SlideShare a Scribd company logo
1 of 47
Protocols
Chapter Four
The key features of a protocol
In the context of data networking, a protocol is a formal set of
rules and conventions that governs how computers exchange
information over a network medium.
The peer layers communicate by means of formatted blocks of data
that obey a set of rules or conventions known as a protocol. The
key features of protocol are:
Syntax – data block format
Semantics - control information & error handling
Timing - speed matching & sequencing
Types of Communication Models
There are two basic protocol models used in data communications
and computer networks.
I. TCP/IP model and
II. OSI reference model
I.TCP/IP Protocol Suite
TCP/IP stands for Transmission Control Protocol/
Internet Protocol.
It was developed by the Internet Engineering Task
Force(IETF) prior to the OSI model.
Therefore, the layers in the TCP/IP protocol suite do not
match exactly with those in the OSI model.
The TCP/IP protocol suite is defined as four software
layers built upon the hardware.
Layers in the TCP/IP Protocol Suite
1. Network Access Layer
At the bottom of the TCP/IP model, the Network Access
layer implements the data exchange between the host
and the network.
The equivalent of the Data Link and Physical layers of the
OSI model, the Network Access layer oversees hardware
addressing and defines protocols for the physical
transmission of data.
The reason TCP/IP became so popular is because there
were no set of physical layer specifications, so it could
run on any existing or future physical network.
2. Internet Layer
The Internet layer corresponds to the OSI’s Network layer,
designating the protocols relating to the logical
transmission of packets over the entire network.
It takes care of the addressing of hosts by giving them an
IP (Internet Protocol) address and handles the routing of
packets among multiple networks.
3. Host-to-Host/Transport layer
The Host-to-Host layer parallels the functions of the
OSI’s Transport layer, defining protocols for setting up
the level of transmission service for applications.
It tackles issues like creating reliable end-to-end
communication and ensuring the error-free delivery of
data.
It handles packet sequencing and maintains data
integrity.
4. Process/Application layer
This layer integrates the various activities and duties
spanning the focus of the OSI’s corresponding top three
layers (Application, Presentation, and Session).
Controls user-interface specifications.
A vast array of protocols join forces at the TCP/IP
model’s Application layer.
TCP/IP Protocol Suite
II. The OSI Model
It was developed by the International Organization for
Standardization (ISO).
It was first introduced in the late 1970s.
It is a model for a computer protocol architecture and as
a framework for developing protocol standards.
An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model.
It comprises seven layers.
Summary of OSI Layers
TCP/IP and OSI Model
OSI and TCP/IP similarities
Both have layers.
Both have application layers, though they include very
different services.
Both have comparable transport and network layers.
Both assume packets are switched(Packet switching). This
means that individual packets may take different paths to
reach the same destination. This is contrasted with circuit-
switched networks where all the packets take the same path.
OSI and TCP/IP Differences
TCP/IP combines the application, presentation and session
layer issues into its application layer.
TCP/IP combines the OSI data link and physical layers into the
network access layer.
TCP/IP appears simpler because it has fewer layers.
TCP/IP protocols are the standards around which the Internet
developed, so the TCP/IP model gains credibility just because of
its protocols.
In contrast, networks are not usually built on the OSI protocol,
even though the OSI model is used as a guide.
Overview of familiar Protocols
Simple Network Management Protocol (SNMP)
Simple Network Management Protocol (SNMP) collects
and manipulates valuable network information.
 It gathers data by polling the devices on the network
from a network management station (NMS) and alert to
administrator.
This protocol can also stand as a watchdog over the
network, quickly notifying managers of any sudden turn
of events.
Hypertext Transfer Protocol (HTTP)
 It’s used to manage communications between web
