Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Hansika Mannapperuma

NETWORKING 0768961322
B.Sc. ICT (@RUSL)
Protocols
•Protocol is a set of rules for data communication.
•In order to minimize possible transmission problems in a network, there must be a governing set of
rules and regulations.
•The protocols in human communication are rules about appearances, speaking, words, listening and
understanding.
•A successful data communication is when the receiver has received the same message sent by the
sender.
•Network engineers(IEEE recommended) have written rules for different layers of the
communication. These rules are for how to open the communication, how hosts listen, how to
interrupt, how to terminate the session, flow control, error detection, error correction and many
others.
•The protocols are grouped into a protocol suite. The Internet Protocol(IP) and the Transmission
Control Protocol(TCP) are the most important Protocols in the internet & most of private networks
today USE THEM .
OSI seven layer reference model
The OSI , or Open System Interconnection, model defines a networking framework for implementing
protocols in seven layers.
Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to
the bottom layer, over the channel to the next station and back up the hierarchy.

7.Application layer
“Please Do Not Throw Sausage Pizza Away”
6. Presentation layer

5. Session layer

4. Transport layer

3. Network layer

2. Data Link layer

1. Physical layer
OSI seven layer reference model
Application (Layer 7)
• This layer supports application (Talk to application) and end-user processes.
• Not application software (INTERFACE FOR THE APPLICATION SOFTWARE).
• The application layer provides services for an application program to ensure that effective
communication with another application program in a network.
• User authentication and privacy are considered.
• Everything at this layer is application specific.
• This layer provides application services for file transfers, email, and other network software
services.
• Telnet, FTP, DNS, HTTP, DHCP, SMTP, POP3 services, peer to peer, client server.
• In a web browser application, the application layer protocol(http) is used to send and receive http
data packets.
• File and Directory services, Network management, Network monitoring, WWW, web chatting,
Interface between the network and the application.
• Resource sharing(remote file access, remote printer access.
Presentation (Layer 6)
• Presentation layer presents the data in one application to another application.
• Networks can connect different types of computers connect together in a network : PCs,
Macintosh, UNIX systems, AS/400 servers and mainframes can all exist on the same network.
• Data can be communicated in different formats via different sources (restructured the data). Thus,
the presentation layer is responsible for integrating all formats into a standard format for efficient
and effective communication.
• It is sometimes called the syntax layer.
• It can be viewed as the translator for the network.
• Encoding and encryption, Data compression, Translation.
• The presentation layers works to transform data into the form that the application layer can accept.
• ASCII, EBCDIC, Unicode, TIFF, GIF, MP3, AVI, JPG (Translation between different formats
EBCDIC to ASCII)
Session (Layer 5)
• This layer establishes, manages and terminates connections between applications.
• The session layer sets up, coordinates , and terminates conversations, exchanges, and dialogues
between the applications at each end.
• It deals with session and connection coordination.
• Session support security
• Inter host communication
• RPC, NetBIOS protocols
• Simplex, Half-Duplex and Full-Duplex
•synchronization
Transport (Layer 4)
• This layer ensures complete data transfer (all messages are delivered/ no losses or duplication)
between end systems, or hosts.
• It is responsible for end-to-end error recovery and flow control.
• Protocols: TCP(Transmission Control Protocol), UDP (User Datagram Prorocol).
• Supports reliable (connection oriented) and unreliable (connectionless) data transport.
• Multiplexing
• Create segments (PDU-protocol data unit).
• Ensure reliable data transmission.
•Port addressing
Network (Layer 3)
• This layer provides routing technologies, creating logical paths, for transmitting data from node
to node.
• Routing (Deciding which physical path the data takes) and forwarding are functions of this layer.
• Control the operations of subnets.
• Create data packets with IP addresses.
• Path determination and logical addressing.
• Protocols: IP, IPX, ICMP, IPsec
• Router and layer three switch operate in this layer.
Data Link (Layer 2)
• At this layer, data packets are encoded and decoded frames (Create data frames).
• It furnishes transmission protocol knowledge and management and handles errors in the physical
layer.
• Provide error free transfer a data frames over physical layer.
• The data link layer is divided into two sub layers: The Media Access Control(MAC) and the
Logical Link Control(LLC).
• The MAC sub layer controls how a computer on the network gains access to the data and
permission to transmit it.
• The LLC layer controls frame synchronization, flow control and error checking.
• Switch and Bridge.
• Physical addressing (MAC address)
• Ethernet, ATM, token ring, PPP.
Physical (Layer 1)
• This layer conveys the bit stream into electrical, light or radio signal through the network at the
electrical , optical or mechanical level.
• Fast Ethernet, RS232, and ATM are protocols with physical layer.
• Binary transmission.
• Consider how bits are moving between devices. Transmission techniques are considered.
(Modulation methods, Amplitude)
• Baseband and Broadband.
• RJ 45, Coaxial cable, micro waves., hub,repeaters.
MAIN PROTOCOLS
ICMP (Internet Control Message Protocol)
It is used by network devices, like routers, to send error messages indicating, for example, that a
requested service is not available or that a host or router could not be reached.
The best known example of ICMP in practice is the ping utility, ICMP also supports traceroute,
that can identify intermediate devices between a given source and destination.
ICMP(Internet Control Message Protocol) is a message control and error-reporting protocol
between a host server and a gateway to the internet.

