SlideShare a Scribd company logo
Chapter four
Protocols
Network Protocols
 A protocol is a set of rules that governs data communications
 Is a language spoken between computers to exchange information
 Is a formal description of message formats and the rules that two computers
must follow in order to exchange those messages.
 A protocol defines what is communicated, how it is communicated, and
when it is communicated
 To request any service or exchange any information between 2 devices there
must be an agreed set of commands and data formats
 Example: The HTTP protocol defines the format for communication between
web browsers and web servers
Cont...
• For instance, for one computer to send a message to another computer, the first computer
must perform the following general steps
 break the data into small sections called packets
 add addressing information to the packets identifying the source and destination
computers
 deliver the data to the network interface card for transmission over the network
• The receiving computer must perform the same steps, but in reverse order
 accept the data from the NIC
 remove transmitting information that was added by the transmitting computer
 reassemble the packets of data into the original message
• The key elements of a protocol are syntax, semantics, and timing
 syntax: refers to the structure or format of the data
 Semantics: refers to the meaning of each section of bits
 Timing: refers to when data should be sent and how fast they can be sent
Protocol layering
• Protocol layering is a common technique to simplify networking designs by
dividing them into functional layers, and assigning protocols to perform each
layer's task
• Specify how networks are implemented
• For example, it is common to separate the functions of data delivery and
connection management into separate layers
• Thus, one protocol is designed to perform data delivery, and another protocol,
layered above the first, performs connection management
• The data delivery protocol is fairly simple and knows nothing of connection
management
• The connection management protocol is also fairly simple, since it doesn't need
to concern itself with data delivery
Cont...
• The most important layered protocol designs are:
• One famous model is the Open Systems Interconnection (OSI) reference
model
• Another famous model is TCP/IP model
OSI and TCP/IP Layers Correspondence
Cont.…
Sending system Receiving system
6
5
4
3
2
1
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
6
5
4
3
2
1
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
Layer 7: The Application Layer
• The application layer running on the sending system (COMPUTER) is
responsible for the actual request to be made
• This could be any type of networking request—a web request using a web
browser (HTTP), an e-mail delivery request using SMTP, or a file system request
using FTP protocols
• It represents the interface between the end-user and the network.
• Concerned with providing network service to applications like
• Email
• File transfer
• Web services
• Application layer protocols are:- HTTP, FTP, SMTP, SNMP, NFS
Layer 6: The Presentation Layer
• After the request is made, the application layer passes the data down to the
presentation layer
• The Presentation Layer handles data format for networked communications.
• This is done by converting data into a generic format that could be understood
by both sides.
• Performs three major functionalities:-
• Translation
• Data compression
• Encryption
Layer 5: The Session Layer
• Controls the connections between multiple computers
• The session layer manages the dialog between computers
• It does this by establishing, managing, and terminating
communications between two computers
• So it performs:
• Session management
• Authentication and
• Authorization
• On layers 5-7 the data package is in the form of data stream
Layer 4: The Transport Layer
• The transport layer handles transport functions such as reliable and unreliable
delivery of the data. For reliable transport protocols, the transport layer works
hard to ensure reliable delivery of data to its destinations.
• On the sending system, the transport layer is responsible for breaking the data
into smaller packets, so that if retransmission is required, only the packets
missing will be sent. Missing packets are determined by the fact that the
transport layer receives acknowledgments (ACKs) from the remote system, when
the remote system receives the packets.
• The transport layer is responsible for
• Segmentation
• Flow control
• Error correction
• Protocols:
• Transmission Control Protocol (TCP) – Connection Oriented
• User Datagram Protocol (UDP) – Connectionless.
TCP and UDP
• TCP is a connection-oriented protocol
• TCP provides the functions:
• Dividing a chunk of data into segments
• Reassembly segments into the original chunk
• Error checking and flow control through a virtual link that it
establishes and finally terminates.
• Offering a reliable data delivery service
• Examples include FTP and Email
UDP (User Datagram Protocol)
UDP (User Datagram Protocol): unreliable, connectionless protocol that not error
checks or offers any flow control.
Is faster than TCP because no feedback in UDP
Examples: online streaming movies , Voice over IP, game
Layer 3: The Network Layer
