Professional Documents
Culture Documents
IS 103 Chapter 4
IS 103 Chapter 4
Learning module in
IS-103
IT Infrastructure
& Networking
Unit 3
Learning Objectives:
Define packets and their importance to data communication
Identify the functions of protocols in a network
Have deep understanding about layered architecture of protocols
Give the difference between routable and non-routable protocols
Give the difference between connectionless and connection-oriented protocols
Describe the common protocols found in various networks and their
implementation
UNDERSTANDING PACKETS
Packets and protocols are the basic elements of data transmission over the network. Without
them, networks will be useless. Packets (also known as datagram, frame or cell) and protocols allow
different applications to communicate with any device on the network. Packets contain information
about the source and destination of the data as well as other control information, while Protocols are
used to encapsulate those data and information. Different network configuration follow different
protocols. And one of the important considerations in setting up a network is choosing protocols that
best fulfill the needs of the environment.
Packets carry data from one point to another with the help of protocols. During the process,
protocols require that packets contain information that will ensure successful transmission of data.
Protocol define structure of packet. This is very essential because if a packet is structured
incorrectly, it is considered corrupted and ignored by the receiving device. As we have learned, packets
may vary in size and structure, but generally, it includes a header followed by a payload (data) and an
optional trailer (footer).
NETWORK PROTOCOLS
Network protocols may use one or more protocols depending on the requirement and need of
the devices in the network. In general, a protocol is a set of rules that define how machines on a
network communicate. In order to converse, devices must agree on a common protocol and understand
the rule in these protocols for a successful transmission.
Protocols may be grouped together to enhance their functionalities- that group is also known as
protocol suite. Most commonly known protocol suites are Internet Packet Exchange (IPX) and
Sequenced Packet Exchange (SPX), the Internet TCP/IP protocol suite, NetBeui (NetBIOS Extended User
Interface) and AppleTalk.
Functions of Protocols
Protocol function can be grouped into the following categories:
1. Segmentation and reassembly- the breaking up of message into Packet Data Units (PDU) at the
sender and putting them back into a message at the receiver end.
2. Encapsulation- the addition of control information such as addresses; error-detecting; and
protocol control.
3. Connection control- the management of connectionless and connection –oriented data
transfer.
4. Ordered delivery- ensured that PDUs will arrive at the receiver in the order as they left the
sender.
5. Flow control- a function performed by the receiving device to limit the amount or rate of data
that is sent by a transmitting device.
6. Error control- the techniques used to guard against loss or damage of data and control
information.
7. Synchronization- ensures that all of the process during communication happen in proper
timing.
8. Addressing- allows devices in the network to identify one another.
9. Multiplexing- used to permit simultaneous connections using connection names and port
names.
10. Transmission services- provides priority assignment and security to devices during
transmission.
APPLICATION
PRESENTATION
SESSION
Application Protocols
TRANSPORT
Transport Protocols
NETWORK
Network Protocols
DATA LINK
PHYSICAL
Data Link Protocols
SMB is a high-level file—sharing protocol jointly developed by Microsoft, IBM, and Intel for
passing data between computers on a network. Microsoft Windows and OS/2 use Server Management
Block (SMB). Many UNIX operating system also support it. SMB resides in the Presentation Layer of the
OSI model, and provides a transparent connection to shares resources for the user. SMB is used
between clients and servers to do the following:
a) Open and close connections between client redirections and shared network resources.
b) Locate, read, and write to files shared on a server.
c) Locate and print to print queues that are shared on a server
NetBIOS- is a distinct Session Layer specification that allows distributed applications to access each
others network services independent of the transport protocol used. It acts as an interface for
application on the network. Most file sharing and administration done on Microsoft networks use the
NetBIOS interface on top of TCP/IP or IPX/SPX.
NetBIOS provides peer-to-peer application support in a small LAN. Each computer in a NetBIOS
LAN is identified by 15-character name, which is being a broadcast periodically on the LAN. Each
computer keeps a list of the NetBIOS names and hardware addresses to assist in communication.