FTP (File Transfer Protocol)


File transfer protocol is a standard network protocol used to transfer files from one host to another
host over a TCP- based network, such as the internet.
Files can be transferred between client-client, client-server, server-server. Generally the User
Authentication is required.(user name and password)
TCP (Transmission Control Protocol)
TCP is the most commonly used protocol on the Internet. The reason for this is because TCP offers
error correction and flow control.
When the TCP protocol is used there is a “guaranteed delivery”.
Flow control determines when data needs to be re-sent, and stops the flow of data until previous
packets are successfully transferred. This works because if a packet of data is sent, a collision may
occur. When this happens, the client re-requests the packet from the server until the all packets are
completed.
TCP is known as a connection-oriented protocol, which means that a connection is established and
maintained until the data transmission is completed.
TCP is responsible for ensuring that a message is divided into the packets and for reassembling the
packets back into the complete message at the other end.
In the Open Systems Interconnections(OSI) communication model, TCP is in layer 4, the Transport
Layer.
(TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees
delivery of data and also guarantees that packets will be delivered in the same order in which they
were sent)
UDP (User Datagram Protocol)
UDP is an alternative to the Transmission Control Protocol(TCP) and, together with IP, is
sometimes referred to as UDP/IP. Like the TCP, UDP uses Internet Protocol to actually get a data
unit(called a datagram) from one computer to another.
UDP runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery
services, It’s used primarily for broadcasting (simultaneously send the same message to multiple
recipients.) messages over a network. UPD is often used in videoconferencing applications or
computer games specially tuned for real-time performance. Unreliable transportation of data
between TCP/IP hosts. UDP provides a connectionless datagram service.
UDP is never used to send important data such as web pages, database information, etc; UDP is
commonly used for streaming audio and video. Streaming media such as Windows Media audio
files (.WMA) , Real player(.RM), and others use UDP because it offers speed! Video streaming.
The reason UDP is faster than TCP is because there is no form of flow control or error correction.
The data sent over the internet is affected by collisions, and errors will be present. Remember that
UDP is only concerned with speed. This is the main reason why streaming media is not high quality.
Telnet
Through Telnet, an administrator , or another user can access someone else’s computer remotely.
Telnet is an application layer protocol used on the internet or another networks to provide a
bidirectional interactive text- oriented communication facility using a computer.
On the web, HTTP and FTP protocols allow you to request specific files from remote computers,
but not to actually be logged on as a user of that computer. With telnet you log on as a regular user
with whatever privileges you may have been granted to the specific application and data computer.
You can then enter commands through the telnet programs and they will be executed as if you were
entering them directly on the server. To start a telnet session, you must log into a server by entering
a valid username and password. Telnet is a common way to remotely control webservers.
HTTP
The Hyper Text Transfer Protocol(HTTP) is a application protocol for distributed, collaborative ,
hypermedia information systems.
HTTP is a foundation of data communication for the WWW.
THANK YOU

You might also like