Professional Documents
Culture Documents
Networking
Networking
NETWORKING 0768961322
B.Sc. ICT (@RUSL)
Protocols
•Protocol is a set of rules for data communication.
•In order to minimize possible transmission problems in a network, there must be a governing set of
rules and regulations.
•The protocols in human communication are rules about appearances, speaking, words, listening and
understanding.
•A successful data communication is when the receiver has received the same message sent by the
sender.
•Network engineers(IEEE recommended) have written rules for different layers of the
communication. These rules are for how to open the communication, how hosts listen, how to
interrupt, how to terminate the session, flow control, error detection, error correction and many
others.
•The protocols are grouped into a protocol suite. The Internet Protocol(IP) and the Transmission
Control Protocol(TCP) are the most important Protocols in the internet & most of private networks
today USE THEM .
OSI seven layer reference model
The OSI , or Open System Interconnection, model defines a networking framework for implementing
protocols in seven layers.
Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to
the bottom layer, over the channel to the next station and back up the hierarchy.
7.Application layer
“Please Do Not Throw Sausage Pizza Away”
6. Presentation layer
5. Session layer
4. Transport layer
3. Network layer
1. Physical layer
OSI seven layer reference model
Application (Layer 7)
• This layer supports application (Talk to application) and end-user processes.
• Not application software (INTERFACE FOR THE APPLICATION SOFTWARE).
• The application layer provides services for an application program to ensure that effective
communication with another application program in a network.
• User authentication and privacy are considered.
• Everything at this layer is application specific.
• This layer provides application services for file transfers, email, and other network software
services.
• Telnet, FTP, DNS, HTTP, DHCP, SMTP, POP3 services, peer to peer, client server.
• In a web browser application, the application layer protocol(http) is used to send and receive http
data packets.
• File and Directory services, Network management, Network monitoring, WWW, web chatting,
Interface between the network and the application.
• Resource sharing(remote file access, remote printer access.
Presentation (Layer 6)
• Presentation layer presents the data in one application to another application.
• Networks can connect different types of computers connect together in a network : PCs,
Macintosh, UNIX systems, AS/400 servers and mainframes can all exist on the same network.
• Data can be communicated in different formats via different sources (restructured the data). Thus,
the presentation layer is responsible for integrating all formats into a standard format for efficient
and effective communication.
• It is sometimes called the syntax layer.
• It can be viewed as the translator for the network.
• Encoding and encryption, Data compression, Translation.
• The presentation layers works to transform data into the form that the application layer can accept.
• ASCII, EBCDIC, Unicode, TIFF, GIF, MP3, AVI, JPG (Translation between different formats
EBCDIC to ASCII)
Session (Layer 5)
• This layer establishes, manages and terminates connections between applications.
• The session layer sets up, coordinates , and terminates conversations, exchanges, and dialogues
between the applications at each end.
• It deals with session and connection coordination.
• Session support security
• Inter host communication
• RPC, NetBIOS protocols
• Simplex, Half-Duplex and Full-Duplex
•synchronization
Transport (Layer 4)
• This layer ensures complete data transfer (all messages are delivered/ no losses or duplication)
between end systems, or hosts.
• It is responsible for end-to-end error recovery and flow control.
• Protocols: TCP(Transmission Control Protocol), UDP (User Datagram Prorocol).
• Supports reliable (connection oriented) and unreliable (connectionless) data transport.
• Multiplexing
• Create segments (PDU-protocol data unit).
• Ensure reliable data transmission.
•Port addressing
Network (Layer 3)
• This layer provides routing technologies, creating logical paths, for transmitting data from node
to node.
• Routing (Deciding which physical path the data takes) and forwarding are functions of this layer.
• Control the operations of subnets.
• Create data packets with IP addresses.
• Path determination and logical addressing.
• Protocols: IP, IPX, ICMP, IPsec
• Router and layer three switch operate in this layer.
Data Link (Layer 2)
• At this layer, data packets are encoded and decoded frames (Create data frames).
• It furnishes transmission protocol knowledge and management and handles errors in the physical
layer.
• Provide error free transfer a data frames over physical layer.
• The data link layer is divided into two sub layers: The Media Access Control(MAC) and the
Logical Link Control(LLC).
• The MAC sub layer controls how a computer on the network gains access to the data and
permission to transmit it.
• The LLC layer controls frame synchronization, flow control and error checking.
• Switch and Bridge.
• Physical addressing (MAC address)
• Ethernet, ATM, token ring, PPP.
Physical (Layer 1)
• This layer conveys the bit stream into electrical, light or radio signal through the network at the
electrical , optical or mechanical level.
• Fast Ethernet, RS232, and ATM are protocols with physical layer.
• Binary transmission.
• Consider how bits are moving between devices. Transmission techniques are considered.
(Modulation methods, Amplitude)
• Baseband and Broadband.
• RJ 45, Coaxial cable, micro waves., hub,repeaters.
MAIN PROTOCOLS
ICMP (Internet Control Message Protocol)
It is used by network devices, like routers, to send error messages indicating, for example, that a
requested service is not available or that a host or router could not be reached.
The best known example of ICMP in practice is the ping utility, ICMP also supports traceroute,
that can identify intermediate devices between a given source and destination.
ICMP(Internet Control Message Protocol) is a message control and error-reporting protocol
between a host server and a gateway to the internet.