SlideShare a Scribd company logo
1 of 47
Protocols
Chapter Four
The key features of a protocol
In the context of data networking, a protocol is a formal set of
rules and conventions that governs how computers exchange
information over a network medium.
The peer layers communicate by means of formatted blocks of data
that obey a set of rules or conventions known as a protocol. The
key features of protocol are:
Syntax – data block format
Semantics - control information & error handling
Timing - speed matching & sequencing
Types of Communication Models
There are two basic protocol models used in data communications
and computer networks.
I. TCP/IP model and
II. OSI reference model
I.TCP/IP Protocol Suite
TCP/IP stands for Transmission Control Protocol/
Internet Protocol.
It was developed by the Internet Engineering Task
Force(IETF) prior to the OSI model.
Therefore, the layers in the TCP/IP protocol suite do not
match exactly with those in the OSI model.
The TCP/IP protocol suite is defined as four software
layers built upon the hardware.
Layers in the TCP/IP Protocol Suite
Network Access Layer
At the bottom of the TCP/IP model, the Network Access
layer implements the data exchange between the host
and the network.
The equivalent of the Data Link and Physical layers of the
OSI model, the Network Access layer oversees hardware
addressing and defines protocols for the physical
transmission of data.
The reason TCP/IP became so popular is because there
were no set of physical layer specifications, so it could
run on any existing or future physical network.
Internet Layer
The Internet layer corresponds to the OSI’s Network layer,
designating the protocols relating to the logical
transmission of packets over the entire network.
It takes care of the addressing of hosts by giving them an
IP (Internet Protocol) address and handles the routing of
packets among multiple networks.
Host-to-Host/Transport layer
The Host-to-Host layer parallels the functions of the
OSI’s Transport layer, defining protocols for setting up
the level of transmission service for applications.
It tackles issues like creating reliable end-to-end
communication and ensuring the error-free delivery of
data.
It handles packet sequencing and maintains data
integrity.
Process/Application layer
These processes integrate the various activities and
duties spanning the focus of the OSI’s corresponding
top three layers (Application, Presentation, and
Session).
Controls user-interface specifications.
A vast array of protocols join forces at the TCP/IP
model’s Application layer.
TCP/IP Protocol Suite
II. The OSI Model
It was developed by the International Organization for
Standardization (ISO).
It was first introduced in the late 1970s.
It is a model for a computer protocol architecture and as
a framework for developing protocol standards.
An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model.
It comprises seven layers.
Summary of OSI Layers
TCP/IP and OSI Model
OSI and TCP/IP similarities
Both have layers.
Both have application layers, though they include very
different services.
Both have comparable transport and network layers.
Both assume packets are switched. This means that
individual packets may take different paths to reach the
same destination. This is contrasted with circuit-switched
networks where all the packets take the same path.
OSI and TCP/IP Differences
TCP/IP combines the application, presentation and session
layer issues into its application layer.
TCP/IP combines the OSI data link and physical layers into the
network access layer.
TCP/IP appears simpler because it has fewer layers.
TCP/IP protocols are the standards around which the Internet
developed, so the TCP/IP model gains credibility just because of
its protocols.
In contrast, networks are not usually built on the OSI protocol,
even though the OSI model is used as a guide.
Overview of familiar Protocols
Simple Network Management Protocol (SNMP)
Simple Network Management Protocol (SNMP) collects
and manipulates valuable network information.
 It gathers data by polling the devices on the network
from a network management station (NMS) and alert to
administrator.
This protocol can also stand as a watchdog over the
network, quickly notifying managers of any sudden turn
of events.
Hypertext Transfer Protocol (HTTP)
 It’s used to manage communications between web
