Uganda Martyrs University: Making A Difference
Uganda Martyrs University: Making A Difference
Making a difference
NAME : MUTUNGI FELIX
COURSE : DCS&IT
COURSE UNIT : NETWORKING
YEAR : ONE
ACADEMIC YEAR: 2018-2019
RESEARCH ABOUT;
1. COMMUNICATION MODEL
2. DIFFERENCE BETWEEN IPv4 & IPv6
1
COMMUNICATION MODELS
Communication is a complex process, and it is difficult to determine where or
with whom a communication encounter starts and ends. Models of
communication simplify the process by providing a visual representation of the
various aspects of a communication encounter. Some models explain
communication in more detail than others, but even the most complex model
still doesn’t recreate what we experience in even a moment of a
communication encounter. Models still serve a valuable purpose for students
of communication because they allow us to see specific concepts and steps
within the process of communication, define communication, and apply
communication concepts. When you become aware of how communication
functions, you can think more deliberately through your communication
encounters, which can help you better prepare for future communication and
learn from your previous communication. The three models of communication
we will discuss are the transmission, interaction, and transaction models.
The internal cognitive process that allows participants to send, receive, and
understand messages is the encoding and decoding process. Encoding is the
process of turning thoughts into communication. As we will learn later, the
level of conscious thought that goes into encoding messages varies. Decoding
is the process of turning communication into thoughts. For example, you may
realize you’re hungry and encode the following message to send to your
roommate: “I’m hungry. Do you want to get pizza tonight?” As your roommate
receives the message, they decode your communication and turn it back into
thoughts in order to make meaning out of it. Of course, we don’t just
communicate verbally—we have various options, or channels for
communication. Encoded messages are sent through a channel, or a sensory
route on which a message travels, to the receiver for decoding. While
communication can be sent and received using any sensory route (sight, smell,
touch, taste, or sound), most communication occurs through visual (sight)
2
and/or auditory (sound) channels. If your roommate has headphones on and is
engrossed in a video game, you may need to get their attention by waving your
hands before you can ask them about dinner.
The interactive model is also less message focused and more interaction
focused. While the linear model focused on how a message was transmitted
and whether or not it was received, the interactive model is more concerned
with the communication process itself. In fact, this model acknowledges that
there are so many messages being sent at one time that many of them may
not even be received. Some messages are also unintentionally sent. Therefore,
communication isn’t judged effective or ineffective in this model based on
whether or not a single message was successfully transmitted and received.
The interactive model takes physical and psychological context into account.
Physical context includes the environmental factors in a communication
encounter. The size, layout, temperature, and lighting of a space influence our
communication. Imagine the different physical contexts in which job interviews
take place and how that may affect your communication. I have had job
interviews over the phone, crowded around a table with eight interviewers,
and sitting with few people around an extra large conference table. I’ve also
been walked around an office to unexpectedly interview one-on-one, in
succession, with multiple members of a search committee over a period of
three hours. Whether it’s the size of the room or other environmental factors,
it’s important to consider the role that physical context plays in our
communication. Psychological context includes the mental and emotional
factors in a communication encounter. Stress, anxiety, and emotions are just
some examples of psychological influences that can affect our communication.
Seemingly positive psychological states, like experiencing the emotion of love,
can also affect communication. Feedback and context help make the
interaction model a more useful illustration of the communication process, but
the transaction model views communication as a powerful tool that shapes our
realities beyond individual communication encounters.
4
Transaction model of communication
As the study of communication progressed, models expanded to account for
more of the communication process. Many scholars view communication as
more than a process that is used to carry on conversations and convey
meaning. We don’t send messages like computers, and we don’t neatly
alternate between the roles of sender and receiver as an interaction unfolds.
We also can’t consciously decide to stop communicating because
communication is more than sending and receiving messages. The transaction
model differs from the transmission and interaction models in significant ways,
including the conceptualization of communication, the role of sender and
receiver, and the role of context (Barnlund, 1970).
5
Social context refers to the stated rules or unstated norms that guide
communication. Norms are social conventions that we pick up on through
observation, practice, and trial and error. We may not even know we are
breaking a social norm until we notice people looking at us strangely or
someone corrects or teases us. Relational context includes the previous
interpersonal history and type of relationship we have with a person. We
communicate differently with someone we just met versus someone we’ve
known for a long time. Initial interactions with people tend to be more highly
scripted and governed by established norms and rules, but when we have an
established relational context, we may be able to bend or break social norms
and rules more easily. Cultural context includes various aspects of identities
such as race, gender, nationality, ethnicity, sexual orientation, class, and
ability. We all have multiple cultural identities that influence our
communication. Some people, especially those with identities that have been
historically marginalized, are regularly aware of how their cultural identities
influence their communication and influence how others communicate with
them. Conversely, people with identities that are dominant or in the majority
may rarely, if ever, think about the role their cultural identities play in their
communication. Cultural context is influenced by numerous aspects of our
identities and is not limited to race or ethnicity.
The open system interconnection model (OSI) is the reference tool for
understanding data communications between any two networked systems.it
divides the communication process in to seven layers. Each layer both
performs specific functions to support the layers above it and offers services to
the layers below it. the three lowest layers focus on passing the traffic through
the network to an end system. The top four layers come in to play in the end
system to complete the process.