browsers and web servers and opens the right resource
when you click a link, wherever that resource may actually
reside.
Your browser can understand what you need when you
enter a Uniform Resource Locator (URL), which we usually
refer to as a web address,e.g. http://www.google.com/
Web
browser
E.g.
Chrome
Web server
E.g. google
Internet protocols
E.g. http
Facilitate communication
Hypertext Transfer Protocol Secure (HTTPS)
Hypertext Transfer Protocol Secure (HTTPS) is also
known as Secure Hypertext Transfer Protocol. It uses
Secure Sockets Layer (SSL).
Sometimes you’ll see it referred to as SHTTP or S-HTTP,
which were slightly different protocols, but since
Microsoft supported HTTPS, it became the de facto
standard for securing web communication.
Domain Name Service (DNS)
An IP address identifies hosts on a network and the
Internet as well, but DNS was designed to make things
easier.
DNS allows users to use a domain name to specify an IP
address.
DNS resolves hostnames—specifically, Internet names,
such as www.amu.edu.et to Ip addresses like 10.145.8.10
DNS…
DNS resolves domain names to IP addresses and vice
versa
DNS Server 10.144.5.30
www.amu.edu.et
DNS…
The very last section of the domain is called its top-
level domain (TLD) name
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol (DHCP) assigns IP
addresses to hosts dynamically.
It allows for easier administration and works well in small
to very large network environments.
Many types of hard wares can be used as a DHCP server,
including a Cisco router.
A DHCP address conflict occurs when two hosts use the
same IP address.
Simple Mail Transfer Protocol (SMTP)
Governs the transmission of mail messages and attachments.
SMTP is used in the case of outgoing messages.
More powerful protocols such as POP3 and IMAP4 are needed
and available to manage incoming messages.
POP3(Post Office Protocol version 3) is the older protocol
whereas IMAP4(Internet Mail Access Protocol version 4) is the
more advanced protocol.
It allows a user on a remote machine to access the
resources of another machine.
Telnet is not secure because everything is by using plain
text.
Due to lack of encryption telnet is outdated technology.
It is largely used in local area networks, but not in the
internet.
SSH(Secure Shell) is the better alternative for Telnet as it
protects data from being attacked or stolen when
transferred over a network.
Telnet
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)actually lets users to transfer files.
Users must be subjected to an authentication login that’s
usually secured with passwords and usernames.
FTP’s functions are limited to listing and manipulating
directories, typing file contents, and copying files between
hosts.
Not a secure protocol since a data being transferred is not
encrypted(i.e. plain text).
A more secured transfer protocol should be used; that is
Secure FTP(SFTP).
Trivial File Transfer Protocol (TFTP)
TFTP is a very simple file transfer protocol.
It is mainly used to transfer files within a local area network,
but not used to transfer files over the internet due to security
issues.
TFTP doesn’t offer the abundance of functions that FTP does
because it has no directory-browsing abilities, meaning that it
can only send and receive files.
 There’s no authentication as with FTP, so it’s even more
insecure, and few sites support it because of the inherent
security risks.
TCP(Transmission Control Protocol)
TCP takes large blocks of information from an application
and breaks them into segments.
It numbers and sequences each segment to keep the order
of the segments.
After these segments are sent on the transmitting host, TCP
waits for an acknowledgment of the receiving end’s.
It is a reliable protocol, in which it provides a guaranteed
delivery.
Retransmits any segments that aren’t acknowledged.
It is Connection oriented means that a virtual connection is
established before any user data is transferred.
TCP…
 TCP can also recognize duplicate messages and will discard
them appropriately.
 If the sending computer is transmitting too fast for the
receiving computer, TCP can employ flow control
mechanisms to slow data transfer.
All these characteristics makes TCP an end-to-end reliable
transport layer protocol.
User Datagram Protocol (UDP)
User Datagram Protocol (UDP)is basically the scaled-down
model of TCP, which is why UDP is sometimes referred to as a