browsers and web servers and opens the right resource
when you click a link, wherever that resource may actually
reside.
Your browser can understand what you need when you
enter a Uniform Resource Locator (URL), which we usually
refer to as a web address,e.g. http://www.google.com/
Web
browser
E.g.
Chrome
Web server
E.g. google
Internet protocols
E.g. http
Facilitate communication
Hypertext Transfer Protocol Secure (HTTPS)
Hypertext Transfer Protocol Secure (HTTPS) is also
known as Secure Hypertext Transfer Protocol. It uses
Secure Sockets Layer (SSL).
Sometimes you’ll see it referred to as SHTTP or S-HTTP,
which were slightly different protocols, but since
Microsoft supported HTTPS, it became the de facto
standard for securing web communication.
Domain Name Service (DNS)
An IP address identifies hosts on a network and the
Internet as well, but DNS was designed to make things
easier.
DNS allows users to use a domain name to specify an IP
address.
DNS resolves hostnames—specifically, Internet names,
such as www.amu.edu.et to Ip addresses like 10.145.8.10
DNS…
DNS resolves domain names to IP addresses and vice
versa
DNS Server 10.144.5.30
www.amu.edu.et
DNS…
The very last section of the domain is called its top-
level domain (TLD) name
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol (DHCP) assigns IP
addresses to hosts dynamically.
It allows for easier administration and works well in small
to very large network environments.
Many types of hard wares can be used as a DHCP server,
including a Cisco router.
A DHCP address conflict occurs when two hosts use the
same IP address.
Simple Mail Transfer Protocol (SMTP)
Governs the transmission of mail messages and attachments.
SMTP is used in the case of outgoing messages.
More powerful protocols such as POP3 and IMAP4 are needed
and available to manage incoming messages.
POP3(Post Office Protocol version 3) is the older protocol
whereas IMAP4(Internet Mail Access Protocol version 4) is the
more advanced protocol.
It allows a user on a remote machine to access the
resources of another machine.
Telnet is not secure because everything is by using plain
text.
Due to lack of encryption telnet is outdated technology.
It is largely used in local area networks, but not in the
internet.
SSH(Secure Shell) is the better alternative for Telnet as it
protects data from being attacked or stolen when
transferred over a network.
Telnet
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)actually lets users to transfer files.
Users must be subjected to an authentication login that’s
usually secured with passwords and usernames.
FTP’s functions are limited to listing and manipulating
directories, typing file contents, and copying files between
hosts.
Not a secure protocol since a data being transferred is not
encrypted(i.e. plain text).
A more secured transfer protocol should be used; that is
Secure FTP(SFTP).
Trivial File Transfer Protocol (TFTP)
TFTP is a very simple file transfer protocol.
It is mainly used to transfer files within a local area network,
but not used to transfer files over the internet due to security
issues.
TFTP doesn’t offer the abundance of functions that FTP does
because it has no directory-browsing abilities, meaning that it
can only send and receive files.
 There’s no authentication as with FTP, so it’s even more
insecure, and few sites support it because of the inherent
security risks.
TCP(Transmission Control Protocol)
TCP takes large blocks of information from an application
and breaks them into segments.
It numbers and sequences each segment to keep the order
of the segments.
After these segments are sent on the transmitting host, TCP
waits for an acknowledgment of the receiving end’s.
It is a reliable protocol, in which it provides a guaranteed
delivery.
Retransmits any segments that aren’t acknowledged.
It is Connection oriented means that a virtual connection is
established before any user data is transferred.
TCP…
 TCP can also recognize duplicate messages and will discard
them appropriately.
 If the sending computer is transmitting too fast for the
receiving computer, TCP can employ flow control
mechanisms to slow data transfer.
All these characteristics makes TCP an end-to-end reliable
transport layer protocol.
User Datagram Protocol (UDP)
User Datagram Protocol (UDP)is basically the scaled-down
model of TCP, which is why UDP is sometimes referred to as a