NetBEUI (pronounced net-buoy)- is a networking non-routable protocol used for workgroup-size
Microsoft area networks (LAN)s with up to 200 stations. NetBEUI is an extension of the NetBIOS
protocol. It is a fast and efficient protocol with low overhead that supports both connection-oriented
communication and connectionless communication. NetBEUI is self-tuning and implements flow control
and error detection. It defines a framing mechanism at the transport layer of the OSI.
The main advantages of NetBEUI are its speed and ease of configuration. NetBEUI is one of the
fastest protocols you can use to share files. Configuration is simple because all that is needed is a
computer name- no network or logical addresses are required. NetBEUI relies more heavily on broadcast
packets.
Network Driver Interface Specification (NDIS)- provides a uniform programming interface between NIC
drivers and network protocols. NDIS was developed jointly by Microsoft and 3Com in 1989 and has gone
through a series of revisions. The most recent versions allow one NIC to be bound to many protocols
(which is ideal for heterogeneous networks) or allow one protocol to run on a system with multiple NICs
(which helps increase network bandwidth for heavily used servers).
The NIC and the driver provide the services corresponding to the data link layer. For the LLC
sublayer, the software provides the services while services for the MAC sublayer are furnished the NIC.
The TCP/IP Protocol Suite
Transmission Control Protocol/Internet Protocol (TCP/IP)- is an industry standard protocol
suite designed for wide are networks (WANs). It was developed by the U.S. Department of Defense
(DoD) in the 1970s and 1980s to test the idea of keeping communications open even during the war. The
initial network was called ARPANet which is named after the project name- Advanced Research Project
Agency (ARPA). TCP/IP is a routable protocol that is suitable for connecting dissimilar systems (such as
Microsoft Windows and UNIX) in heterogeneous networks, and it is the protocol of the worldwide
network known as the internet.
TCP/IP has also become the protocol of choice for most companies for the following reasons:
a) It is non-proprietary
b) It is compatible to almost any network software or equipment
c) It enables connections of multiple LANs
d) It is highly extendible
TCP/IP and the OSI Model
The architecture of the TCP/IP protocol suite has four layers that map loosely to the seven-layer
OSI. The TCP/IP model is sometimes called the DoD model because it was developed in connection with
the ARPANet Department of defense project.
The four layers can be loosely matched to the OSI model in the following ways:
a) Application layer protocols- they are responsible for application-level access to TCP/IP
networking services. These include:
Dynamic Host Configuration Protocol (DHCP)
Domain Name System (DNS)
HyperText Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Simple Network Management Protocol (SNMP)
b) Transport layer protocols- they establish communication through connection-oriented sessions
and connectionless broadcasts. Almost all devices on a TCP/IP network are considered hosts,
whether they’re workstation, servers, or network-attached printers. Protocols at this layer
include:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
c) Internet layer protocols- this layer nearly matches to the Network layer of the OSI model. They
are responsible for routing and encapsulation into IP packets Protocols at his layer include:
Internet Protocol (IP)
Address Resolution Protocol (ARP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
d) Network layer protocols- this layer corresponds to the Physical and Data Links Layers of the OSI
model. They place frames on the network. These protocols include:
LAN architectures
Ethernet
Token Ring
WAN Telecommunication service technologies
Plain Old Telephone Service (POTS)
Integrated Services Digital Network (ISDN)
Asynchronous Transfer Mode (ATM)
An entire IPX network address is thus 4+6=10 bytes long. IPX packets are assigned a 16-bit (2-
bytes) socket number to identify the networking service they are communicating with.
Example of networking services are Network Control Protocol (NCP), Service Advertising Protocol (SAP),
or Routing Information Protocol (RIP). Thus, the following 12-byte triple completely identifies the
networking service that a packet is communicating for.
{ network number, node address, socket number }
Sequenced Packet Exchange (SPX) is mainly used when a connection is made across
internetwork device such as a router, or to a print server to service a printing request. SPX uses
acknowledgements to ensure delivery. SPX also established virtual circuits, called connection, between
devices.
Network Link Services Protocol (NLSP) is a more advanced routing protocol than RIP. Instead of
using a simple distance vector scheme, it uses a link state routing mechanism to choose the best route.
