SlideShare a Scribd company logo
Network Protocols
Introducing Protocols
• Set of predefined rules used by devices in network for
  data transfer
• Network Protocols:
   –   NetBIOS/NetBEUI
   –   TCP/IP
   –   ARP/RARP
   –   ICMP/IGMP
   –   UDP
   –   IPX/SPX
   –   HDLC/SDLC
NetBIOS/NetBEUI
• Developed by IBM and later adopted by Microsoft
• Network Basic Input/Output System (NetBIOS) used for
  communication within LAN
• Operates at Transport and Session layers of OSI model
• NetBIOS Extended User Interface (NetBEUI) adds
  capabilities to NetBIOS and an advanced version of
  NetBIOS used in MS Windows OS
• Widely used in Ethernet, Token Ring and Windows NT
  networks
NetBIOS Services
• Supports three distinct services: Name service for name
  registration and resolution, Session service for connection
  oriented communication and datagram service for
  connectionless communication



                               NetBIOS
                               Services




                               Session    Datagram
                Name Service
                               Service     Service
Name Service
• Implemented in Microsoft Windows as Windows
  Internet Name Service (WINS).
• Provides means to application to register its NetBIOS
  name
• NetBIOS names are 16 bytes length
• Service uses UDP port 137
• Name Service functions include
   –   Add Name
   –   Add Group Name
   –   Delete Name
   –   Find Name
Session Service
Establishes session for data exchange between computers using
  TCP port 139




 Session Establishment Process     Session Termination Process
Datagram Service
• Uses the UDP port 138 and provides a
  connectionless and broadcast-oriented data
  communication between two devices.
• Divides data in datagrams before sending
• Datagram service functions include:
   – Send Datagram
   – Send Broadcast Datagram
   – Receive Datagram
   – Receive Broadcast Datagram
NetBIOS Name Resolution
• Used to map NetBIOS names to IP addresses
• Methods used to resolve names:
   – NetBIOS Name Cache
   – NetBIOS Name Server (NBNS)
   – Local Broadcast
NetBEUI
• Enhanced version of NetBIOS
• Used by LAN manager, LAN server, Windows
  for workgroups, Windows 95 and Windows NT
• Adapted to other protocols such as IPX or
  TCP/IP as it does not support routing of
  messages to other networks
TCP/IP
• Two layer communication protocol used by Internet
• TCP provides connection-oriented reliable transport
  service
• Divides the message into smaller packets called
  segments
• IP is a connectionless and unreliable datagram protocol
  and provides no error checking
• IP transfers data in the form of packets called datagrams
TCP/IP Protocol Suite
             • Designed before OSI
               model
             • Consists of five layers
             • Provides independent
               protocols at each
               layer
Description of each layer - I
• Physical and Data link layer – standard and
  proprietary protocols are supported by these
  layers.
• Network layer – 1. IP –
  – 2. ARP –
  – 3. RARP –
  – 4. ICMP – used to send query and error reporting
    messages to the sender and not to correct them
  – 5. IGMP – Uses class D IP address
Description of each layer - II
• Transport layer – 1. UDP –
  – 2. TCP – divides data into segments each having a
    sequence number
  – 3. Stream Control Transmission Protocol (SCTP) –
    multiple streams of data can be transmitted
    simultaneously. Used over wireless network and
    transmission of multimedia data. Supports voice
    over IP and combines the best features of TCP and
    UDP
Description of each layer - III
• Application layer – 1. SMTP –
  – 2. FTP –
  – 3. DNS –
  – 4. SNMP – Based on client-server model
  – NFS – Allows different Operating systems to share
    files and disk storage
  – TFTP – Uses UDP to upload or download files and
    does not provide security features
TCP Segment Format
.
IPv4 Datagram Format
IP Datagram Fragmentation
• Fragmentation refers to breaking datagrams into pieces
• Maximum Transfer Unit (MTU) is maximum amount of
  data that frame can carry
• Datagram is fragmented when its size exceeds MTU of
  the network
• Fragments follow different paths to reach destination
ARP/RARP
• To deliver packet both physical and logical addresses are
  necessary
• Address Resolution Protocol (ARP) provides physical
  address when logical address is known
• Reverse Address Resolution Protocol (RARP) maps logical
  address to physical address
• RARP is useful when device is booted for first time
ICMP/IGMP
• Internet Control Message Protocol (ICMP) provides
  error reporting and query management mechanism
• ICMP handles problems occurring while packet
  transmission
• Internet Group Message Protocol (IGMP) manages
  multicasting and group membership of devices
ICMP Message Types
                     ICMP Messages
        Error Reporting              Query
  Destination                           Echo request
  Unreachable                             and reply
 Source Quench                       Timestamp request
                                         and reply
 Time Exceeded                         Address Mask
                                      Request and reply
Parameter Problem                     Router Solicitation
                                      and Advertisement
   Redirection
Error Reporting Messages
• ICMP is used for error reporting not for error correcting
  1. Destination Unreachable –
  2. Source Quench – used for flow control at network
  layer
  3. Time Exceeded -
  4. Parameter Problem – if there is an ambiguity in the
  header part
  5. Redirection – if the host forwards datagram destined
  for some other network to wrong router
Query Messages
• Echo Request and Reply – Ping command
• Timestamp request and reply –
• Address Mask request and reply – If a host
  knows the IP address but does not know the
  corresponding mask
• Router Solicitation and Advertisement – Used
  to determine whether the routers in the
  network are working properly
IGMP Message Types
                                IGMP Messages