thin protocol.
A thin protocol doesn’t take up a lot of room—or in this
case, require much bandwidth on a network.
UDP does not sequence the segments and does not care
about the order in which the segments arrive at the
destination.
UDP just sends the segments off and forgets about them.
UDP …
It doesn’t follow segments, check up on them, or even
allow for an acknowledgment of safe arrival.
Because of this, it’s referred to as an unreliable
protocol.
This does not mean that UDP is ineffective, only that it
doesn’t deal with reliability issues at all.
Furthermore, UDP doesn’t create a virtual circuit or
doesn’t contact the destination before delivering
information to it.
Because of this, it’s also considered a connectionless
protocol.
UDP in short
Minimum overhead.
Used to send short messages.
Not reliable as TCP (out of order, missing datagram,
duplicate datagram).
Lack of flow control and error control
Faster and efficient.
Internet Protocol (IP)
The Internet Protocol (IP) is a protocol, or set of rules, for
routing and addressing packets of data so that they can travel
across networks and arrive at the correct destination.
IP is the network layer communications protocol for
relaying datagrams across network boundaries.
Its routing function enables internetworking, and essentially
establishes the Internet.
IP has the task of delivering packets from the source host to
the destination host solely based on the IP addresses in the
packet headers.
Internet Protocol versions: IPv4, IPv6.
Address Resolution Protocol(ARP)
ARP maps 32-bit logical (IP) address to 48-bit physical
address(MAC address).
An Ip address is used to locate a device on a network,
whereas MAC address is what identifies the actual device.
Host or router transmit IP datagram packet containing
logical address obtained from DNS.
Sender knows logical address(IP) of receiver but not its
physical address(MAC) so ARP maps the logical address of
the receiver to physical address it obtains from receiver.
ARP Retrieves the physical address of the receiver.
ARP…
R1 R2 R3
192.168.1.2 192.168.1.4
192.168.1.5
Sends ARP query packet
Contains
Logical address of
sender
(192.168.1.2)
Logical address of
receiver
(192.168.1.5)
Sends ARP response packet
Contains
Logical address of
receiver
(192.168.1.5)
physical address of
receiver
(00:04:ff:ff:ff:d0)
 The receiver sends ARP response packet which contains the logical
(IP) address and physical address of the receiver.
 ARP response packet is unicast directly to the sender whose
physical address is present in the ARP query packet.
Sender Receiver
Intended
receiver
Reverse Address Resolution Protocol (RARP)
RARP is a TCP/IP protocol that allows any host to obtain its IP
address from the server.
RARP perform the following steps to obtain an IP address
from the server.
 The sender broadcast the RARP request to all hosts.
 The RARP request packet contains the physical address
of the sender.
 All the host receiving the RARP request process it, but
the authorized server only replies to the requesting host.
RARP…
R1 R2
R3
192.168.1.4
192.168.1.5
Sender broadcast RARP request
Contains
Physical address of
sender
(00:04:ff:ff:ff:d0)
Sends RARP response packet
Contains
The authorized
RARP server
replies to
requesting host
which contains IP
address for
(192.168.1.2)
RARP maps 48-bit physical address(MAC address) to 32-bit
logical (IP) address.
Sender
Receiver
authorized
RARP server
00:04:ff:ff:ff:d0
Internet Control Message Protocol(ICMP)
Used to report errors with delivery of IP data.
E.g. if particular service or host not reachable or to
check routers are correctly routing .
ICMP uses Ping tool to check host if it is reachable and
how long it takes to reach.
Error reporting, but not error correction.
Two types of messages
Error reporting message
Problems with router or host e.g. destination
unreachable, time exceeded, parameters problem
Query message
Help in getting specific information. e.g. neighbors
Internet Group Management Protocol(IGMP)
IGMP is a protocol that allows several devices to share
one IP address so they can all receive the same data.
IGMP is a network layer protocol used to set up
multicasting on networks that use the Internet Protocol
version 4 (IPv4).
Protocol that manages group membership.
Provides information to multicast routers about the
membership status of hosts.
Thank you!!

