SlideShare a Scribd company logo
1 of 14
Network
Architecture
PROTOCOL
Jan-19-2016
Protocols
• The term protocol refers to a well-known set of rules and
formats to be used in order to perform a task. For
example, a task of communicating between processes.
• Parts of a protocol:
- A specification of a sequence of messages that must
be exchanged.
- A specification of the format of the data in the
messages.
• Existence of well-known (standard) protocols enables the
separate components of the distributed systems to be
developed independently in different languages and on
different platforms.
??
?
What is
a
3elements of a protocol:
• Syntax
- structure of
commands
and answers
• Semantics
- set of commands
and answers
• Timing
- temporal
sequence of
commands and
answers
How Protocols Work ?...
The entire technical operation by which data is transmitted
over the network has to be broken down into discrete, systematic
steps. At each step, certain actions take place that cannot take place
at any other step. Each step includes its own rules and procedures,
or protocol.
The protocol steps must be carried out in a consistent order
that is the same on every computer in the network. In the sending
computer, these steps must be executed from the top down. In the
receiving computer, these steps must be carried out from the bottom
up.
Protocols at the sending computer:
1. Break the data into smaller sections, called packets, that the
protocol can handle.
2. Add addressing information to the packets so that the
destination computer on the network can determine that the
data belongs to it.
3. Prepare the data for transmission through the NIC and out
onto the network cable.
The Sending
Computer
How Protocols Work ?...
Protocols at the receiving computer carry out the same series of
steps in reverse order. They:
1. Take the data packets off the cable.
2. Bring the data packets into the computer through the NIC.
3. Strip the data packets of all the transmitting information that
was added by the sending computer.
4. Copy the data from the packets to a buffer for reassembly.
5. Pass the reassembled data to the application in a usable
form.
The Receiving
Computer
How Protocols Work ?...
Both sending and receiving computers need to perform
each step in the same way so that the data will have the same
structure when it is received as it did when it was sent.
For example, two different protocols might each break
data into packets and add on various sequencing, timing, and
error checking information, but each will do it differently.
Therefore, a computer using one of these protocols will not be
able to communicate successfully with a computer that is using
the other protocol.
How Protocols Work ?...
Protocol Stacks
A protocol stack is a
combination of
protocols. Each layer
of the stack specifies
a different protocol for
handling a function or
subsystem of the
communication
process. Each layer
has its own set of
rules.
Application Layer
Presentation Layer
Initiates a request or accepts a
request
Adds formatting, display, and
encryption information to the
packet.
Data-link Layer
Physical Layer
Transport Layer
Network Layer
Session Layer
Adds traffic flow
information to determine
when the packet gets
sent.
Adds error-handling
information
Sequencing and address
information is added to
the packet.
Adds error-checking
information and prepares
data for going on to the
physical connection.
Packet sent as a bit stream.
Protocol Stacks
Transport Protocols
Transport protocols facilitate communication sessions between
computers and ensure that data is able to move reliably
between computers. Popular transport protocols are shown in
theTable
Protocol Description
TCP The TCP/IP protocol for guaranteed delivery of sequenced data.
SPX Part of Novell's IPX/SPX protocol suite for sequenced data.
NWLink The Microsoft implementation of the IPX/SPX protocol.
NetBEUI (NetBIOS
extended user
interface)
Establishes communication sessions between computers (NetBIOS) and
provides the underlying data transport services (NetBEUI).
ATP (AppleTalk
Transaction Protocol)
and NBP (Name
Binding Protocol)
Apple's communication session and data transport protocols.
Network Protocols
Network protocols provide what are called "link services."
These protocols handle addressing and routing information,
error checking, and retransmission requests. Network
protocols also define rules for communicating in a particular
networking environment such as Ethernet or Token Ring.
Popular network protocols are shown in the Table
Protocol Description
IP The TCP/IP protocol for packet forwarding routing.
IPX NetWare's protocol for packet forwarding and routing.
NWLink The Microsoft implementation of the IPX/SPX protocol.
NetBEUI A transport protocol that provides data transport services for
NetBIOS sessions and applications.
DDP (Datagram
Delivery
Protocol)
An AppleTalk data transport protocol.
Implementing and Removing Protocols
Protocols are implemented and removed in much the same
way that drivers are added and removed. Essential protocols are
installed automatically at the same time the initial operating system is
installed on the computer. To install protocols such as NWLink after
the initial installation, the network operating system usually includes a
utility that leads the administrator through the process. For example, a
network operating system setup program might provide a series of
graphical windows that lead the administrator through the process of:
• Installing a new protocol.
• Changing the order in which the installed protocols have been
linked.
• Removing a protocol.
Lesson Summary:
The following points summarize the main elements of this lesson:
• Protocols in a networking environment define the rules and procedures for
transmitting data.
• To send data over a network successfully requires a series of separate steps
that must be carried out in a prescribed order.
• The sending and receiving computers use protocols to:
- Break data into packets.
- Add addressing information to the packets.
- Prepare the packets for transmission.
- Take the packets off the cable.
- Copy the data from the packets for reassembly.
- Pass the reassembled data to the computer.
• Several stacks are used as standard protocols; the most prominent standard
protocols are based on the OSI reference model layers.
• Protocols are implemented and removed in the same manner as drivers.
Thank
You Submitted by:
LANZ LOWEN JAY O. BOGNOT
9 - Pisces