                                 Membership
                Query                           Leave Report
                                   Report




General Query           Special Query
UDP
• User Datagram Protocol (UDP) provides connectionless
  process-to-process communication
• UDP packets are called user datagrams.
• User Datagram Format:
UDP Operation - I




Encapsulation               Decapsulation
UDP Operation - II




Client Queue          Server Queue
IPX/SPX
• Novell NetWare system uses IPX/SPX as communication
  protocol within networks
• IPX operates at Network layer for connectionless
  communication
• SPX operates at Transport layer for connection-oriented
  communication
• Together, IPX/SPX provides same services as TCP/IP
IPX/SPX Protocol Suite
IPX/SPX Naming Conventions
• IPX/SPX/NetBIOS Compatible Transport Protocol
  (NWLink) uses two types of IPX network numbers for
  routing purposes:
   – Internal network number – Mentioned as Internal network
     number in NWLink IPX/SPX/NetBIOS Compatible Transport
     Protocol Properties dialog box
     It’s a hexadecimal number with 1 to 8 digits (1 to
     FFFFFFFE)
   – External network number – Mentioned as Network
     number in Manual Frame Detection dialog box
HDLC/SDLC
• DLC protocols are two types: asynchronous and
  synchronous
• High Level Data Link Control (HDLC) and Synchronous
  Data Link Control (SDLC) are bit-oriented synchronous
  protocols in which data frames are interpreted as series
  of bits
• Both are useful for half-duplex and full-duplex
  communication
• HP adopted DLC protocol for use by network printers
• Windows XP still support DLC
HDLC Nodes and Link Configurations
• Types of HDLC nodes are:
   – Primary Station – transmits frames called commands to
     secondary stations
   – Secondary Station – send response frames to primary
     station
   – Combined Station
• Supported link configurations:
   – Unbalanced
   – Balanced
HDLC Data Transfer Modes
• Normal Response Mode (NRM) – Secondary station
  requires permission from primary station before sending
  data
• Asynchronous Response Mode (ARM) – Secondary
  station can transfer without permission from primary
  station
• Asynchronous Balanced Mode (ABM) – Either of the
  combined station can initiate the transmission
SDLC
• Bit-oriented protocol invented by IBM and similar to
  HDLC
• Only primary and secondary stations are used

                             Configurations




      Point-to-Point   Multipoint        Loop   Hub go-ahead
Protocols at Different Layers

   OSI Layers                       Protocols
Physical Layer      No protocols defined
Data Link Layer     HDLC, SDLC
Network Layer       IP, ICMP, IGMP, ARP, RARP, IPX

Transport Layer     NetBEUI, TCP, UDP, SPX
Session Layer       NetBIOS, SAP, SMTP, FTP, DNS, SNMP,

Presentation Layer NCP, RIP, NLSP, SMTP, FTP, DNS,
                     SNMP, NFS
Application Layer   SMTP, DNS, SNMP, NFS, TFTP

More Related Content

What's hot

User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
ITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemITFT_File system interface in Operating System
ITFT_File system interface in Operating System
Sneh Prabha
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
tcp ip protocols.ppt
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.ppt
ssuser3acfba
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
sonangrai
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
Rasan Samarasinghe
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
Joud Khattab
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Ravindra Raju Kolahalam
 
Nfs
NfsNfs
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTP
MahfuzRahman94
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
Sweta Kumari Barnwal
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
SDMCET DHARWAD
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 

What's hot (20)

User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
ITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemITFT_File system interface in Operating System
ITFT_File system interface in Operating System
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
tcp ip protocols.ppt
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.ppt
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Network switch
Network switchNetwork switch
Network switch
 
Application Layer
Application Layer Application Layer
Application Layer
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Nfs
NfsNfs
Nfs
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTP
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 

Viewers also liked

NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
Kak Yong
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]anil933
 
