SlideShare a Scribd company logo
1 of 47
Download to read offline
Protocols
Chapter Four
The key features of a protocol
In the context of data networking, a protocol is a formal set of
rules and conventions that governs how computers exchange
information over a network medium.
The peer layers communicate by means of formatted blocks of data
that obey a set of rules or conventions known as a protocol. The
key features of protocol are:
Syntax – data block format
Semantics - control information & error handling
Timing - speed matching & sequencing
Types of Communication Models
There are two basic protocol models used in data communications
and computer networks.
I. TCP/IP model and
II. OSI reference model
I.TCP/IP Protocol Suite
TCP/IP stands for Transmission Control Protocol/
Internet Protocol.
It was developed by the Internet Engineering Task
Force(IETF) prior to the OSI model.
Therefore, the layers in the TCP/IP protocol suite do not
match exactly with those in the OSI model.
The TCP/IP protocol suite is defined as four software
layers built upon the hardware.
Layers in the TCP/IP Protocol Suite
Network Access Layer
At the bottom of the TCP/IP model, the Network Access
layer implements the data exchange between the host
and the network.
The equivalent of the Data Link and Physical layers of the
OSI model, the Network Access layer oversees hardware
addressing and defines protocols for the physical
transmission of data.
The reason TCP/IP became so popular is because there
were no set of physical layer specifications, so it could
run on any existing or future physical network.
Internet Layer
The Internet layer corresponds to the OSI’s Network layer,
designating the protocols relating to the logical
transmission of packets over the entire network.
It takes care of the addressing of hosts by giving them an
IP (Internet Protocol) address and handles the routing of
packets among multiple networks.
Host-to-Host/Transport layer
The Host-to-Host layer parallels the functions of the
OSI’s Transport layer, defining protocols for setting up
the level of transmission service for applications.
It tackles issues like creating reliable end-to-end
communication and ensuring the error-free delivery of
data.
It handles packet sequencing and maintains data
integrity.
Process/Application layer
These processes integrate the various activities and
duties spanning the focus of the OSI’s corresponding
top three layers (Application, Presentation, and
Session).
Controls user-interface specifications.
A vast array of protocols join forces at the TCP/IP
model’s Application layer.
TCP/IP Protocol Suite
II. The OSI Model
It was developed by the International Organization for
Standardization (ISO).
It was first introduced in the late 1970s.
It is a model for a computer protocol architecture and as
a framework for developing protocol standards.
An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model.
It comprises seven layers.
Summary of OSI Layers
TCP/IP and OSI Model
OSI and TCP/IP similarities
Both have layers.
Both have application layers, though they include very
different services.
Both have comparable transport and network layers.
Both assume packets are switched. This means that
individual packets may take different paths to reach the
same destination. This is contrasted with circuit-switched
networks where all the packets take the same path.
OSI and TCP/IP Differences
TCP/IP combines the application, presentation and session
layer issues into its application layer.
TCP/IP combines the OSI data link and physical layers into the
network access layer.
TCP/IP appears simpler because it has fewer layers.
TCP/IP protocols are the standards around which the Internet
developed, so the TCP/IP model gains credibility just because of
its protocols.
In contrast, networks are not usually built on the OSI protocol,
even though the OSI model is used as a guide.
Overview of familiar Protocols
Simple Network Management Protocol (SNMP)
Simple Network Management Protocol (SNMP) collects
and manipulates valuable network information.
 It gathers data by polling the devices on the network
from a network management station (NMS) and alert to
administrator.
This protocol can also stand as a watchdog over the
network, quickly notifying managers of any sudden turn
of events.
Hypertext Transfer Protocol (HTTP)
 It’s used to manage communications between web