thin protocol.
A thin protocol doesn’t take up a lot of room—or in this
case, require much bandwidth on a network.
UDP does not sequence the segments and does not care
about the order in which the segments arrive at the
destination.
UDP just sends the segments off and forgets about them.
UDP …
It doesn’t follow segments, check up on them, or even
allow for an acknowledgment of safe arrival.
Because of this, it’s referred to as an unreliable
protocol.
This does not mean that UDP is ineffective, only that it
doesn’t deal with reliability issues at all.
Furthermore, UDP doesn’t create a virtual circuit or
doesn’t contact the destination before delivering
information to it.
Because of this, it’s also considered a connectionless
protocol.
UDP in short
Minimum overhead.
Used to send short messages.
Not reliable as TCP (out of order, missing datagram,
duplicate datagram).
Lack of flow control and error control
Faster and efficient.
Internet Protocol (IP)
The Internet Protocol (IP) is a protocol, or set of rules, for
routing and addressing packets of data so that they can travel
across networks and arrive at the correct destination.
IP is the network layer communications protocol for
relaying datagrams across network boundaries.
Its routing function enables internetworking, and essentially
establishes the Internet.
IP has the task of delivering packets from the source host to
the destination host solely based on the IP addresses in the
packet headers.
Internet Protocol versions: IPv4, IPv6.
Address Resolution Protocol(ARP)
ARP maps 32-bit logical (IP) address to 48-bit physical
address(MAC address).
An Ip address is used to locate a device on a network,
whereas MAC address is what identifies the actual device.
Host or router transmit IP datagram packet containing logical
address obtained from DNS.
Sender knows logical address(IP) of receiver but not its
physical address(MAC) so ARP maps the logical address of the
receiver to physical address it obtains from receiver.
ARP Retrieves the physical address of the receiver.
ARP…
R1 R2 R3
192.168.1.2 192.168.1.4
192.168.1.5
Sends ARP query packet
Contains
Logical address of
sender
(192.168.1.2)
Logical address of
receiver
(192.168.1.5)
Sends ARP response packet
Contains
Logical address of
receiver
(192.168.1.5)
physical address of
receiver
(00:04:ff:ff:ff:d0)
 The receiver sends ARP response packet which contains the logical
(IP) address and physical address of the receiver.
 ARP response packet is unicast directly to the sender whose
physical address is present in the ARP query packet.
Sender Receiver
Intended
receiver
Reverse Address Resolution Protocol (RARP)
RARP is a TCP/IP protocol that allows any host to obtain its IP
address from the server.
RARP perform the following steps to obtain an IP address
from the server.
 The sender broadcast the RARP request to all hosts.
 The RARP request packet contains the physical address
of the sender.
 All the host receiving the RARP request process it, but
the authorized server only replies to the requesting host.
RARP…
R1 R2
R3
192.168.1.4
192.168.1.5
Sender broadcast RARP request
Contains
Physical address of
sender
(00:04:ff:ff:ff:d0)
Sends RARP response packet
Contains
The authorized
RARP server
replies to
requesting host
which contains IP
address for
(192.168.1.2)
RARP maps 48-bit physical address(MAC address) to 32-bit
logical (IP) address.
Sender
Receiver
authorized
RARP server
00:04:ff:ff:ff:d0
Internet Control Message Protocol(ICMP)
Used to report errors with delivery of IP data.
E.g. if particular service or host is not reachable or to
check routers are correctly routing .
ICMP uses Ping tool to check host if it is reachable and
how long it takes to reach.
Error reporting, but not error correction.
Two types of messages
Error reporting message
Problems with router or host e.g. destination
unreachable, time exceeded, parameters problem
Query message
Help in getting specific information. e.g. neighbors
Internet Group Management Protocol(IGMP)
IGMP is a protocol that allows several devices to share
one IP address so they can all receive the same data.
IGMP is a network layer protocol used to set up
multicasting on networks that use the Internet Protocol
version 4 (IPv4).
Protocol that manages group membership.
Provides information to multicast routers about the
membership status of hosts.
Thank you!!