Protocols
ProtocolsProtocols
Protocols
Sonali Chawla
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Bandhe
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Osi model
Osi modelOsi model
Osi model
Online
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
Jaleel James
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
Ahmad Khalid Nasrat
 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
Abhi shreshtha
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
Mukesh Tekwani
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
IGZ Software house
 

Viewers also liked (20)

NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]
 
Protocols
ProtocolsProtocols
Protocols
 
Protocols
ProtocolsProtocols
Protocols
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Ip address
Ip addressIp address
Ip address
 
Osi model
Osi modelOsi model
Osi model
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 

Similar to Network protocol

Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
IUBAT
 
Tcp model by ananya shukla
Tcp model by ananya shuklaTcp model by ananya shukla
Tcp model by ananya shukla
ananya_shukla
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
Sam Bowne
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Sam Bowne
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Dhani Ahmad
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
Krishnkant Pandey
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
Sam Bowne
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
Taymoor Nazmy
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
APSU
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
Rehan ali
 
ENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdfENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdf
shaker402
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
BIT DURG
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
hiya123jes
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5

Similar to Network protocol (20)

Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
 
Tcp model by ananya shukla
Tcp model by ananya shuklaTcp model by ananya shukla
Tcp model by ananya shukla
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
ENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdfENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdf
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Unit04
Unit04Unit04
Unit04
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 

More from Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
Online
 
Functions
FunctionsFunctions
Functions
Online
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
Online
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
Online
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
Online
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
Online
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
Online
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
Online
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
Online
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Online
 
Application protocols
Application protocolsApplication protocols
Application protocols
Online
 
Addressing
AddressingAddressing
Addressing
Online
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
Online
 