More Related Content

Similar to Ch4 Protocols.pptx

HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Please help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdfPlease help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdflejeunehayneswowel96
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control ProtocolAliHamza410
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference ModelJohnson Ubah
 

Similar to Ch4 Protocols.pptx (20)

HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Please help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdfPlease help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdf
 
Osi model
Osi modelOsi model
Osi model
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Internet1
Internet1Internet1
Internet1
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 

More from azmerawAnna1

Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdfEthiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdfazmerawAnna1
 
ADBMS_ASSIGNMENT_PPT1[1] (2).pptx
ADBMS_ASSIGNMENT_PPT1[1] (2).pptxADBMS_ASSIGNMENT_PPT1[1] (2).pptx
ADBMS_ASSIGNMENT_PPT1[1] (2).pptxazmerawAnna1
 
Hema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptHema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptazmerawAnna1
 
Hema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptHema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptazmerawAnna1
 
CITIZENSHIP MODULE pdfww.docx
CITIZENSHIP MODULE pdfww.docxCITIZENSHIP MODULE pdfww.docx
CITIZENSHIP MODULE pdfww.docxazmerawAnna1
 
Extension Final year Project Advising.docx
Extension Final year Project Advising.docxExtension Final year Project Advising.docx
Extension Final year Project Advising.docxazmerawAnna1
 
Extension Final year Project Advising for IT STUDENT.docx
Extension Final year Project Advising  for IT STUDENT.docxExtension Final year Project Advising  for IT STUDENT.docx
Extension Final year Project Advising for IT STUDENT.docxazmerawAnna1
 
Anteneh Asha Ade MBA RESEACH THEISES.docx
Anteneh Asha Ade MBA RESEACH THEISES.docxAnteneh Asha Ade MBA RESEACH THEISES.docx
Anteneh Asha Ade MBA RESEACH THEISES.docxazmerawAnna1
 

More from azmerawAnna1 (9)

Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdfEthiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
 
ADBMS_ASSIGNMENT_PPT1[1] (2).pptx
ADBMS_ASSIGNMENT_PPT1[1] (2).pptxADBMS_ASSIGNMENT_PPT1[1] (2).pptx
ADBMS_ASSIGNMENT_PPT1[1] (2).pptx
 
Hema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptHema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.ppt
 
Hema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptHema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.ppt
 
CITIZENSHIP MODULE pdfww.docx
CITIZENSHIP MODULE pdfww.docxCITIZENSHIP MODULE pdfww.docx
CITIZENSHIP MODULE pdfww.docx
 
Extension Final year Project Advising.docx
Extension Final year Project Advising.docxExtension Final year Project Advising.docx
Extension Final year Project Advising.docx
 
Extension Final year Project Advising for IT STUDENT.docx
Extension Final year Project Advising  for IT STUDENT.docxExtension Final year Project Advising  for IT STUDENT.docx
Extension Final year Project Advising for IT STUDENT.docx
 
Anteneh Asha Ade MBA RESEACH THEISES.docx
Anteneh Asha Ade MBA RESEACH THEISES.docxAnteneh Asha Ade MBA RESEACH THEISES.docx
Anteneh Asha Ade MBA RESEACH THEISES.docx
 
Wude.dox[1].docx
Wude.dox[1].docxWude.dox[1].docx
Wude.dox[1].docx
 

Recently uploaded

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...software pro Development
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Recently uploaded (20)