• The network layer is responsible for managing and routing of packets by using
information stored in a routing table
• The routing table is a list of available paths that are stored in memory on the
routers
• In front of the segments a network header is places, telling the sender's IP
address and the destination IP address.
• This header remains constant and will be just read and not changed by the
equipment's during the communication.
• The network layer is responsible for working with
• Logical addressing
• Routing
• Path determination
Cont.….
Which path should traffic take through networks is decided at this layer
Address - where something is
Route - how to get there
Only two devices which are directly connected by the same “wire” can
exchange data directly
Devices not on the same network must communicate via intermediate system
Router is an intermediate system
The network layer determines the best way to transfer data. It manages
device addressing and tracks the location of devices.
Hardware:
• The router operates at this layer.
Layer 2: The Data Link Layer
• The data link layer is responsible for physical addressing
• MAC addressing of the sender and receiver for each packet to form a frame
• Data unit used at data link layer is called a frame
• Is responsible for error correction functions
Layer 1: The Physical Layer
• The bottom layer of the OSI hierarchy is concerned only with moving bits of data
onto and off the network medium
• Responsible for converting the data frame to a pattern of signals that will be
used to send the data across the communication medium.
• On the receiving system, the signals will be converted to frame by the data link
layer and then passed up to the network layer for further processing
• Cable, connectors, repeaters, transmitters, receivers, are associated with physical
layer
TCP/IP Model
 Is a standard that defines how to establish and maintain a network
conversation via which application programs can exchange data
TCP/IP is a set of protocols developed to allow cooperating computers
to share resources across a network
TCP works with the Internet Protocol (IP), which defines how
computers send packets of data to each other.
Layer of Models
Cont.…
Application layer: concerned with
• Representation
• Encoding
• Dialogue control
• Transport layer: concerned with
• Reliabil and unreliable
• Flow control
• Error correction
• Internet layer: concerned with
• Logical addressing
• Best path determination
• Network access layer
• Concerned with physical addressing
• Transmission of data across media
OSI and TCP/IP
OSI and TCP/IP - similarities
• Both have layers
• Both assume packets are switched (called packet switched), i.e. that packets could
take different paths to reach to the same destination. Circuit switched is a case in
which all packets take the same path
• Both should be known by network professionals
OSI and TCP/IP - differences
• TCP/IP combines session, presentation and application layers into a single
layer
• TCP/IP combines physical and data link layer into a single layer
• TCP/IP is the standard in which the internet has grown
Categorizing protocols
• Application protocols work in
• Application layer
• Presentation layer
• Session layer
• Transport protocols work in
• Transport layer
• Network protocols work in
• Network layer
• Data link layer
• Physical layer
Application layer protocols
• Hypertext Transfer Protocol (HTTP)
• Used for exchanging files (text, graphic images, sound, video, and other
multimedia files) on the World Wide Web.
• File Transfer Protocol (FTP)
• Used for transferring files from one computer to another
• Simple Mail Transfer (SMTP)
• Used for transferring e-mail across the Internet.
• Network File System (NFS)
• Used to transfer files from one computer to another
• Simple Network Management Protocol (SNMP)
• Used to manage a network
Transport protocols
• Transmission Control Protocol (TCP)
• Enables two hosts to establish a connection and exchange streams of data. It
guarantees delivery of data and also guarantees that individual units of data
(called packets) will be delivered in the same order in which they were sent
• User datagram protocol (UDP)
• The other transport layer protocol, provides datagram delivery service. UDP
does not verify connections between receiving and sending hosts. Because
UDP eliminates the processes of establishing and verifying connections,
applications that send small amounts of data use UDP rather than TCP.
Network protocol
• Internet Protocol (IP)
• Specifies the format of packets and the addressing scheme.
• Most networks combine IP with a Transport Control Protocol (TCP), which
establishes a virtual connection between a destination and a source.
• IP by itself is something like the postal system.
• It allows you to address a package and drop it in the system, but there’s no direct
link between you and the recipient
• Address Resolution Protocol (ARP)
• The Address Resolution Protocol (ARP) conceptually exists between the data-link
and Internet layers. ARP assists IP in directing datagrams to the appropriate
receiving host by mapping Ethernet addresses (48 bits long) to known IP addresses
(32 bits long).
• Ethernet
• The most common local area network (LAN) protocol
• X.25
• Common wide area network (WAN) protocol