Leadership
LeadershipLeadership
Leadership
Online
 

More from Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Network protocol

  • 2. Introducing Protocols • Set of predefined rules used by devices in network for data transfer • Network Protocols: – NetBIOS/NetBEUI – TCP/IP – ARP/RARP – ICMP/IGMP – UDP – IPX/SPX – HDLC/SDLC
  • 3. NetBIOS/NetBEUI • Developed by IBM and later adopted by Microsoft • Network Basic Input/Output System (NetBIOS) used for communication within LAN • Operates at Transport and Session layers of OSI model • NetBIOS Extended User Interface (NetBEUI) adds capabilities to NetBIOS and an advanced version of NetBIOS used in MS Windows OS • Widely used in Ethernet, Token Ring and Windows NT networks
  • 4. NetBIOS Services • Supports three distinct services: Name service for name registration and resolution, Session service for connection oriented communication and datagram service for connectionless communication NetBIOS Services Session Datagram Name Service Service Service
  • 5. Name Service • Implemented in Microsoft Windows as Windows Internet Name Service (WINS). • Provides means to application to register its NetBIOS name • NetBIOS names are 16 bytes length • Service uses UDP port 137 • Name Service functions include – Add Name – Add Group Name – Delete Name – Find Name
  • 6. Session Service Establishes session for data exchange between computers using TCP port 139 Session Establishment Process Session Termination Process
  • 7. Datagram Service • Uses the UDP port 138 and provides a connectionless and broadcast-oriented data communication between two devices. • Divides data in datagrams before sending • Datagram service functions include: – Send Datagram – Send Broadcast Datagram – Receive Datagram – Receive Broadcast Datagram
  • 8. NetBIOS Name Resolution • Used to map NetBIOS names to IP addresses • Methods used to resolve names: – NetBIOS Name Cache – NetBIOS Name Server (NBNS) – Local Broadcast
  • 9. NetBEUI • Enhanced version of NetBIOS • Used by LAN manager, LAN server, Windows for workgroups, Windows 95 and Windows NT • Adapted to other protocols such as IPX or TCP/IP as it does not support routing of messages to other networks
  • 10. TCP/IP • Two layer communication protocol used by Internet • TCP provides connection-oriented reliable transport service • Divides the message into smaller packets called segments • IP is a connectionless and unreliable datagram protocol and provides no error checking • IP transfers data in the form of packets called datagrams
  • 11. TCP/IP Protocol Suite • Designed before OSI model • Consists of five layers • Provides independent protocols at each layer
  • 12. Description of each layer - I • Physical and Data link layer – standard and proprietary protocols are supported by these layers. • Network layer – 1. IP – – 2. ARP – – 3. RARP – – 4. ICMP – used to send query and error reporting messages to the sender and not to correct them – 5. IGMP – Uses class D IP address
  • 13. Description of each layer - II • Transport layer – 1. UDP – – 2. TCP – divides data into segments each having a sequence number – 3. Stream Control Transmission Protocol (SCTP) – multiple streams of data can be transmitted simultaneously. Used over wireless network and transmission of multimedia data. Supports voice over IP and combines the best features of TCP and UDP
  • 14. Description of each layer - III • Application layer – 1. SMTP – – 2. FTP – – 3. DNS – – 4. SNMP – Based on client-server model – NFS – Allows different Operating systems to share files and disk storage – TFTP – Uses UDP to upload or download files and does not provide security features
  • 17. IP Datagram Fragmentation • Fragmentation refers to breaking datagrams into pieces • Maximum Transfer Unit (MTU) is maximum amount of data that frame can carry • Datagram is fragmented when its size exceeds MTU of the network • Fragments follow different paths to reach destination
  • 18. ARP/RARP • To deliver packet both physical and logical addresses are necessary • Address Resolution Protocol (ARP) provides physical address when logical address is known • Reverse Address Resolution Protocol (RARP) maps logical address to physical address • RARP is useful when device is booted for first time
  • 19. ICMP/IGMP • Internet Control Message Protocol (ICMP) provides error reporting and query management mechanism • ICMP handles problems occurring while packet transmission • Internet Group Message Protocol (IGMP) manages multicasting and group membership of devices
  • 20. ICMP Message Types ICMP Messages Error Reporting Query Destination Echo request Unreachable and reply Source Quench Timestamp request and reply Time Exceeded Address Mask Request and reply Parameter Problem Router Solicitation and Advertisement Redirection
  • 21. Error Reporting Messages • ICMP is used for error reporting not for error correcting 1. Destination Unreachable – 2. Source Quench – used for flow control at network layer 3. Time Exceeded - 4. Parameter Problem – if there is an ambiguity in the header part 5. Redirection – if the host forwards datagram destined for some other network to wrong router
  • 22. Query Messages • Echo Request and Reply – Ping command • Timestamp request and reply – • Address Mask request and reply – If a host knows the IP address but does not know the corresponding mask • Router Solicitation and Advertisement – Used to determine whether the routers in the network are working properly
  • 23. IGMP Message Types IGMP Messages Membership Query Leave Report Report General Query Special Query
  • 24. UDP • User Datagram Protocol (UDP) provides connectionless process-to-process communication • UDP packets are called user datagrams. • User Datagram Format:
  • 25. UDP Operation - I Encapsulation Decapsulation
  • 26. UDP Operation - II Client Queue Server Queue
  • 27. IPX/SPX • Novell NetWare system uses IPX/SPX as communication protocol within networks • IPX operates at Network layer for connectionless communication • SPX operates at Transport layer for connection-oriented communication • Together, IPX/SPX provides same services as TCP/IP
  • 29. IPX/SPX Naming Conventions • IPX/SPX/NetBIOS Compatible Transport Protocol (NWLink) uses two types of IPX network numbers for routing purposes: – Internal network number – Mentioned as Internal network number in NWLink IPX/SPX/NetBIOS Compatible Transport Protocol Properties dialog box It’s a hexadecimal number with 1 to 8 digits (1 to FFFFFFFE) – External network number – Mentioned as Network number in Manual Frame Detection dialog box
  • 30. HDLC/SDLC • DLC protocols are two types: asynchronous and synchronous • High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC) are bit-oriented synchronous protocols in which data frames are interpreted as series of bits • Both are useful for half-duplex and full-duplex communication • HP adopted DLC protocol for use by network printers • Windows XP still support DLC
  • 31. HDLC Nodes and Link Configurations • Types of HDLC nodes are: – Primary Station – transmits frames called commands to secondary stations – Secondary Station – send response frames to primary station – Combined Station • Supported link configurations: – Unbalanced – Balanced
  • 32. HDLC Data Transfer Modes • Normal Response Mode (NRM) – Secondary station requires permission from primary station before sending data • Asynchronous Response Mode (ARM) – Secondary station can transfer without permission from primary station • Asynchronous Balanced Mode (ABM) – Either of the combined station can initiate the transmission
  • 33. SDLC • Bit-oriented protocol invented by IBM and similar to HDLC • Only primary and secondary stations are used Configurations Point-to-Point Multipoint Loop Hub go-ahead
  • 34. Protocols at Different Layers OSI Layers Protocols Physical Layer No protocols defined Data Link Layer HDLC, SDLC Network Layer IP, ICMP, IGMP, ARP, RARP, IPX Transport Layer NetBEUI, TCP, UDP, SPX Session Layer NetBIOS, SAP, SMTP, FTP, DNS, SNMP, Presentation Layer NCP, RIP, NLSP, SMTP, FTP, DNS, SNMP, NFS Application Layer SMTP, DNS, SNMP, NFS, TFTP