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

Ch4 Protocols.pptx

  • 2. The key features of a protocol In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. The peer layers communicate by means of formatted blocks of data that obey a set of rules or conventions known as a protocol. The key features of protocol are: Syntax – data block format Semantics - control information & error handling Timing - speed matching & sequencing
  • 3. Types of Communication Models There are two basic protocol models used in data communications and computer networks. I. TCP/IP model and II. OSI reference model
  • 4. I.TCP/IP Protocol Suite TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It was developed by the Internet Engineering Task Force(IETF) prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The TCP/IP protocol suite is defined as four software layers built upon the hardware.
  • 5. Layers in the TCP/IP Protocol Suite
  • 6. Network Access Layer At the bottom of the TCP/IP model, the Network Access layer implements the data exchange between the host and the network. The equivalent of the Data Link and Physical layers of the OSI model, the Network Access layer oversees hardware addressing and defines protocols for the physical transmission of data. The reason TCP/IP became so popular is because there were no set of physical layer specifications, so it could run on any existing or future physical network.
  • 7. Internet Layer The Internet layer corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network. It takes care of the addressing of hosts by giving them an IP (Internet Protocol) address and handles the routing of packets among multiple networks.
  • 8. Host-to-Host/Transport layer The Host-to-Host layer parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications. It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.
  • 9. Process/Application layer These processes integrate the various activities and duties spanning the focus of the OSI’s corresponding top three layers (Application, Presentation, and Session). Controls user-interface specifications. A vast array of protocols join forces at the TCP/IP model’s Application layer.
  • 11. II. The OSI Model It was developed by the International Organization for Standardization (ISO). It was first introduced in the late 1970s. It is a model for a computer protocol architecture and as a framework for developing protocol standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It comprises seven layers.
  • 12. Summary of OSI Layers
  • 13. TCP/IP and OSI Model
  • 14. OSI and TCP/IP similarities Both have layers. Both have application layers, though they include very different services. Both have comparable transport and network layers. Both assume packets are switched. This means that individual packets may take different paths to reach the same destination. This is contrasted with circuit-switched networks where all the packets take the same path.
  • 15. OSI and TCP/IP Differences TCP/IP combines the application, presentation and session layer issues into its application layer. TCP/IP combines the OSI data link and physical layers into the network access layer. TCP/IP appears simpler because it has fewer layers. TCP/IP protocols are the standards around which the Internet developed, so the TCP/IP model gains credibility just because of its protocols. In contrast, networks are not usually built on the OSI protocol, even though the OSI model is used as a guide.
  • 16. Overview of familiar Protocols
  • 17. Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) collects and manipulates valuable network information.  It gathers data by polling the devices on the network from a network management station (NMS) and alert to administrator. This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events.
  • 18.
  • 19. Hypertext Transfer Protocol (HTTP)  It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside. Your browser can understand what you need when you enter a Uniform Resource Locator (URL), which we usually refer to as a web address,e.g. http://www.google.com/ Web browser E.g. Chrome Web server E.g. google Internet protocols E.g. http Facilitate communication
  • 20. Hypertext Transfer Protocol Secure (HTTPS) Hypertext Transfer Protocol Secure (HTTPS) is also known as Secure Hypertext Transfer Protocol. It uses Secure Sockets Layer (SSL). Sometimes you’ll see it referred to as SHTTP or S-HTTP, which were slightly different protocols, but since Microsoft supported HTTPS, it became the de facto standard for securing web communication.
  • 21. Domain Name Service (DNS) An IP address identifies hosts on a network and the Internet as well, but DNS was designed to make things easier. DNS allows users to use a domain name to specify an IP address. DNS resolves hostnames—specifically, Internet names, such as www.amu.edu.et to Ip addresses like 10.145.8.10
  • 22. DNS… DNS resolves domain names to IP addresses and vice versa DNS Server 10.144.5.30 www.amu.edu.et
  • 23. DNS… The very last section of the domain is called its top- level domain (TLD) name
  • 24. Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts dynamically. It allows for easier administration and works well in small to very large network environments. Many types of hard wares can be used as a DHCP server, including a Cisco router. A DHCP address conflict occurs when two hosts use the same IP address.
  • 25.
  • 26. Simple Mail Transfer Protocol (SMTP) Governs the transmission of mail messages and attachments. SMTP is used in the case of outgoing messages. More powerful protocols such as POP3 and IMAP4 are needed and available to manage incoming messages. POP3(Post Office Protocol version 3) is the older protocol whereas IMAP4(Internet Mail Access Protocol version 4) is the more advanced protocol.
  • 27. It allows a user on a remote machine to access the resources of another machine. Telnet is not secure because everything is by using plain text. Due to lack of encryption telnet is outdated technology. It is largely used in local area networks, but not in the internet. SSH(Secure Shell) is the better alternative for Telnet as it protects data from being attacked or stolen when transferred over a network. Telnet