More Related Content

Similar to Ch4 Protocols.pptx

Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
Please help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdfPlease help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdflejeunehayneswowel96
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control ProtocolAliHamza410
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxEdJulleza
 

Similar to Ch4 Protocols.pptx (20)

Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Please help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdfPlease help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdf
 
Osi model
Osi modelOsi model
Osi model
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Internet1
Internet1Internet1
Internet1
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptx
 

More from kebeAman

Ch2 Data communication.pptx
Ch2 Data communication.pptxCh2 Data communication.pptx
Ch2 Data communication.pptxkebeAman
 
MATLAB-Introd.ppt
MATLAB-Introd.pptMATLAB-Introd.ppt
MATLAB-Introd.pptkebeAman
 
Ch1 Introduction.pptx
Ch1 Introduction.pptxCh1 Introduction.pptx
Ch1 Introduction.pptxkebeAman
 

More from kebeAman (6)

3.pptx
3.pptx3.pptx
3.pptx
 
2.pptx
2.pptx2.pptx
2.pptx
 
1.pptx
1.pptx1.pptx
1.pptx
 
Ch2 Data communication.pptx
Ch2 Data communication.pptxCh2 Data communication.pptx
Ch2 Data communication.pptx
 
MATLAB-Introd.ppt
MATLAB-Introd.pptMATLAB-Introd.ppt
MATLAB-Introd.ppt
 
Ch1 Introduction.pptx
Ch1 Introduction.pptxCh1 Introduction.pptx
Ch1 Introduction.pptx
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Ch4 Protocols.pptx