This protocol observes the same benefits and draw backs as the OSPF protocol of TCP/IP.
Upper-layer IPX/SPX Protocols
The two upper-layer protocols in the IPX/SPX suite for use with NetWare are:
a. NetWare Core Protocol (NCP)- corresponds to the Transport, Session, Presentation, and
Application layers of the OSI model.
b. Service Access Protocol (SAP)- corresponds to the Session and Application layers of the OSI
model.
Netware Core Protocol (NCP) is an upper-layer protocol that services requests from applications such as
the NetWare shell. NCP supports file and print services, management of network and host names, and
accounting and security functions. NCP functions at the following four layers of the OSI model:
1. Transport layer- connection services with segment sequencing, error control, and flow control.
2. Session layer- session control
3. Presentation layer- character translation
4. Application layer- application and service interface to end-user application.
Service Access Protocol (SAP) enables NetWare servers to advertise themselves as present on the
network and allows client to find and access resources. This is possible with the use of SAP packet that
contains information about the resource. The SAP packet is sent out to the network at a set interval
without configuration. This proves to be very useful but SAP packets can quickly overrun a large
network. Step must be taken to filter out the excessive SAP packets and keep them down to a
manageable level.
Other Protocol Suites
Apple Talk is a workgroup-level networking technology that supports up to 254 network nodes
per physical network. In the more recent Apple Talk Phase II, the data-link protocols supported include
Ether Talk, Token Ring, and Fiber Distributed Data Interface (FDDI) networks.
Addresses of machines on AppleTalk networks are randomly self-assigned when the machine is
first attached to the network, and then broadcast to ensure they are not already being used. This
dynamic addressing feature is based on the AppleTalk Address Resolution Protocol (AARP). AppleTalk
internetworks logically partitioned into zones whose main function is to make network resources easier
for users to access. A zone is a logical representation of AppleTalk network nodes that can span multiple
physical networks. The mapping between zones and network numbers is maintained by the Zone
Information Protocol (ZIP), which creates Zone Information Tables (ZITs) that are stored on AppleTalk
routers.
AppleTalk is a suite of networking protocols that work together to provide file and print sharing
services to Macintosh networks.
Digital Network Architecture Protocols
Digital Equipment Corporation (DEC) developed the Digital Network Architecture (DNA) in 1974. It is
used when connecting to DECs mainframe computers.
Ethernet Protocol
Was originally developed by DEC, Intel, and Xerox. It was updated later to version 2, which is the
standard Ethernet that other networks use. Characteristics of Ethernet version 2 include Manchester
encoding bandwidth of 10Mbps and CSMA/CD for media access. The later IEEE 802.3 standard was
developed from the Ethernet v2 standard but with one important format change, involving the packet
header information that made it in incompatible with the earlier standard.
Higher-level Data Link Control (HLDC)
It defines a method for encapsulating or formatting data into frame for synchronous
transmission over synchronous serial WAN links to remote sites. HDLC is a bit-stream protocol (bit
streams are not broken into individual characters) that uses a 32-bit checksum for error correction and
supports full-duplex communication. HDLC frames consist of a flag byte followed by address and control
information, data bits, and a CRC byte. A control field at the start of a frame is used for establishing and
terminating data link connections.
Digital Data Communications Message Protocol (DDCMP)
It is a protocol from the original DNA specifications that is responsible for transmitting data to
end stations. A frame in DDCMP is known a message. DDCMP was designed for WAN links and allows
synchronous or asynchronous transmission. The dialogs are either full or half-duplex, while connections
are either point-to-point or multipoint. DDCMP includes data link layer flow control and error checking.
IP ADDRESSING
Before two computers on a network can communicate, they need to know how to contact each
other. Just as every computer has MAC (physical) address that is encoded into the network card;
computers also have IP (logical) address. This is an address that is usually set by the administrator,
through the network protocol suite sometimes automatically sets in.
Every host on a TCP/IP network is given an IP address. This address is a unique 4-byte (32-bit)
address on dotted notation. Each byte or octet, is represented by a decimal number from 0 to 255 and
separated by period. Although 8 bits have 256 possible combinations, the numbers 0 and 255 are
reserved for broadcasts as stated earlier. Both networks and hosts (individual computers) can use the
umbers 1 through 254 only. Part of the IP address indicates which network the computer is located,
whereas the remainder of the address represent the hosts ID of that computer.