More Related Content

What's hot

ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
Tutun Juhana
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
Gopi A
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
PriyankaBhattacharya28
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
Mukesh Chinta
 
TCP/ IP
TCP/ IP TCP/ IP
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
IshworKhatiwada
 
Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
Perfect Training Center
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
scooby_doo
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
JAIGANESH SEKAR
 
Unit 5 : Transport Layer
Unit 5 : Transport LayerUnit 5 : Transport Layer
Unit 5 : Transport Layer
Chandan Gupta Bhagat
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
ShofiqulIslam38
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
Šhæÿæñ Æhmęd
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
ushabarad142
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
KarthicaMarasamy
 
Iso osi
Iso osiIso osi
The OSI model
 The OSI model The OSI model
The OSI model
ShofiqulIslam38
 
Network protocol
Network protocolNetwork protocol
Network protocol
SWAMY NAYAK
 

What's hot (20)

ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Chapter13
Chapter13Chapter13
Chapter13
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Unit 5 : Transport Layer
Unit 5 : Transport LayerUnit 5 : Transport Layer
Unit 5 : Transport Layer
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Iso osi
Iso osiIso osi
Iso osi
 
The OSI model
 The OSI model The OSI model
The OSI model
 
Network protocol
Network protocolNetwork protocol
Network protocol
 

Similar to lecture 4.pptx

Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
KingPinYT
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
Zakirul Islam
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
hiya123jes
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
183JAIDEEP
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
JustinMathew73
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
Ronoh Kennedy
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
Saman M. Almufti
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
Taymoor Nazmy
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architectureOrbay Yeşil
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
ToufiqueAhmed13
 

Similar to lecture 4.pptx (20)

Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
TCP.pdf
TCP.pdfTCP.pdf
TCP.pdf
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

