02 Network Reference Model_1609743455887
02 Network Reference Model_1609743455887
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
1.1 Foreword
In the digital era, various information is presented as data in our life. What is data? How is
data transmitted?
In this course, we will use the network reference model to understand the "life" of data.
1.2 Objectives
On completion of this course, you will be able to:
● Understand the data definition and transmission process.
● Understand the concepts and advantages of the network reference model.
● Understand common standard protocols.
● Understand the data encapsulation and decapsulation processes.
File Transfer Protocol (FTP): provides a method for transferring files. It allows data to be
transferred from one host to another.
Domain name service (DNS): translates from host domain names to IP addresses.
● Transport layer
Transmission Control Protocol (TCP): provides reliable connection-oriented communication
services for applications. Currently, TCP is used by many popular applications.
User Datagram Protocol (UDP): provides connectionless communication and does not
guarantee the reliability of packet transmission. The reliability can be ensured by the
application layer.
● Network layer
Internet Protocol (IP): encapsulates transport-layer data into data packets and forwards
packets from source sites to destination sites. IP provides a connectionless and unreliable
service.
Internet Group Management Protocol (IGMP): manages multicast group memberships.
Specifically, IGMP sets up and maintains memberships between IP hosts and their directly
connected multicast routers.
Internet Control Message Protocol (ICMP): sends control messages based on the IP
protocol and provides information about various problems that may exist in the
communication environment. Such information helps administrators diagnose problems and
take proper measures to resolve the problems.
● Data link layer
Point-to-Point Protocol (PPP): is a data link layer protocol that works in point-to-point mode.
PPP is mainly used on wide area networks (WANs).
Ethernet: is a multi-access and broadcast protocol at the data link layer, which is the most
widely used local area network (LAN) technology.
Point-to-Point Protocol over Ethernet (PPPoE): connects multiple hosts on a network to a
remote access concentrator through a simple bridge device (access device). Common
applications include home broadband dialup access.
● Header Length: indicates the length of the TCP header. The unit is 32 bits (4 bytes). If
there is no option content, the value of this field is 5, indicating that the header contains
20 bytes.
● Reserved: This field is reserved and must be set to 0. This field is 6 bits long.
● Control Bits: control bits, includes FIN, ACK, and SYN flags, indicating TCP data
segments in different states.
● Window: used for TCP flow control. The value is the maximum number of bytes that are
allowed by the receiver. The maximum window size is 65535 bytes. This field is 16 bits
long.
● Checksum: a mandatory field. It is calculated and stored by the sender and verified by
the receiver. During checksum computation, the TCP header and TCP data are
included, and a 12-byte pseudo header is added before the TCP segment. This field is
16 bits long.
● Urgent: indicates the urgent pointer. The urgent pointer is valid only when the URG flag
is set. The Urgent field indicates that the sender transmits data in emergency mode.
The urgent pointer indicates the number of urgent data bytes in a segment (urgent data
is placed at the beginning of the segment). This field is 16 bits long.
● Options: This field is optional. This field is 0 to 40 bytes long.
UDP header:
● Source Port: identifies the application that sends the segment. This field is 16 bits long.
● Destination Port: identifies the application that receives the segment. This field is 16 bits
long.
● Length: specifies the total length of the UDP header and data. The possible minimum
length is 8 bytes because the UDP header already occupies 8 bytes. Due to the
existence of this field, the total length of a UDP segment does not exceed 65535 bytes
(including an 8-byte header and 65527-byte data).
● Checksum: checksum of the UDP header and UDP data. This field is 16 bits long.
2. Port Numbers
Network Reference Model Page 10
Each intermediate network device (such as a router) maintains a routing table that guides IP
packet forwarding like a map. After receiving a packet, the intermediate network device
reads the destination address of the packet, searches the local routing table for a matching
entry, and forwards the IP packet according to the instruction of the matching entry.
When the IP packet reaches the destination host, the destination host determines whether to
accept the packet based on the destination IP address and then processes the packet
accordingly.
● When the IP protocol is running, routing protocols such as OSPF, IS-IS, and BGP are
required to help routers build routing tables, and ICMP is required to help control
networks and diagnose network status.
1.4.16 ARP
ARP: Address Resolution Protocol
Discovers the MAC address associated with a given IP address.
carried in the ARP request message to the ARP table, and then replies with an ARP reply
message.
ARP Implementation Principles (4)
8. After the Ethernet module completes encapsulation, it sends the data to the physical
layer.
9. Based on the physical media, the physical layer converts digital signals into electrical
signals, optical signals, or electromagnetic (wireless) signals.
10. The converted signals start to be transmitted on the network.
1.6 Quiz
1. (Single) Which of the following organizations is not a common protocol standardization
organization? ( )
A. IETF(Internet Engineering Task Force)
B. IEEE(Institute of Electrical and Electronics Engineers)
C. ISO(International Organization for Standardization)
D. IEC(International Electrotechnical Commission)
2. (Single) Which of the following transport-layer protocols is HTTP based on? ( )
A. TCP 80
B. TCP 23
C. TCP 25
D. UDP 69
3. (Multiple) Which of the following protocols are transport-layer protocols? ( )
A. TCP
B. FTP
C. UDP
D. HTTP
4. (True or false) IP and MAC addresses must be encapsulated for communication on a
network. ( )
Network Reference Model Page 25
A. True
B. False
5. (True or false) ARP Reply packets are broadcast. ( )
A. True
B. False
6. What are the benefits of the layered model?
7. What are the common protocols at the application layer, transport layer, network layer,
and data link layer?
1.7 Summary
Both the OSI reference model and the TCP/IP reference model adopt the layered design
concept.
● Clear division of functions and boundaries between layers facilitates the development,
design, and troubleshooting of each component.
● The functions of each layer can be defined to impel industry standardization.
● Interfaces can be provided to enable communication between hardware and software
on various networks, improving compatibility.
Data generation and transmission require collaboration between modules. Meanwhile, each
module must fulfill its own responsibilities.