SlideShare a Scribd company logo
1 of 25
Chapter four
Protocols
Network Protocols
 A protocol is a set of rules that governs data communications
 Is a language spoken between computers to exchange information
 Is a formal description of message formats and the rules that two computers
must follow in order to exchange those messages.
 A protocol defines what is communicated, how it is communicated, and
when it is communicated
 To request any service or exchange any information between 2 devices there
must be an agreed set of commands and data formats
 Example: The HTTP protocol defines the format for communication between
web browsers and web servers
Cont...
• For instance, for one computer to send a message to another computer, the first computer
must perform the following general steps
 break the data into small sections called packets
 add addressing information to the packets identifying the source and destination
computers
 deliver the data to the network interface card for transmission over the network
• The receiving computer must perform the same steps, but in reverse order
 accept the data from the NIC
 remove transmitting information that was added by the transmitting computer
 reassemble the packets of data into the original message
• The key elements of a protocol are syntax, semantics, and timing
 syntax: refers to the structure or format of the data
 Semantics: refers to the meaning of each section of bits
 Timing: refers to when data should be sent and how fast they can be sent
Protocol layering
• Protocol layering is a common technique to simplify networking designs by
dividing them into functional layers, and assigning protocols to perform each
layer's task
• Specify how networks are implemented
• For example, it is common to separate the functions of data delivery and
connection management into separate layers
• Thus, one protocol is designed to perform data delivery, and another protocol,
layered above the first, performs connection management
• The data delivery protocol is fairly simple and knows nothing of connection
management
• The connection management protocol is also fairly simple, since it doesn't need
to concern itself with data delivery
Cont...
• The most important layered protocol designs are:
• One famous model is the Open Systems Interconnection (OSI) reference
model
• Another famous model is TCP/IP model
OSI and TCP/IP Layers Correspondence
Cont.…
Sending system Receiving system
6
5
4
3
2
1
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
6
5
4
3
2
1
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
Layer 7: The Application Layer
• The application layer running on the sending system (COMPUTER) is
responsible for the actual request to be made
• This could be any type of networking request—a web request using a web
browser (HTTP), an e-mail delivery request using SMTP, or a file system request
using FTP protocols
• It represents the interface between the end-user and the network.
• Concerned with providing network service to applications like
• Email
• File transfer
• Web services
• Application layer protocols are:- HTTP, FTP, SMTP, SNMP, NFS
Layer 6: The Presentation Layer
• After the request is made, the application layer passes the data down to the
presentation layer
• The Presentation Layer handles data format for networked communications.
• This is done by converting data into a generic format that could be understood
by both sides.
• Performs three major functionalities:-
• Translation
• Data compression
• Encryption
Layer 5: The Session Layer
• Controls the connections between multiple computers
• The session layer manages the dialog between computers
• It does this by establishing, managing, and terminating
communications between two computers
• So it performs:
• Session management
• Authentication and
• Authorization
• On layers 5-7 the data package is in the form of data stream
Layer 4: The Transport Layer
• The transport layer handles transport functions such as reliable and unreliable
delivery of the data. For reliable transport protocols, the transport layer works
hard to ensure reliable delivery of data to its destinations.
• On the sending system, the transport layer is responsible for breaking the data
into smaller packets, so that if retransmission is required, only the packets
missing will be sent. Missing packets are determined by the fact that the
transport layer receives acknowledgments (ACKs) from the remote system, when
the remote system receives the packets.
• The transport layer is responsible for
• Segmentation
• Flow control
• Error correction
• Protocols:
• Transmission Control Protocol (TCP) – Connection Oriented
• User Datagram Protocol (UDP) – Connectionless.
TCP and UDP
• TCP is a connection-oriented protocol
• TCP provides the functions:
• Dividing a chunk of data into segments
• Reassembly segments into the original chunk
• Error checking and flow control through a virtual link that it
establishes and finally terminates.
• Offering a reliable data delivery service
• Examples include FTP and Email
UDP (User Datagram Protocol)
UDP (User Datagram Protocol): unreliable, connectionless protocol that not error
checks or offers any flow control.
Is faster than TCP because no feedback in UDP
Examples: online streaming movies , Voice over IP, game
Layer 3: The Network Layer