browsers and web servers and opens the right resource
when you click a link, wherever that resource may actually
reside.
Your browser can understand what you need when you
enter a Uniform Resource Locator (URL), which we usually
refer to as a web address,e.g. http://www.google.com/
Web
browser
E.g.
Chrome
Web server
E.g. google
Internet protocols
E.g. http
Facilitate communication
Hypertext Transfer Protocol Secure (HTTPS)
Hypertext Transfer Protocol Secure (HTTPS) is also
known as Secure Hypertext Transfer Protocol. It uses
Secure Sockets Layer (SSL).
Sometimes you’ll see it referred to as SHTTP or S-HTTP,
which were slightly different protocols, but since
Microsoft supported HTTPS, it became the de facto
standard for securing web communication.
Domain Name Service (DNS)
An IP address identifies hosts on a network and the
Internet as well, but DNS was designed to make things
easier.
DNS allows users to use a domain name to specify an IP
address.
DNS resolves hostnames—specifically, Internet names,
such as www.amu.edu.et to Ip addresses like 10.145.8.10
DNS…
DNS resolves domain names to IP addresses and vice
versa
DNS Server 10.144.5.30
www.amu.edu.et
DNS…
The very last section of the domain is called its top-
level domain (TLD) name
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol (DHCP) assigns IP
addresses to hosts dynamically.
It allows for easier administration and works well in small
to very large network environments.
Many types of hard wares can be used as a DHCP server,
including a Cisco router.
A DHCP address conflict occurs when two hosts use the
same IP address.
Simple Mail Transfer Protocol (SMTP)
Governs the transmission of mail messages and attachments.
SMTP is used in the case of outgoing messages.
More powerful protocols such as POP3 and IMAP4 are needed
and available to manage incoming messages.
POP3(Post Office Protocol version 3) is the older protocol
whereas IMAP4(Internet Mail Access Protocol version 4) is the
more advanced protocol.
It allows a user on a remote machine to access the
resources of another machine.
Telnet is not secure because everything is by using plain
text.
Due to lack of encryption telnet is outdated technology.
It is largely used in local area networks, but not in the
internet.
SSH(Secure Shell) is the better alternative for Telnet as it
protects data from being attacked or stolen when
transferred over a network.
Telnet
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)actually lets users to transfer files.
Users must be subjected to an authentication login that’s
usually secured with passwords and usernames.
FTP’s functions are limited to listing and manipulating
directories, typing file contents, and copying files between
hosts.
Not a secure protocol since a data being transferred is not
encrypted(i.e. plain text).
A more secured transfer protocol should be used; that is
Secure FTP(SFTP).
Trivial File Transfer Protocol (TFTP)
TFTP is a very simple file transfer protocol.
It is mainly used to transfer files within a local area network,
but not used to transfer files over the internet due to security
issues.
TFTP doesn’t offer the abundance of functions that FTP does
because it has no directory-browsing abilities, meaning that it
can only send and receive files.
 There’s no authentication as with FTP, so it’s even more
insecure, and few sites support it because of the inherent
security risks.
TCP(Transmission Control Protocol)
TCP takes large blocks of information from an application
and breaks them into segments.
It numbers and sequences each segment to keep the order
of the segments.
After these segments are sent on the transmitting host, TCP
waits for an acknowledgment of the receiving end’s.
It is a reliable protocol, in which it provides a guaranteed
delivery.
Retransmits any segments that aren’t acknowledged.
It is Connection oriented means that a virtual connection is
established before any user data is transferred.
TCP…
 TCP can also recognize duplicate messages and will discard
them appropriately.
 If the sending computer is transmitting too fast for the
receiving computer, TCP can employ flow control
mechanisms to slow data transfer.
All these characteristics makes TCP an end-to-end reliable
transport layer protocol.
User Datagram Protocol (UDP)
User Datagram Protocol (UDP)is basically the scaled-down
model of TCP, which is why UDP is sometimes referred to as a