More Related Content

What's hot

Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Diwash Sapkota
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and ProtocolSaif Muttair
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP ModelAbir Junayed
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IPToufiqueAhmed13
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.Šhæÿæñ Æhmęd
 

What's hot (20)

TCP/IP MODEL
TCP/IP MODEL TCP/IP MODEL
TCP/IP MODEL
 
Tcp/ip model and protocol
Tcp/ip model and protocolTcp/ip model and protocol
Tcp/ip model and protocol
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Tcpip tutorial
Tcpip tutorialTcpip tutorial
Tcpip tutorial
 
Protocols
ProtocolsProtocols
Protocols
 
TCP-IP PROTOCOL
TCP-IP PROTOCOLTCP-IP PROTOCOL
TCP-IP PROTOCOL
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 

Similar to Network architecture (protocols) by lanz lowen jay o. bognot

Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdfOpositorGonzalez1
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnectionKingPinYT
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2DBU
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxRonoh Kennedy
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptxJaleto Sunkemo
 

Similar to Network architecture (protocols) by lanz lowen jay o. bognot (20)

Lesson 7
Lesson 7Lesson 7
Lesson 7
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
OSI Model.pdf
OSI Model.pdfOSI Model.pdf
OSI Model.pdf
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf1.- Networking Models, Devices.pdf
1.- Networking Models, Devices.pdf
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
network.pptx
network.pptxnetwork.pptx
network.pptx
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Osi model
Osi modelOsi model
Osi model
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
Osi model
Osi modelOsi model
Osi model
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 