lecture 4.pptx

  • 2. Network Protocols  A protocol is a set of rules that governs data communications  Is a language spoken between computers to exchange information  Is a formal description of message formats and the rules that two computers must follow in order to exchange those messages.  A protocol defines what is communicated, how it is communicated, and when it is communicated  To request any service or exchange any information between 2 devices there must be an agreed set of commands and data formats  Example: The HTTP protocol defines the format for communication between web browsers and web servers
  • 3. Cont... • For instance, for one computer to send a message to another computer, the first computer must perform the following general steps  break the data into small sections called packets  add addressing information to the packets identifying the source and destination computers  deliver the data to the network interface card for transmission over the network • The receiving computer must perform the same steps, but in reverse order  accept the data from the NIC  remove transmitting information that was added by the transmitting computer  reassemble the packets of data into the original message • The key elements of a protocol are syntax, semantics, and timing  syntax: refers to the structure or format of the data  Semantics: refers to the meaning of each section of bits  Timing: refers to when data should be sent and how fast they can be sent
  • 4. Protocol layering • Protocol layering is a common technique to simplify networking designs by dividing them into functional layers, and assigning protocols to perform each layer's task • Specify how networks are implemented • For example, it is common to separate the functions of data delivery and connection management into separate layers • Thus, one protocol is designed to perform data delivery, and another protocol, layered above the first, performs connection management • The data delivery protocol is fairly simple and knows nothing of connection management • The connection management protocol is also fairly simple, since it doesn't need to concern itself with data delivery
  • 5. Cont... • The most important layered protocol designs are: • One famous model is the Open Systems Interconnection (OSI) reference model • Another famous model is TCP/IP model
  • 6. OSI and TCP/IP Layers Correspondence
  • 7. Cont.… Sending system Receiving system 6 5 4 3 2 1 7 Application Presentation Session Transport Network Data Link Physical 6 5 4 3 2 1 7 Application Presentation Session Transport Network Data Link Physical
  • 8. Layer 7: The Application Layer • The application layer running on the sending system (COMPUTER) is responsible for the actual request to be made • This could be any type of networking request—a web request using a web browser (HTTP), an e-mail delivery request using SMTP, or a file system request using FTP protocols • It represents the interface between the end-user and the network. • Concerned with providing network service to applications like • Email • File transfer • Web services • Application layer protocols are:- HTTP, FTP, SMTP, SNMP, NFS
  • 9. Layer 6: The Presentation Layer • After the request is made, the application layer passes the data down to the presentation layer • The Presentation Layer handles data format for networked communications. • This is done by converting data into a generic format that could be understood by both sides. • Performs three major functionalities:- • Translation • Data compression • Encryption
  • 10. Layer 5: The Session Layer • Controls the connections between multiple computers • The session layer manages the dialog between computers • It does this by establishing, managing, and terminating communications between two computers • So it performs: • Session management • Authentication and • Authorization • On layers 5-7 the data package is in the form of data stream
  • 11. Layer 4: The Transport Layer • The transport layer handles transport functions such as reliable and unreliable delivery of the data. For reliable transport protocols, the transport layer works hard to ensure reliable delivery of data to its destinations. • On the sending system, the transport layer is responsible for breaking the data into smaller packets, so that if retransmission is required, only the packets missing will be sent. Missing packets are determined by the fact that the transport layer receives acknowledgments (ACKs) from the remote system, when the remote system receives the packets. • The transport layer is responsible for • Segmentation • Flow control • Error correction • Protocols: • Transmission Control Protocol (TCP) – Connection Oriented • User Datagram Protocol (UDP) – Connectionless.
  • 12. TCP and UDP • TCP is a connection-oriented protocol • TCP provides the functions: • Dividing a chunk of data into segments • Reassembly segments into the original chunk • Error checking and flow control through a virtual link that it establishes and finally terminates. • Offering a reliable data delivery service • Examples include FTP and Email
  • 13. UDP (User Datagram Protocol) UDP (User Datagram Protocol): unreliable, connectionless protocol that not error checks or offers any flow control. Is faster than TCP because no feedback in UDP Examples: online streaming movies , Voice over IP, game
  • 14. Layer 3: The Network Layer • The network layer is responsible for managing and routing of packets by using information stored in a routing table • The routing table is a list of available paths that are stored in memory on the routers • In front of the segments a network header is places, telling the sender's IP address and the destination IP address. • This header remains constant and will be just read and not changed by the equipment's during the communication. • The network layer is responsible for working with • Logical addressing • Routing • Path determination