thin protocol.
A thin protocol doesn’t take up a lot of room—or in this
case, require much bandwidth on a network.
UDP does not sequence the segments and does not care
about the order in which the segments arrive at the
destination.
UDP just sends the segments off and forgets about them.
UDP …
It doesn’t follow segments, check up on them, or even
allow for an acknowledgment of safe arrival.
Because of this, it’s referred to as an unreliable
protocol.
This does not mean that UDP is ineffective, only that it
doesn’t deal with reliability issues at all.
Furthermore, UDP doesn’t create a virtual circuit or
doesn’t contact the destination before delivering
information to it.
Because of this, it’s also considered a connectionless
protocol.
UDP in short
Minimum overhead.
Used to send short messages.
Not reliable as TCP (out of order, missing datagram,
duplicate datagram).
Lack of flow control and error control
Faster and efficient.
Internet Protocol (IP)
The Internet Protocol (IP) is a protocol, or set of rules, for
routing and addressing packets of data so that they can travel
across networks and arrive at the correct destination.
IP is the network layer communications protocol for
relaying datagrams across network boundaries.
Its routing function enables internetworking, and essentially
establishes the Internet.
IP has the task of delivering packets from the source host to
the destination host solely based on the IP addresses in the
packet headers.
Internet Protocol versions: IPv4, IPv6.
Address Resolution Protocol(ARP)
ARP maps 32-bit logical (IP) address to 48-bit physical
address(MAC address).
An Ip address is used to locate a device on a network,
whereas MAC address is what identifies the actual device.
Host or router transmit IP datagram packet containing
logical address obtained from DNS.
Sender knows logical address(IP) of receiver but not its
physical address(MAC) so ARP maps the logical address of
the receiver to physical address it obtains from receiver.
ARP Retrieves the physical address of the receiver.
ARP…
R1 R2 R3
192.168.1.2 192.168.1.4
192.168.1.5
Sends ARP query packet
Contains
Logical address of
sender
(192.168.1.2)
Logical address of
receiver
(192.168.1.5)
Sends ARP response packet
Contains
Logical address of
receiver
(192.168.1.5)
physical address of
receiver
(00:04:ff:ff:ff:d0)
 The receiver sends ARP response packet which contains the logical
(IP) address and physical address of the receiver.
 ARP response packet is unicast directly to the sender whose
physical address is present in the ARP query packet.
Sender Receiver
Intended
receiver
Reverse Address Resolution Protocol (RARP)
RARP is a TCP/IP protocol that allows any host to obtain its IP
address from the server.
RARP perform the following steps to obtain an IP address
from the server.
 The sender broadcast the RARP request to all hosts.
 The RARP request packet contains the physical address
of the sender.
 All the host receiving the RARP request process it, but
the authorized server only replies to the requesting host.
RARP…
R1 R2
R3
192.168.1.4
192.168.1.5
Sender broadcast RARP request
Contains
Physical address of
sender
(00:04:ff:ff:ff:d0)
Sends RARP response packet
Contains
The authorized
RARP server
replies to
requesting host
which contains IP
address for
(192.168.1.2)
RARP maps 48-bit physical address(MAC address) to 32-bit
logical (IP) address.
Sender
Receiver
authorized
RARP server
00:04:ff:ff:ff:d0
Internet Control Message Protocol(ICMP)
Used to report errors with delivery of IP data.
E.g. if particular service or host not reachable or to
check routers are correctly routing .
ICMP uses Ping tool to check host if it is reachable and
how long it takes to reach.
Error reporting, but not error correction.
Two types of messages
Error reporting message
Problems with router or host e.g. destination
unreachable, time exceeded, parameters problem
Query message
Help in getting specific information. e.g. neighbors
Internet Group Management Protocol(IGMP)
IGMP is a protocol that allows several devices to share
one IP address so they can all receive the same data.
IGMP is a network layer protocol used to set up
multicasting on networks that use the Internet Protocol
version 4 (IPv4).
Protocol that manages group membership.
Provides information to multicast routers about the
membership status of hosts.
Thank you!!