6
The physical layer of the OSI model defines connector and interface
specifications, as well as medium (cable) requirements. Electrical,
mechanical, functional, and procedural specifications are provided for
sending a bit stream on a computer network.
7
either offers reliable, connection oriented or connectionless, best-effort
communications.
Some of the functions offered by the transport layer include:
Application identification.
Client side entity identification
Confirmation that the entire message arrived intact.
Segmentation of data for network transport
Control of data flow to prevent memory overruns
Establishment and maintenance of both ends of virtual circuits
Transmission-error detection
Realignment of segmented data in the correct order on the
receiving side
Multiplexing or sharing of multiple sessions over a single physical
link.
The most common transport layer protocols are the connection-
oriented transmission control protocol (TCP) and the
connectionless user datagram protocol (UDP).
5. Layer 5- the session layer.
This provides various services including tracking the number of
bytes that each end of the session has acknowledged receiving from the
other end of the session. This session layer allows applications
functioning on devices to establish, manage and terminate a dialog
through a network.
Functionality includes:
Virtual connection between application entities
Synchronisation of data flow
Creation of dialog units.
Connection parameter negotiations
Partitioning of services in to functional groups
Acknowledgements of data received during a session
Retransmission of data if it is not received by a device.
6. Layer 6- the presentation layer.
8
Compression and expansion of a message so that it travels efficiently
Graphics formatting
Content translation
System-specific translation
7. Layer 7- the application.
This provides an interface for the end user operating a device
connected to a network. This layer is what the user sees in terms of
loading an application (such as web browser or e-mail). This application
layer is the data the user views while using these applications.
IPV4 is based on the best-effort model. This model guarantee’s neither delivery
nor avoidance of duplicate delivery, these aspects are handled by the upper
layer transport.
IPv4 uses 32-bit addresses which limits the address space to 4 294 967 296
(232) addresses.
IPv4 reserves special address blocks for private networks and multicast
addresses.
This is the most recent version of the internet protocol (IP), the
communications protocol that provides an identification and location system
for computers on networks and routes traffic across the internet.
9
IPV6 was developed by the internet engineering task force (IETF) to deal with
the long-anticipated problem of IPV4 address exhaustion. IPV6 is intended to
replace IPV4.
In December 1998, IPV6 became a draft standard for the IETF, who
subsequently ratified it as internet standard on 14 July 2017.
By 1998, the internet engineering task force (IETF) had formalised the
successor protocol. IPV6 uses a 128-bit address, theoretically allowing 2 128, or
approximately 3.4*1038 addresses.
The actual number is slightly smaller, as multiple ranges are reserved for
special use or completely excluded from use.
The total number of possible IPV6 addresses is more than 7.9*10 28 times as
many as IPV4, which uses 32-bit addresses and provides approximately 4.3
billion addresses. The two protocols are not designed to be interoperable,
complicating the transition to IPV6.
IPV6 addresses are represented as eight groups of four hexadecimal digits with
the groups being separated by colons, for example;
10
2001:0db8:0042:0000:8a2e:0370:7334, but methods to abbreviate this full
notation exist.
The addressing architecture of IPV6 is defined in RFC 4291 and allows three
different types of transmission; unicast, any cast and multicast.
IPv4 IPv6
IPv4 addresses are 32 bit length. IPv6 addresses are 128 bit length.
IPv4 addresses are binary numbers IPv6 addresses are binary numbers
represented in decimals. represented in hexadecimals.
IPSec support is only optional. Inbuilt IPSec support.
Fragmentation is done by sender
Fragmentation is done only by sender.
and forwarding routers.
Packet flow identification is available
No packet flow identification. within the IPv6 header using the Flow
Label field.
Checksum field is available in
No checksum field in IPv6 header.
IPv4 header
Options fields are available in IPv4 No option fields, but IPv6 Extension
header. headers are available.
Address Resolution Protocol
Address Resolution Protocol (ARP) is
(ARP) is available to map IPv4
replaced with a function of Neighbor
addresses to MAC addresses.
Discovery Protocol (NDP).
Internet Group Management IGMP is replaced with Multicast
11
Protocol (IGMP) is used to manage
Listener Discovery (MLD) messages.
multicast group membership.
Broadcast messages are not available.
Instead a link-local scope "All nodes"
Broadcast messages are available.
multicast IPv6 address (FF02::1) is used
for broadcast similar functionality.
Manual configuration (Static) of
IPv4 addresses or DHCP
Auto-configuration of addresses is
(Dynamic configuration) is
available.
required to configure IPv4
addresses.
12
References
1. Barnlund, D. C. (1970). A transactional model of communication in K.K.
Sereno and C.D. Mortenson (Eds.), Foundations of communication
theory (pp. 83-92). New York, NY: Harper and Row.
2. Ellis, R. and McClintock, A. (1990). You take my meaning: Theory into
practice in human communication. London: Edward Arnold.
3. Schramm, W. (1997). The beginnings of communication study in
America. Thousand Oaks, CA: Sage.
4. Shannon, C. and Weaver, W. (1949). The mathematical theory of
communication. Urbana, IL: University of Illinois Press.
5. ^Silvia Hagen (2014). IPv6 essentials: integrating IPv6 in to your IPv4
network. O’ Reilly media, inc.p.33. ISBN 9781449335267.
6. ^New Zealand IPv6 Task Force. “FAQS” Retrieved 26 October, 2015.
13