Network architecture (protocols) by lanz lowen jay o. bognot

  • 2. Protocols • The term protocol refers to a well-known set of rules and formats to be used in order to perform a task. For example, a task of communicating between processes. • Parts of a protocol: - A specification of a sequence of messages that must be exchanged. - A specification of the format of the data in the messages. • Existence of well-known (standard) protocols enables the separate components of the distributed systems to be developed independently in different languages and on different platforms. ?? ? What is a
  • 3. 3elements of a protocol: • Syntax - structure of commands and answers • Semantics - set of commands and answers • Timing - temporal sequence of commands and answers
  • 4. How Protocols Work ?... The entire technical operation by which data is transmitted over the network has to be broken down into discrete, systematic steps. At each step, certain actions take place that cannot take place at any other step. Each step includes its own rules and procedures, or protocol. The protocol steps must be carried out in a consistent order that is the same on every computer in the network. In the sending computer, these steps must be executed from the top down. In the receiving computer, these steps must be carried out from the bottom up.
  • 5. Protocols at the sending computer: 1. Break the data into smaller sections, called packets, that the protocol can handle. 2. Add addressing information to the packets so that the destination computer on the network can determine that the data belongs to it. 3. Prepare the data for transmission through the NIC and out onto the network cable. The Sending Computer How Protocols Work ?...
  • 6. Protocols at the receiving computer carry out the same series of steps in reverse order. They: 1. Take the data packets off the cable. 2. Bring the data packets into the computer through the NIC. 3. Strip the data packets of all the transmitting information that was added by the sending computer. 4. Copy the data from the packets to a buffer for reassembly. 5. Pass the reassembled data to the application in a usable form. The Receiving Computer How Protocols Work ?...
  • 7. Both sending and receiving computers need to perform each step in the same way so that the data will have the same structure when it is received as it did when it was sent. For example, two different protocols might each break data into packets and add on various sequencing, timing, and error checking information, but each will do it differently. Therefore, a computer using one of these protocols will not be able to communicate successfully with a computer that is using the other protocol. How Protocols Work ?...
  • 8. Protocol Stacks A protocol stack is a combination of protocols. Each layer of the stack specifies a different protocol for handling a function or subsystem of the communication process. Each layer has its own set of rules. Application Layer Presentation Layer Initiates a request or accepts a request Adds formatting, display, and encryption information to the packet.
  • 9. Data-link Layer Physical Layer Transport Layer Network Layer Session Layer Adds traffic flow information to determine when the packet gets sent. Adds error-handling information Sequencing and address information is added to the packet. Adds error-checking information and prepares data for going on to the physical connection. Packet sent as a bit stream. Protocol Stacks
  • 10. Transport Protocols Transport protocols facilitate communication sessions between computers and ensure that data is able to move reliably between computers. Popular transport protocols are shown in theTable Protocol Description TCP The TCP/IP protocol for guaranteed delivery of sequenced data. SPX Part of Novell's IPX/SPX protocol suite for sequenced data. NWLink The Microsoft implementation of the IPX/SPX protocol. NetBEUI (NetBIOS extended user interface) Establishes communication sessions between computers (NetBIOS) and provides the underlying data transport services (NetBEUI). ATP (AppleTalk Transaction Protocol) and NBP (Name Binding Protocol) Apple's communication session and data transport protocols.
  • 11. Network Protocols Network protocols provide what are called "link services." These protocols handle addressing and routing information, error checking, and retransmission requests. Network protocols also define rules for communicating in a particular networking environment such as Ethernet or Token Ring. Popular network protocols are shown in the Table Protocol Description IP The TCP/IP protocol for packet forwarding routing. IPX NetWare's protocol for packet forwarding and routing. NWLink The Microsoft implementation of the IPX/SPX protocol. NetBEUI A transport protocol that provides data transport services for NetBIOS sessions and applications. DDP (Datagram Delivery Protocol) An AppleTalk data transport protocol.
  • 12. Implementing and Removing Protocols Protocols are implemented and removed in much the same way that drivers are added and removed. Essential protocols are installed automatically at the same time the initial operating system is installed on the computer. To install protocols such as NWLink after the initial installation, the network operating system usually includes a utility that leads the administrator through the process. For example, a network operating system setup program might provide a series of graphical windows that lead the administrator through the process of: • Installing a new protocol. • Changing the order in which the installed protocols have been linked. • Removing a protocol.
  • 13. Lesson Summary: The following points summarize the main elements of this lesson: • Protocols in a networking environment define the rules and procedures for transmitting data. • To send data over a network successfully requires a series of separate steps that must be carried out in a prescribed order. • The sending and receiving computers use protocols to: - Break data into packets. - Add addressing information to the packets. - Prepare the packets for transmission. - Take the packets off the cable. - Copy the data from the packets for reassembly. - Pass the reassembled data to the computer. • Several stacks are used as standard protocols; the most prominent standard protocols are based on the OSI reference model layers. • Protocols are implemented and removed in the same manner as drivers.
  • 14. Thank You Submitted by: LANZ LOWEN JAY O. BOGNOT 9 - Pisces