• The network layer is responsible for managing and routing of packets by using
information stored in a routing table
• The routing table is a list of available paths that are stored in memory on the
routers
• In front of the segments a network header is places, telling the sender's IP
address and the destination IP address.
• This header remains constant and will be just read and not changed by the
equipment's during the communication.
• The network layer is responsible for working with
• Logical addressing
• Routing
• Path determination
Cont.….
Which path should traffic take through networks is decided at this layer
Address - where something is
Route - how to get there
Only two devices which are directly connected by the same “wire” can
exchange data directly
Devices not on the same network must communicate via intermediate system
Router is an intermediate system
The network layer determines the best way to transfer data. It manages
device addressing and tracks the location of devices.
Hardware:
• The router operates at this layer.
Layer 2: The Data Link Layer
• The data link layer is responsible for physical addressing
• MAC addressing of the sender and receiver for each packet to form a frame
• Data unit used at data link layer is called a frame
• Is responsible for error correction functions
Layer 1: The Physical Layer
• The bottom layer of the OSI hierarchy is concerned only with moving bits of data
onto and off the network medium
• Responsible for converting the data frame to a pattern of signals that will be
used to send the data across the communication medium.
• On the receiving system, the signals will be converted to frame by the data link
layer and then passed up to the network layer for further processing
• Cable, connectors, repeaters, transmitters, receivers, are associated with physical
layer
TCP/IP Model
 Is a standard that defines how to establish and maintain a network
conversation via which application programs can exchange data
TCP/IP is a set of protocols developed to allow cooperating computers
to share resources across a network
TCP works with the Internet Protocol (IP), which defines how
computers send packets of data to each other.
Layer of Models
Cont.…
Application layer: concerned with
• Representation
• Encoding
• Dialogue control
• Transport layer: concerned with
• Reliabil and unreliable
• Flow control
• Error correction
• Internet layer: concerned with
• Logical addressing
• Best path determination
• Network access layer
• Concerned with physical addressing
• Transmission of data across media
OSI and TCP/IP
OSI and TCP/IP - similarities
• Both have layers
• Both assume packets are switched (called packet switched), i.e. that packets could
take different paths to reach to the same destination. Circuit switched is a case in
which all packets take the same path
• Both should be known by network professionals
OSI and TCP/IP - differences
• TCP/IP combines session, presentation and application layers into a single
layer
• TCP/IP combines physical and data link layer into a single layer
• TCP/IP is the standard in which the internet has grown
Categorizing protocols
• Application protocols work in
• Application layer
• Presentation layer
• Session layer
• Transport protocols work in
• Transport layer
• Network protocols work in
• Network layer
• Data link layer
• Physical layer
Application layer protocols
• Hypertext Transfer Protocol (HTTP)
• Used for exchanging files (text, graphic images, sound, video, and other
multimedia files) on the World Wide Web.
• File Transfer Protocol (FTP)
• Used for transferring files from one computer to another
• Simple Mail Transfer (SMTP)
• Used for transferring e-mail across the Internet.
• Network File System (NFS)
• Used to transfer files from one computer to another
• Simple Network Management Protocol (SNMP)
• Used to manage a network
Transport protocols
• Transmission Control Protocol (TCP)
• Enables two hosts to establish a connection and exchange streams of data. It
guarantees delivery of data and also guarantees that individual units of data
(called packets) will be delivered in the same order in which they were sent
• User datagram protocol (UDP)
• The other transport layer protocol, provides datagram delivery service. UDP
does not verify connections between receiving and sending hosts. Because
UDP eliminates the processes of establishing and verifying connections,
applications that send small amounts of data use UDP rather than TCP.
Network protocol
• Internet Protocol (IP)
• Specifies the format of packets and the addressing scheme.
• Most networks combine IP with a Transport Control Protocol (TCP), which
establishes a virtual connection between a destination and a source.
• IP by itself is something like the postal system.
• It allows you to address a package and drop it in the system, but there’s no direct
link between you and the recipient
• Address Resolution Protocol (ARP)
• The Address Resolution Protocol (ARP) conceptually exists between the data-link
and Internet layers. ARP assists IP in directing datagrams to the appropriate
receiving host by mapping Ethernet addresses (48 bits long) to known IP addresses
(32 bits long).
• Ethernet
• The most common local area network (LAN) protocol
• X.25
• Common wide area network (WAN) protocol