  • 2. The key features of a protocol In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. The peer layers communicate by means of formatted blocks of data that obey a set of rules or conventions known as a protocol. The key features of protocol are: Syntax – data block format Semantics - control information & error handling Timing - speed matching & sequencing
  • 3. Types of Communication Models There are two basic protocol models used in data communications and computer networks. I. TCP/IP model and II. OSI reference model
  • 4. I.TCP/IP Protocol Suite TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It was developed by the Internet Engineering Task Force(IETF) prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The TCP/IP protocol suite is defined as four software layers built upon the hardware.
  • 5. Layers in the TCP/IP Protocol Suite
  • 6. 1. Network Access Layer At the bottom of the TCP/IP model, the Network Access layer implements the data exchange between the host and the network. The equivalent of the Data Link and Physical layers of the OSI model, the Network Access layer oversees hardware addressing and defines protocols for the physical transmission of data. The reason TCP/IP became so popular is because there were no set of physical layer specifications, so it could run on any existing or future physical network.
  • 7. 2. Internet Layer The Internet layer corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network. It takes care of the addressing of hosts by giving them an IP (Internet Protocol) address and handles the routing of packets among multiple networks.
  • 8. 3. Host-to-Host/Transport layer The Host-to-Host layer parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications. It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.
  • 9. 4. Process/Application layer This layer integrates the various activities and duties spanning the focus of the OSI’s corresponding top three layers (Application, Presentation, and Session). Controls user-interface specifications. A vast array of protocols join forces at the TCP/IP model’s Application layer.
  • 11. II. The OSI Model It was developed by the International Organization for Standardization (ISO). It was first introduced in the late 1970s. It is a model for a computer protocol architecture and as a framework for developing protocol standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It comprises seven layers.
  • 12. Summary of OSI Layers
  • 13. TCP/IP and OSI Model
  • 14. OSI and TCP/IP similarities Both have layers. Both have application layers, though they include very different services. Both have comparable transport and network layers. Both assume packets are switched(Packet switching). This means that individual packets may take different paths to reach the same destination. This is contrasted with circuit- switched networks where all the packets take the same path.
  • 15. OSI and TCP/IP Differences TCP/IP combines the application, presentation and session layer issues into its application layer. TCP/IP combines the OSI data link and physical layers into the network access layer. TCP/IP appears simpler because it has fewer layers. TCP/IP protocols are the standards around which the Internet developed, so the TCP/IP model gains credibility just because of its protocols. In contrast, networks are not usually built on the OSI protocol, even though the OSI model is used as a guide.
  • 16. Overview of familiar Protocols
  • 17. Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) collects and manipulates valuable network information.  It gathers data by polling the devices on the network from a network management station (NMS) and alert to administrator. This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events.
  • 18.
  • 19. Hypertext Transfer Protocol (HTTP)  It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside. Your browser can understand what you need when you enter a Uniform Resource Locator (URL), which we usually refer to as a web address,e.g. http://www.google.com/ Web browser E.g. Chrome Web server E.g. google Internet protocols E.g. http Facilitate communication
  • 20. Hypertext Transfer Protocol Secure (HTTPS) Hypertext Transfer Protocol Secure (HTTPS) is also known as Secure Hypertext Transfer Protocol. It uses Secure Sockets Layer (SSL). Sometimes you’ll see it referred to as SHTTP or S-HTTP, which were slightly different protocols, but since Microsoft supported HTTPS, it became the de facto standard for securing web communication.
  • 21. Domain Name Service (DNS) An IP address identifies hosts on a network and the Internet as well, but DNS was designed to make things easier. DNS allows users to use a domain name to specify an IP address. DNS resolves hostnames—specifically, Internet names, such as www.amu.edu.et to Ip addresses like 10.145.8.10
  • 22. DNS… DNS resolves domain names to IP addresses and vice versa DNS Server 10.144.5.30 www.amu.edu.et
  • 23. DNS… The very last section of the domain is called its top- level domain (TLD) name
  • 24. Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts dynamically. It allows for easier administration and works well in small to very large network environments. Many types of hard wares can be used as a DHCP server, including a Cisco router. A DHCP address conflict occurs when two hosts use the same IP address.
  • 25.
  • 26. Simple Mail Transfer Protocol (SMTP) Governs the transmission of mail messages and attachments. SMTP is used in the case of outgoing messages. More powerful protocols such as POP3 and IMAP4 are needed and available to manage incoming messages. POP3(Post Office Protocol version 3) is the older protocol whereas IMAP4(Internet Mail Access Protocol version 4) is the more advanced protocol.
  • 27. It allows a user on a remote machine to access the resources of another machine. Telnet is not secure because everything is by using plain text. Due to lack of encryption telnet is outdated technology. It is largely used in local area networks, but not in the internet. SSH(Secure Shell) is the better alternative for Telnet as it protects data from being attacked or stolen when transferred over a network. Telnet