Originally, IP addresses are divided into classes, which are used to segment the pool of
addresses into sizes corresponding to various organizations sizes. When an organization requests a
range of IP addresses, they receive a block from one of these classes:
Class A addresses have one byte for the network and three bytes for the host. It is intended for use by
extremely large corporations. The first byte of Class A network addresses is always between 1 and 126,
and is assigned by InterNIC. The Class A address 127 is a special address. It is interpreted by networks as
a loopback address. Any packet sent to an address beginning with 127 is treated as if the destination is
the address of the local device sending the packet.
Class B addresses have 2 bytes for the network address and the remaining two for the host address. The
first byte of Class B addresses is always between 128 and 191.
Class C addresses are the most common. They use the first 3 bytes of the address for the network
portion and the final byte for the host. This allows for a great number of network addresses to be given
out, with 254 hosts on each network. Class C addresses always have the first byte between 192 and 223.
The network addresses of 128 and 224 and up are used for special purpose and experimentation. Most
small business and organizations use this class.
Identify which part of an address denotes the network and which part is the host, IP uses the
addresses ‘subnet mask’. In subnet mask, the number 255 signifies the network section, while the host
section uses 0. For proper operation, all computers on a networks must have the same subnet mask. The
table below summarizes the subnet mask for each of the three classes.
Class Subnet Mask
A 255.0.0.0
B 255.255.0.0
C 255.255.255.0
The figure below show how to determine the network ID from the host ID using the subnet mask.
192. 168. 7. 14
Class C Network ID: 192.168.7
255. 255. 255. 0
Host ID: 14
IP addresses are handed out by a single organization, called Internet Network Information
Center (InterNIC), so each computer has its own unique address. However, organizations should request
their IP addresses from the provider to which they are connecting.
With the increasing popularity of the Internet and the over-growing number of networks
worldwide, a new method of addressing have been adopted by InterINC to manage all available
addresses efficiently. The method is called Classless Inter-Domain Routing (CIDR). Today, when an
address is assigned, the network and host demarcation is no longer made along octet boundaries; but
rather, it is made a specific number of bits from the beginning of the address.
For example, with the old method, a class C network section is 24 bits. Using CIDR, InterNIC can
assign an address whose network section is 26 bits. This method provides for more networks but fewer
hosts on each network. With this case, we could make our network more manageable, more secured
and more less prone to traffic congestion. When classless addresses are assigned, the number of bits in
the network section is noted with a slash symbol (/8 for Class A address, /16 for Class B address, /24 for
Class C).
For example: a company with a small number of computers to attach to the internet can be provided
with an address of 195.211.178.39/26
Originally, the address 195.211.178.39 has a subnet mask of 255.255.255.0, represented in
binary form as 1111 1111. 1111 1111. 1111 1111. 0000 0000. But because, of the indicated /26
notation, we have to allocate now 26 bits of “1” from the leftmost bit as our new Network ID instead of
the standard twenty-four (24) bits for this Class C address. The new Subnet Mask (CID) now is:
1111 1111. 1111 1111. 1111 1111. 1100 0000
Or
255.255.255.192
We could say that we borrowed two (2) bits from our Host ID to be added to our Network ID.
These two bits can produces additional four (2)2 sets of IP addresses called as the subnet addresses.
From the changes is our network ID, these are the new sets of IP addresses we can derive from
CIDR implementation:
.1100 0000
0000 0000 -0
0100 0000 -64
1000 0000 -.128
1100 0000 -.192
Note:
195.211.178.0, 195.211.178.64, 195.211.178.128 and 195. 178.211. 192 are reserved addresses
because they would be used as the network addresses.
195.211.178.63, 195.211.178.127, 195.211.178.191 and 195.178.211.255are also reserved
addresses because they would be used as the broadcast addresses.
As we can see, the original IP address 195.211.178.39 is just a part of the first set of addresses we
derived from CIDR implementation.