  • 15. Cont.…. Which path should traffic take through networks is decided at this layer Address - where something is Route - how to get there Only two devices which are directly connected by the same “wire” can exchange data directly Devices not on the same network must communicate via intermediate system Router is an intermediate system The network layer determines the best way to transfer data. It manages device addressing and tracks the location of devices. Hardware: • The router operates at this layer.
  • 16. Layer 2: The Data Link Layer • The data link layer is responsible for physical addressing • MAC addressing of the sender and receiver for each packet to form a frame • Data unit used at data link layer is called a frame • Is responsible for error correction functions
  • 17. Layer 1: The Physical Layer • The bottom layer of the OSI hierarchy is concerned only with moving bits of data onto and off the network medium • Responsible for converting the data frame to a pattern of signals that will be used to send the data across the communication medium. • On the receiving system, the signals will be converted to frame by the data link layer and then passed up to the network layer for further processing • Cable, connectors, repeaters, transmitters, receivers, are associated with physical layer
  • 18. TCP/IP Model  Is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data TCP/IP is a set of protocols developed to allow cooperating computers to share resources across a network TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.
  • 20. Cont.… Application layer: concerned with • Representation • Encoding • Dialogue control • Transport layer: concerned with • Reliabil and unreliable • Flow control • Error correction • Internet layer: concerned with • Logical addressing • Best path determination • Network access layer • Concerned with physical addressing • Transmission of data across media
  • 21. OSI and TCP/IP OSI and TCP/IP - similarities • Both have layers • Both assume packets are switched (called packet switched), i.e. that packets could take different paths to reach to the same destination. Circuit switched is a case in which all packets take the same path • Both should be known by network professionals OSI and TCP/IP - differences • TCP/IP combines session, presentation and application layers into a single layer • TCP/IP combines physical and data link layer into a single layer • TCP/IP is the standard in which the internet has grown
  • 22. Categorizing protocols • Application protocols work in • Application layer • Presentation layer • Session layer • Transport protocols work in • Transport layer • Network protocols work in • Network layer • Data link layer • Physical layer
  • 23. Application layer protocols • Hypertext Transfer Protocol (HTTP) • Used for exchanging files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. • File Transfer Protocol (FTP) • Used for transferring files from one computer to another • Simple Mail Transfer (SMTP) • Used for transferring e-mail across the Internet. • Network File System (NFS) • Used to transfer files from one computer to another • Simple Network Management Protocol (SNMP) • Used to manage a network
  • 24. Transport protocols • Transmission Control Protocol (TCP) • Enables two hosts to establish a connection and exchange streams of data. It guarantees delivery of data and also guarantees that individual units of data (called packets) will be delivered in the same order in which they were sent • User datagram protocol (UDP) • The other transport layer protocol, provides datagram delivery service. UDP does not verify connections between receiving and sending hosts. Because UDP eliminates the processes of establishing and verifying connections, applications that send small amounts of data use UDP rather than TCP.
  • 25. Network protocol • Internet Protocol (IP) • Specifies the format of packets and the addressing scheme. • Most networks combine IP with a Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. • IP by itself is something like the postal system. • It allows you to address a package and drop it in the system, but there’s no direct link between you and the recipient • Address Resolution Protocol (ARP) • The Address Resolution Protocol (ARP) conceptually exists between the data-link and Internet layers. ARP assists IP in directing datagrams to the appropriate receiving host by mapping Ethernet addresses (48 bits long) to known IP addresses (32 bits long). • Ethernet • The most common local area network (LAN) protocol • X.25 • Common wide area network (WAN) protocol

Editor's Notes

  1. Syntax: It indicates how to read the data in the form of bits or fields. Example: A protocol might expect that the size of a data packet will be 16 bits. In which, the first 8 bits are address, the next 4 bits are the check-sum bits, and the last 4 bits will contain the message. So, every communication that is following that protocol should send 16-bit data. Semantics: It specifies which field defines what action. It defines how a particular section of bits or pattern can be interpreted, and what action needs to be taken. Example: It interprets whether the bits of address identify the route to be taken or the final destination of the message or something else. Timing: Example: A sender can send the data at a speed of 100 Mbps, but the receiver can consume it only at a speed of 20 Mbps, then there may be data losses or the packets might get dropped. So, proper synchronization must be there between a sender and a receiver.
  2. Encryption using secure socket layer
  3. Segmentation: each segement contain port number seq number
  4. The routing table is a list of available destinations that are stored in memory on the routers. OSPF, BGP
  5. ARP