More Related Content

What's hot

ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentationGopi A
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020PriyankaBhattacharya28
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer NetworksMukesh Chinta
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overviewscooby_doo
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit vJAIGANESH SEKAR
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.Šhæÿæñ Æhmęd
 
Network protocol
Network protocolNetwork protocol
Network protocolSWAMY NAYAK
 

What's hot (20)

ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Chapter13
Chapter13Chapter13
Chapter13
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Unit 5 : Transport Layer
Unit 5 : Transport LayerUnit 5 : Transport Layer
Unit 5 : Transport Layer
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Iso osi
Iso osiIso osi
Iso osi
 
The OSI model
 The OSI model The OSI model
The OSI model
 
Network protocol
Network protocolNetwork protocol
Network protocol
 

Similar to lecture 4.pptx

Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnectionKingPinYT
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Zakirul Islam
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxRonoh Kennedy
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architectureOrbay Yeşil
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IPToufiqueAhmed13
 

Similar to lecture 4.pptx (20)

Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
TCP.pdf
TCP.pdfTCP.pdf
TCP.pdf
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

lecture 4.pptx

  • 2. Network Protocols  A protocol is a set of rules that governs data communications  Is a language spoken between computers to exchange information  Is a formal description of message formats and the rules that two computers must follow in order to exchange those messages.  A protocol defines what is communicated, how it is communicated, and when it is communicated  To request any service or exchange any information between 2 devices there must be an agreed set of commands and data formats  Example: The HTTP protocol defines the format for communication between web browsers and web servers
  • 3. Cont... • For instance, for one computer to send a message to another computer, the first computer must perform the following general steps  break the data into small sections called packets  add addressing information to the packets identifying the source and destination computers  deliver the data to the network interface card for transmission over the network • The receiving computer must perform the same steps, but in reverse order  accept the data from the NIC  remove transmitting information that was added by the transmitting computer  reassemble the packets of data into the original message • The key elements of a protocol are syntax, semantics, and timing  syntax: refers to the structure or format of the data  Semantics: refers to the meaning of each section of bits  Timing: refers to when data should be sent and how fast they can be sent
  • 4. Protocol layering • Protocol layering is a common technique to simplify networking designs by dividing them into functional layers, and assigning protocols to perform each layer's task • Specify how networks are implemented • For example, it is common to separate the functions of data delivery and connection management into separate layers • Thus, one protocol is designed to perform data delivery, and another protocol, layered above the first, performs connection management • The data delivery protocol is fairly simple and knows nothing of connection management • The connection management protocol is also fairly simple, since it doesn't need to concern itself with data delivery
  • 5. Cont... • The most important layered protocol designs are: • One famous model is the Open Systems Interconnection (OSI) reference model • Another famous model is TCP/IP model
  • 6. OSI and TCP/IP Layers Correspondence
  • 7. Cont.… Sending system Receiving system 6 5 4 3 2 1 7 Application Presentation Session Transport Network Data Link Physical 6 5 4 3 2 1 7 Application Presentation Session Transport Network Data Link Physical
  • 8. Layer 7: The Application Layer • The application layer running on the sending system (COMPUTER) is responsible for the actual request to be made • This could be any type of networking request—a web request using a web browser (HTTP), an e-mail delivery request using SMTP, or a file system request using FTP protocols • It represents the interface between the end-user and the network. • Concerned with providing network service to applications like • Email • File transfer • Web services • Application layer protocols are:- HTTP, FTP, SMTP, SNMP, NFS
  • 9. Layer 6: The Presentation Layer • After the request is made, the application layer passes the data down to the presentation layer • The Presentation Layer handles data format for networked communications. • This is done by converting data into a generic format that could be understood by both sides. • Performs three major functionalities:- • Translation • Data compression • Encryption
  • 10. Layer 5: The Session Layer • Controls the connections between multiple computers • The session layer manages the dialog between computers • It does this by establishing, managing, and terminating communications between two computers • So it performs: • Session management • Authentication and • Authorization • On layers 5-7 the data package is in the form of data stream
  • 11. Layer 4: The Transport Layer • The transport layer handles transport functions such as reliable and unreliable delivery of the data. For reliable transport protocols, the transport layer works hard to ensure reliable delivery of data to its destinations. • On the sending system, the transport layer is responsible for breaking the data into smaller packets, so that if retransmission is required, only the packets missing will be sent. Missing packets are determined by the fact that the transport layer receives acknowledgments (ACKs) from the remote system, when the remote system receives the packets. • The transport layer is responsible for • Segmentation • Flow control • Error correction • Protocols: • Transmission Control Protocol (TCP) – Connection Oriented • User Datagram Protocol (UDP) – Connectionless.
  • 12. TCP and UDP • TCP is a connection-oriented protocol • TCP provides the functions: • Dividing a chunk of data into segments • Reassembly segments into the original chunk • Error checking and flow control through a virtual link that it establishes and finally terminates. • Offering a reliable data delivery service • Examples include FTP and Email