  • 28. File Transfer Protocol (FTP) File Transfer Protocol (FTP)actually lets users to transfer files. Users must be subjected to an authentication login that’s usually secured with passwords and usernames. FTP’s functions are limited to listing and manipulating directories, typing file contents, and copying files between hosts. Not a secure protocol since a data being transferred is not encrypted(i.e. plain text). A more secured transfer protocol should be used; that is Secure FTP(SFTP).
  • 29.
  • 30. Trivial File Transfer Protocol (TFTP) TFTP is a very simple file transfer protocol. It is mainly used to transfer files within a local area network, but not used to transfer files over the internet due to security issues. TFTP doesn’t offer the abundance of functions that FTP does because it has no directory-browsing abilities, meaning that it can only send and receive files.  There’s no authentication as with FTP, so it’s even more insecure, and few sites support it because of the inherent security risks.
  • 31.
  • 32. TCP(Transmission Control Protocol) TCP takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment to keep the order of the segments. After these segments are sent on the transmitting host, TCP waits for an acknowledgment of the receiving end’s. It is a reliable protocol, in which it provides a guaranteed delivery. Retransmits any segments that aren’t acknowledged. It is Connection oriented means that a virtual connection is established before any user data is transferred.
  • 33. TCP…  TCP can also recognize duplicate messages and will discard them appropriately.  If the sending computer is transmitting too fast for the receiving computer, TCP can employ flow control mechanisms to slow data transfer. All these characteristics makes TCP an end-to-end reliable transport layer protocol.
  • 34. User Datagram Protocol (UDP) User Datagram Protocol (UDP)is basically the scaled-down model of TCP, which is why UDP is sometimes referred to as a thin protocol. A thin protocol doesn’t take up a lot of room—or in this case, require much bandwidth on a network. UDP does not sequence the segments and does not care about the order in which the segments arrive at the destination. UDP just sends the segments off and forgets about them.
  • 35. UDP … It doesn’t follow segments, check up on them, or even allow for an acknowledgment of safe arrival. Because of this, it’s referred to as an unreliable protocol. This does not mean that UDP is ineffective, only that it doesn’t deal with reliability issues at all. Furthermore, UDP doesn’t create a virtual circuit or doesn’t contact the destination before delivering information to it. Because of this, it’s also considered a connectionless protocol.
  • 36. UDP in short Minimum overhead. Used to send short messages. Not reliable as TCP (out of order, missing datagram, duplicate datagram). Lack of flow control and error control Faster and efficient.
  • 37.
  • 38. Internet Protocol (IP) The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination. IP is the network layer communications protocol for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. Internet Protocol versions: IPv4, IPv6.
  • 39. Address Resolution Protocol(ARP) ARP maps 32-bit logical (IP) address to 48-bit physical address(MAC address). An Ip address is used to locate a device on a network, whereas MAC address is what identifies the actual device. Host or router transmit IP datagram packet containing logical address obtained from DNS. Sender knows logical address(IP) of receiver but not its physical address(MAC) so ARP maps the logical address of the receiver to physical address it obtains from receiver. ARP Retrieves the physical address of the receiver.
  • 40.
  • 41. ARP… R1 R2 R3 192.168.1.2 192.168.1.4 192.168.1.5 Sends ARP query packet Contains Logical address of sender (192.168.1.2) Logical address of receiver (192.168.1.5) Sends ARP response packet Contains Logical address of receiver (192.168.1.5) physical address of receiver (00:04:ff:ff:ff:d0)  The receiver sends ARP response packet which contains the logical (IP) address and physical address of the receiver.  ARP response packet is unicast directly to the sender whose physical address is present in the ARP query packet. Sender Receiver Intended receiver
  • 42. Reverse Address Resolution Protocol (RARP) RARP is a TCP/IP protocol that allows any host to obtain its IP address from the server. RARP perform the following steps to obtain an IP address from the server.  The sender broadcast the RARP request to all hosts.  The RARP request packet contains the physical address of the sender.  All the host receiving the RARP request process it, but the authorized server only replies to the requesting host.
  • 43. RARP… R1 R2 R3 192.168.1.4 192.168.1.5 Sender broadcast RARP request Contains Physical address of sender (00:04:ff:ff:ff:d0) Sends RARP response packet Contains The authorized RARP server replies to requesting host which contains IP address for (192.168.1.2) RARP maps 48-bit physical address(MAC address) to 32-bit logical (IP) address. Sender Receiver authorized RARP server 00:04:ff:ff:ff:d0
  • 44. Internet Control Message Protocol(ICMP) Used to report errors with delivery of IP data. E.g. if particular service or host not reachable or to check routers are correctly routing . ICMP uses Ping tool to check host if it is reachable and how long it takes to reach. Error reporting, but not error correction. Two types of messages Error reporting message Problems with router or host e.g. destination unreachable, time exceeded, parameters problem Query message Help in getting specific information. e.g. neighbors
  • 45.
  • 46. Internet Group Management Protocol(IGMP) IGMP is a protocol that allows several devices to share one IP address so they can all receive the same data. IGMP is a network layer protocol used to set up multicasting on networks that use the Internet Protocol version 4 (IPv4). Protocol that manages group membership. Provides information to multicast routers about the membership status of hosts.