is used to identify the source and destination on a local Ethernet network. It cannot be routed to remote networks.

Which three elements do all communication methods have in common? (Choose three.)

Topic 5.1.0 - All communication methods include a message source, destination, and a transmission medium.

Which two layers of the OSI model specify protocols that are associated with Ethernet standards? (Choose two.)

Topic 5.4.0 - Ethernet standards specify protocols that operate at Layer 1 (physical layer) and Layer 2 (data link layer) of the OSI model and it is the technology used by almost all wired local-area networks.

The OSI model

~ consists of seven layers:

  • 7 application
  • 6 presentation
  • 5 session
  • 4 transport 1)
  • 3 network
  • 2 data link
  • 1 physical
1)
Die Transportschicht definiert Dienste zum Segmentieren, Übertragen und Zusammensetzen der Daten für die individuelle Kommunikation zwischen den Endgeräten.
/volume1/web/dokuwiki/data/attic/playground/indisoft/notizen.1725995465.txt.gz · Zuletzt geändert: 2024/09/10 21:11 von 47.128.123.10