  • 13. UDP (User Datagram Protocol) UDP (User Datagram Protocol): unreliable, connectionless protocol that not error checks or offers any flow control. Is faster than TCP because no feedback in UDP Examples: online streaming movies , Voice over IP, game
  • 14. Layer 3: The Network Layer • The network layer is responsible for managing and routing of packets by using information stored in a routing table • The routing table is a list of available paths that are stored in memory on the routers • In front of the segments a network header is places, telling the sender's IP address and the destination IP address. • This header remains constant and will be just read and not changed by the equipment's during the communication. • The network layer is responsible for working with • Logical addressing • Routing • Path determination
  • 15. Cont.…. Which path should traffic take through networks is decided at this layer Address - where something is Route - how to get there Only two devices which are directly connected by the same “wire” can exchange data directly Devices not on the same network must communicate via intermediate system Router is an intermediate system The network layer determines the best way to transfer data. It manages device addressing and tracks the location of devices. Hardware: • The router operates at this layer.
  • 16. Layer 2: The Data Link Layer • The data link layer is responsible for physical addressing • MAC addressing of the sender and receiver for each packet to form a frame • Data unit used at data link layer is called a frame • Is responsible for error correction functions
  • 17. Layer 1: The Physical Layer • The bottom layer of the OSI hierarchy is concerned only with moving bits of data onto and off the network medium • Responsible for converting the data frame to a pattern of signals that will be used to send the data across the communication medium. • On the receiving system, the signals will be converted to frame by the data link layer and then passed up to the network layer for further processing • Cable, connectors, repeaters, transmitters, receivers, are associated with physical layer
  • 18. TCP/IP Model  Is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data TCP/IP is a set of protocols developed to allow cooperating computers to share resources across a network TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.
  • 20. Cont.… Application layer: concerned with • Representation • Encoding • Dialogue control • Transport layer: concerned with • Reliabil and unreliable • Flow control • Error correction • Internet layer: concerned with • Logical addressing • Best path determination • Network access layer • Concerned with physical addressing • Transmission of data across media
  • 21. OSI and TCP/IP OSI and TCP/IP - similarities • Both have layers • Both assume packets are switched (called packet switched), i.e. that packets could take different paths to reach to the same destination. Circuit switched is a case in which all packets take the same path • Both should be known by network professionals OSI and TCP/IP - differences • TCP/IP combines session, presentation and application layers into a single layer • TCP/IP combines physical and data link layer into a single layer • TCP/IP is the standard in which the internet has grown
  • 22. Categorizing protocols • Application protocols work in • Application layer • Presentation layer • Session layer • Transport protocols work in • Transport layer • Network protocols work in • Network layer • Data link layer • Physical layer
  • 23. Application layer protocols • Hypertext Transfer Protocol (HTTP) • Used for exchanging files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. • File Transfer Protocol (FTP) • Used for transferring files from one computer to another • Simple Mail Transfer (SMTP) • Used for transferring e-mail across the Internet. • Network File System (NFS) • Used to transfer files from one computer to another • Simple Network Management Protocol (SNMP) • Used to manage a network
  • 24. Transport protocols • Transmission Control Protocol (TCP) • Enables two hosts to establish a connection and exchange streams of data. It guarantees delivery of data and also guarantees that individual units of data (called packets) will be delivered in the same order in which they were sent • User datagram protocol (UDP) • The other transport layer protocol, provides datagram delivery service. UDP does not verify connections between receiving and sending hosts. Because UDP eliminates the processes of establishing and verifying connections, applications that send small amounts of data use UDP rather than TCP.
  • 25. Network protocol • Internet Protocol (IP) • Specifies the format of packets and the addressing scheme. • Most networks combine IP with a Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. • IP by itself is something like the postal system. • It allows you to address a package and drop it in the system, but there’s no direct link between you and the recipient • Address Resolution Protocol (ARP) • The Address Resolution Protocol (ARP) conceptually exists between the data-link and Internet layers. ARP assists IP in directing datagrams to the appropriate receiving host by mapping Ethernet addresses (48 bits long) to known IP addresses (32 bits long). • Ethernet • The most common local area network (LAN) protocol • X.25 • Common wide area network (WAN) protocol

Editor's Notes

  1. Syntax: It indicates how to read the data in the form of bits or fields. Example: A protocol might expect that the size of a data packet will be 16 bits. In which, the first 8 bits are address, the next 4 bits are the check-sum bits, and the last 4 bits will contain the message. So, every communication that is following that protocol should send 16-bit data. Semantics: It specifies which field defines what action. It defines how a particular section of bits or pattern can be interpreted, and what action needs to be taken. Example: It interprets whether the bits of address identify the route to be taken or the final destination of the message or something else. Timing: Example: A sender can send the data at a speed of 100 Mbps, but the receiver can consume it only at a speed of 20 Mbps, then there may be data losses or the packets might get dropped. So, proper synchronization must be there between a sender and a receiver.
  2. Encryption using secure socket layer
  3. Segmentation: each segement contain port number seq number
  4. The routing table is a list of available destinations that are stored in memory on the routers. OSPF, BGP
  5. ARP