More Related Content

Similar to Ch4 Protocols.pptx

HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Please help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdfPlease help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdflejeunehayneswowel96
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control ProtocolAliHamza410
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference ModelJohnson Ubah
 

Similar to Ch4 Protocols.pptx (20)

HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Please help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdfPlease help!!!I can change a link layer protocol and the applicati.pdf
Please help!!!I can change a link layer protocol and the applicati.pdf
 
Osi model
Osi modelOsi model
Osi model
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Internet1
Internet1Internet1
Internet1
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 

More from azmerawAnna1

Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdfEthiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdfazmerawAnna1
 
ADBMS_ASSIGNMENT_PPT1[1] (2).pptx
ADBMS_ASSIGNMENT_PPT1[1] (2).pptxADBMS_ASSIGNMENT_PPT1[1] (2).pptx
ADBMS_ASSIGNMENT_PPT1[1] (2).pptxazmerawAnna1
 
Hema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptHema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptazmerawAnna1
 
Hema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptHema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptazmerawAnna1
 
CITIZENSHIP MODULE pdfww.docx
CITIZENSHIP MODULE pdfww.docxCITIZENSHIP MODULE pdfww.docx
CITIZENSHIP MODULE pdfww.docxazmerawAnna1
 
Extension Final year Project Advising.docx
Extension Final year Project Advising.docxExtension Final year Project Advising.docx
Extension Final year Project Advising.docxazmerawAnna1
 
Extension Final year Project Advising for IT STUDENT.docx
Extension Final year Project Advising  for IT STUDENT.docxExtension Final year Project Advising  for IT STUDENT.docx
Extension Final year Project Advising for IT STUDENT.docxazmerawAnna1
 
Anteneh Asha Ade MBA RESEACH THEISES.docx
Anteneh Asha Ade MBA RESEACH THEISES.docxAnteneh Asha Ade MBA RESEACH THEISES.docx
Anteneh Asha Ade MBA RESEACH THEISES.docxazmerawAnna1
 

More from azmerawAnna1 (9)

Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdfEthiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
Ethiopian_Geography_and_the_horn_Improved_Nov2019.pptx.pdf
 
ADBMS_ASSIGNMENT_PPT1[1] (2).pptx
ADBMS_ASSIGNMENT_PPT1[1] (2).pptxADBMS_ASSIGNMENT_PPT1[1] (2).pptx
ADBMS_ASSIGNMENT_PPT1[1] (2).pptx
 
Hema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptHema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.ppt
 
Hema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.pptHema I Chapter 14 CSF.ppt
Hema I Chapter 14 CSF.ppt
 
CITIZENSHIP MODULE pdfww.docx
CITIZENSHIP MODULE pdfww.docxCITIZENSHIP MODULE pdfww.docx
CITIZENSHIP MODULE pdfww.docx
 
Extension Final year Project Advising.docx
Extension Final year Project Advising.docxExtension Final year Project Advising.docx
Extension Final year Project Advising.docx
 
Extension Final year Project Advising for IT STUDENT.docx
Extension Final year Project Advising  for IT STUDENT.docxExtension Final year Project Advising  for IT STUDENT.docx
Extension Final year Project Advising for IT STUDENT.docx
 
Anteneh Asha Ade MBA RESEACH THEISES.docx
Anteneh Asha Ade MBA RESEACH THEISES.docxAnteneh Asha Ade MBA RESEACH THEISES.docx
Anteneh Asha Ade MBA RESEACH THEISES.docx
 
Wude.dox[1].docx
Wude.dox[1].docxWude.dox[1].docx
Wude.dox[1].docx
 

Recently uploaded

JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxUnderstanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxSasikiranMarri
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 

Recently uploaded (20)

JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxUnderstanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 