  • 28. File Transfer Protocol (FTP) File Transfer Protocol (FTP)actually lets users to transfer files. Users must be subjected to an authentication login that’s usually secured with passwords and usernames. FTP’s functions are limited to listing and manipulating directories, typing file contents, and copying files between hosts. Not a secure protocol since a data being transferred is not encrypted(i.e. plain text). A more secured transfer protocol should be used; that is Secure FTP(SFTP).
  • 29.
  • 30. Trivial File Transfer Protocol (TFTP) TFTP is a very simple file transfer protocol. It is mainly used to transfer files within a local area network, but not used to transfer files over the internet due to security issues. TFTP doesn’t offer the abundance of functions that FTP does because it has no directory-browsing abilities, meaning that it can only send and receive files.  There’s no authentication as with FTP, so it’s even more insecure, and few sites support it because of the inherent security risks.
  • 31.
  • 32. TCP(Transmission Control Protocol) TCP takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment to keep the order of the segments. After these segments are sent on the transmitting host, TCP waits for an acknowledgment of the receiving end’s. It is a reliable protocol, in which it provides a guaranteed delivery. Retransmits any segments that aren’t acknowledged. It is Connection oriented means that a virtual connection is established before any user data is transferred.
  • 33. TCP…  TCP can also recognize duplicate messages and will discard them appropriately.  If the sending computer is transmitting too fast for the receiving computer, TCP can employ flow control mechanisms to slow data transfer. All these characteristics makes TCP an end-to-end reliable transport layer protocol.
  • 34. User Datagram Protocol (UDP) User Datagram Protocol (UDP)is basically the scaled-down model of TCP, which is why UDP is sometimes referred to as a thin protocol. A thin protocol doesn’t take up a lot of room—or in this case, require much bandwidth on a network. UDP does not sequence the segments and does not care about the order in which the segments arrive at the destination. UDP just sends the segments off and forgets about them.
  • 35. UDP … It doesn’t follow segments, check up on them, or even allow for an acknowledgment of safe arrival. Because of this, it’s referred to as an unreliable protocol. This does not mean that UDP is ineffective, only that it doesn’t deal with reliability issues at all. Furthermore, UDP doesn’t create a virtual circuit or doesn’t contact the destination before delivering information to it. Because of this, it’s also considered a connectionless protocol.
  • 36. UDP in short Minimum overhead. Used to send short messages. Not reliable as TCP (out of order, missing datagram, duplicate datagram). Lack of flow control and error control Faster and efficient.
  • 37.
  • 38. Internet Protocol (IP) The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination. IP is the network layer communications protocol for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. Internet Protocol versions: IPv4, IPv6.
  • 39. Address Resolution Protocol(ARP) ARP maps 32-bit logical (IP) address to 48-bit physical address(MAC address). An Ip address is used to locate a device on a network, whereas MAC address is what identifies the actual device. Host or router transmit IP datagram packet containing logical address obtained from DNS. Sender knows logical address(IP) of receiver but not its physical address(MAC) so ARP maps the logical address of the receiver to physical address it obtains from receiver. ARP Retrieves the physical address of the receiver.
  • 40.
  • 41. ARP… R1 R2 R3 192.168.1.2 192.168.1.4 192.168.1.5 Sends ARP query packet Contains Logical address of sender (192.168.1.2) Logical address of receiver (192.168.1.5) Sends ARP response packet Contains Logical address of receiver (192.168.1.5) physical address of receiver (00:04:ff:ff:ff:d0)  The receiver sends ARP response packet which contains the logical (IP) address and physical address of the receiver.  ARP response packet is unicast directly to the sender whose physical address is present in the ARP query packet. Sender Receiver Intended receiver
  • 42. Reverse Address Resolution Protocol (RARP) RARP is a TCP/IP protocol that allows any host to obtain its IP address from the server. RARP perform the following steps to obtain an IP address from the server.  The sender broadcast the RARP request to all hosts.  The RARP request packet contains the physical address of the sender.  All the host receiving the RARP request process it, but the authorized server only replies to the requesting host.
  • 43. RARP… R1 R2 R3 192.168.1.4 192.168.1.5 Sender broadcast RARP request Contains Physical address of sender (00:04:ff:ff:ff:d0) Sends RARP response packet Contains The authorized RARP server replies to requesting host which contains IP address for (192.168.1.2) RARP maps 48-bit physical address(MAC address) to 32-bit logical (IP) address. Sender Receiver authorized RARP server 00:04:ff:ff:ff:d0
  • 44. Internet Control Message Protocol(ICMP) Used to report errors with delivery of IP data. E.g. if particular service or host is not reachable or to check routers are correctly routing . ICMP uses Ping tool to check host if it is reachable and how long it takes to reach. Error reporting, but not error correction. Two types of messages Error reporting message Problems with router or host e.g. destination unreachable, time exceeded, parameters problem Query message Help in getting specific information. e.g. neighbors
  • 45.
  • 46. Internet Group Management Protocol(IGMP) IGMP is a protocol that allows several devices to share one IP address so they can all receive the same data. IGMP is a network layer protocol used to set up multicasting on networks that use the Internet Protocol version 4 (IPv4). Protocol that manages group membership. Provides information to multicast routers about the membership status of hosts.