Ch4 Protocols.pptx

  • 2. The key features of a protocol In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. The peer layers communicate by means of formatted blocks of data that obey a set of rules or conventions known as a protocol. The key features of protocol are: Syntax – data block format Semantics - control information & error handling Timing - speed matching & sequencing
  • 3. Types of Communication Models There are two basic protocol models used in data communications and computer networks. I. TCP/IP model and II. OSI reference model
  • 4. I.TCP/IP Protocol Suite TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It was developed by the Internet Engineering Task Force(IETF) prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The TCP/IP protocol suite is defined as four software layers built upon the hardware.
  • 5. Layers in the TCP/IP Protocol Suite
  • 6. Network Access Layer At the bottom of the TCP/IP model, the Network Access layer implements the data exchange between the host and the network. The equivalent of the Data Link and Physical layers of the OSI model, the Network Access layer oversees hardware addressing and defines protocols for the physical transmission of data. The reason TCP/IP became so popular is because there were no set of physical layer specifications, so it could run on any existing or future physical network.
  • 7. Internet Layer The Internet layer corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network. It takes care of the addressing of hosts by giving them an IP (Internet Protocol) address and handles the routing of packets among multiple networks.
  • 8. Host-to-Host/Transport layer The Host-to-Host layer parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications. It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.
  • 9. Process/Application layer These processes integrate the various activities and duties spanning the focus of the OSI’s corresponding top three layers (Application, Presentation, and Session). Controls user-interface specifications. A vast array of protocols join forces at the TCP/IP model’s Application layer.
  • 11. II. The OSI Model It was developed by the International Organization for Standardization (ISO). It was first introduced in the late 1970s. It is a model for a computer protocol architecture and as a framework for developing protocol standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It comprises seven layers.
  • 12. Summary of OSI Layers
  • 13. TCP/IP and OSI Model
  • 14. OSI and TCP/IP similarities Both have layers. Both have application layers, though they include very different services. Both have comparable transport and network layers. Both assume packets are switched. This means that individual packets may take different paths to reach the same destination. This is contrasted with circuit-switched networks where all the packets take the same path.
  • 15. OSI and TCP/IP Differences TCP/IP combines the application, presentation and session layer issues into its application layer. TCP/IP combines the OSI data link and physical layers into the network access layer. TCP/IP appears simpler because it has fewer layers. TCP/IP protocols are the standards around which the Internet developed, so the TCP/IP model gains credibility just because of its protocols. In contrast, networks are not usually built on the OSI protocol, even though the OSI model is used as a guide.
  • 16. Overview of familiar Protocols
  • 17. Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) collects and manipulates valuable network information.  It gathers data by polling the devices on the network from a network management station (NMS) and alert to administrator. This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events.
  • 18.
  • 19. Hypertext Transfer Protocol (HTTP)  It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside. Your browser can understand what you need when you enter a Uniform Resource Locator (URL), which we usually refer to as a web address,e.g. http://www.google.com/ Web browser E.g. Chrome Web server E.g. google Internet protocols E.g. http Facilitate communication
  • 20. Hypertext Transfer Protocol Secure (HTTPS) Hypertext Transfer Protocol Secure (HTTPS) is also known as Secure Hypertext Transfer Protocol. It uses Secure Sockets Layer (SSL). Sometimes you’ll see it referred to as SHTTP or S-HTTP, which were slightly different protocols, but since Microsoft supported HTTPS, it became the de facto standard for securing web communication.
  • 21. Domain Name Service (DNS) An IP address identifies hosts on a network and the Internet as well, but DNS was designed to make things easier. DNS allows users to use a domain name to specify an IP address. DNS resolves hostnames—specifically, Internet names, such as www.amu.edu.et to Ip addresses like 10.145.8.10
  • 22. DNS… DNS resolves domain names to IP addresses and vice versa DNS Server 10.144.5.30 www.amu.edu.et
  • 23. DNS… The very last section of the domain is called its top- level domain (TLD) name
  • 24. Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts dynamically. It allows for easier administration and works well in small to very large network environments. Many types of hard wares can be used as a DHCP server, including a Cisco router. A DHCP address conflict occurs when two hosts use the same IP address.
  • 25.
  • 26. Simple Mail Transfer Protocol (SMTP) Governs the transmission of mail messages and attachments. SMTP is used in the case of outgoing messages. More powerful protocols such as POP3 and IMAP4 are needed and available to manage incoming messages. POP3(Post Office Protocol version 3) is the older protocol whereas IMAP4(Internet Mail Access Protocol version 4) is the more advanced protocol.
  • 27. It allows a user on a remote machine to access the resources of another machine. Telnet is not secure because everything is by using plain text. Due to lack of encryption telnet is outdated technology. It is largely used in local area networks, but not in the internet. SSH(Secure Shell) is the better alternative for Telnet as it protects data from being attacked or stolen when transferred over a network. Telnet
  • 28. File Transfer Protocol (FTP) File Transfer Protocol (FTP)actually lets users to transfer files. Users must be subjected to an authentication login that’s usually secured with passwords and usernames. FTP’s functions are limited to listing and manipulating directories, typing file contents, and copying files between hosts. Not a secure protocol since a data being transferred is not encrypted(i.e. plain text). A more secured transfer protocol should be used; that is Secure FTP(SFTP).
  • 29.
  • 30. Trivial File Transfer Protocol (TFTP) TFTP is a very simple file transfer protocol. It is mainly used to transfer files within a local area network, but not used to transfer files over the internet due to security issues. TFTP doesn’t offer the abundance of functions that FTP does because it has no directory-browsing abilities, meaning that it can only send and receive files.  There’s no authentication as with FTP, so it’s even more insecure, and few sites support it because of the inherent security risks.
  • 31.
  • 32. TCP(Transmission Control Protocol) TCP takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment to keep the order of the segments. After these segments are sent on the transmitting host, TCP waits for an acknowledgment of the receiving end’s. It is a reliable protocol, in which it provides a guaranteed delivery. Retransmits any segments that aren’t acknowledged. It is Connection oriented means that a virtual connection is established before any user data is transferred.
  • 33. TCP…  TCP can also recognize duplicate messages and will discard them appropriately.  If the sending computer is transmitting too fast for the receiving computer, TCP can employ flow control mechanisms to slow data transfer. All these characteristics makes TCP an end-to-end reliable transport layer protocol.
  • 34. User Datagram Protocol (UDP) User Datagram Protocol (UDP)is basically the scaled-down model of TCP, which is why UDP is sometimes referred to as a thin protocol. A thin protocol doesn’t take up a lot of room—or in this case, require much bandwidth on a network. UDP does not sequence the segments and does not care about the order in which the segments arrive at the destination. UDP just sends the segments off and forgets about them.
  • 35. UDP … It doesn’t follow segments, check up on them, or even allow for an acknowledgment of safe arrival. Because of this, it’s referred to as an unreliable protocol. This does not mean that UDP is ineffective, only that it doesn’t deal with reliability issues at all. Furthermore, UDP doesn’t create a virtual circuit or doesn’t contact the destination before delivering information to it. Because of this, it’s also considered a connectionless protocol.
  • 36. UDP in short Minimum overhead. Used to send short messages. Not reliable as TCP (out of order, missing datagram, duplicate datagram). Lack of flow control and error control Faster and efficient.
  • 37.
  • 38. Internet Protocol (IP) The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination. IP is the network layer communications protocol for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. Internet Protocol versions: IPv4, IPv6.
  • 39. Address Resolution Protocol(ARP) ARP maps 32-bit logical (IP) address to 48-bit physical address(MAC address). An Ip address is used to locate a device on a network, whereas MAC address is what identifies the actual device. Host or router transmit IP datagram packet containing logical address obtained from DNS. Sender knows logical address(IP) of receiver but not its physical address(MAC) so ARP maps the logical address of the receiver to physical address it obtains from receiver. ARP Retrieves the physical address of the receiver.
  • 40.
  • 41. ARP… R1 R2 R3 192.168.1.2 192.168.1.4 192.168.1.5 Sends ARP query packet Contains Logical address of sender (192.168.1.2) Logical address of receiver (192.168.1.5) Sends ARP response packet Contains Logical address of receiver (192.168.1.5) physical address of receiver (00:04:ff:ff:ff:d0)  The receiver sends ARP response packet which contains the logical (IP) address and physical address of the receiver.  ARP response packet is unicast directly to the sender whose physical address is present in the ARP query packet. Sender Receiver Intended receiver
  • 42. Reverse Address Resolution Protocol (RARP) RARP is a TCP/IP protocol that allows any host to obtain its IP address from the server. RARP perform the following steps to obtain an IP address from the server.  The sender broadcast the RARP request to all hosts.  The RARP request packet contains the physical address of the sender.  All the host receiving the RARP request process it, but the authorized server only replies to the requesting host.
  • 43. RARP… R1 R2 R3 192.168.1.4 192.168.1.5 Sender broadcast RARP request Contains Physical address of sender (00:04:ff:ff:ff:d0) Sends RARP response packet Contains The authorized RARP server replies to requesting host which contains IP address for (192.168.1.2) RARP maps 48-bit physical address(MAC address) to 32-bit logical (IP) address. Sender Receiver authorized RARP server 00:04:ff:ff:ff:d0
  • 44. Internet Control Message Protocol(ICMP) Used to report errors with delivery of IP data. E.g. if particular service or host not reachable or to check routers are correctly routing . ICMP uses Ping tool to check host if it is reachable and how long it takes to reach. Error reporting, but not error correction. Two types of messages Error reporting message Problems with router or host e.g. destination unreachable, time exceeded, parameters problem Query message Help in getting specific information. e.g. neighbors
  • 45.
  • 46. Internet Group Management Protocol(IGMP) IGMP is a protocol that allows several devices to share one IP address so they can all receive the same data. IGMP is a network layer protocol used to set up multicasting on networks that use the Internet Protocol version 4 (IPv4). Protocol that manages group membership. Provides information to multicast routers about the membership status of hosts.