SlideShare une entreprise Scribd logo
1  sur  27
Network Protocols
 The OSI model is a layered framework for the design of network systems
that allows communication between all types of data systems. The OSI
model is composed of seven ordered layers:
 Layer 1: Physical Layer : The physical layer supports the electrical or
mechanical interface to the physical medium and performs services
requested by the data link layer. The major functions and services
performed by the physical layer are as follows:
1. Establishment and termination of a connection to a communications medium.
2. Participation in the process whereby the communication resources are
effectively shared among multiple users (e.g., contention resolution and flow
control).
3. Conversion between the representation of digital data in the end user’s
equipment and the corresponding signals transmitted over a communications
channel .
 The physical layer is concerned with the following:
1. Physical characteristics of interfaces and media
2. Representation of bits, transmission rate, synchronization of bits
3. Link configuration
4. Physical topology, and transmission mode
Introduction
 Layer 2: Data Link Layer : The data link layer provides the functional and
procedural means to transfer data between network entities and to
detect and possibly correct errors that may occur in the physical layer.
This layer responds to service requests from the network layer and issues
service requests to the physical layer. Specific responsibilities of the data
link layer include the following:
1. Framing
2. Physical addressing
3. Flow control
4. Error control
5. Access control
 Layer 3: Network Layer : The network layer provides the functional and
procedural means of transferring variable-length data sequences from a
source to a destination via one or more networks while maintaining the
QoS requested by the transport layer. The network layer performs
network routing, flow control, segmentation and reassembly, and error
control functions. This layer responds to service requests from the
transport layer and issues service requests to the data link layer. Specific
responsibilities of the network layer include the following:
1. Logical addressing
2. Routing
Introduction
 Layer 4: Transport Layer : The purpose of the transport layer is to provide
transparent transfer of data between end users, thus relieving the upper
layers from any concern with providing reliable and cost-effective data
transfer.
 This layer responds to service requests from the session layer and issues
service requests to the network layer. Specific responsibilities of the
transport layer include the following:
1. Service-point addressing
2. Segmentation and reassembly
3. Connection control and flow control
4. Error control
 Layer 5: Session Layer : The session layer provides the mechanism for
managing a dialog between end user application processes. It supports
either duplex or half-duplex operations and establishes check pointing,
adjournment, termination, and restart procedures. This layer responds to
service requests from the presentation layer and issues service requests
to the transport layer. Specific responsibilities of the session layer include
the following:
1. Dialog control
2. Synchronization
Introduction
 Layer 6: Presentation Layer : The presentation layer relieves the
application layer of concern regarding syntactical differences in data
representation within the end-user systems. This layer responds to
service requests from the application layer and issues service requests to
the session layer. Specific responsibilities of the presentation layer include
the following:
1. Translation
2. Encryption
3. Compression
 Layer 7: Application Layer : The application layer is the highest layer. This
layer interfaces directly to and performs common application services for
the application processes and also issues requests to the presentation
layer.
 The common application services provide semantic conversion between
associated application processes. Specific services provided by the
application layer include the following:
1. Network virtual terminal
2. File transfer, access, and management
3. Mail services
4. Directory services
Introduction
 The TCP/IP protocol suite provides service to transfer data from one network
device to another using the Internet. The TCP/IP protocol suite is composed of
five layers:
 Physical and Data Link Layers : The physical and data link layers are responsible
for communicating with the actual network hardware (e.g., the Ethernet card).
Data received from the physical medium are handed over to the network layer,
and data received from the network layer are sent to the physical medium. The
TCP/IP does not specify any specific protocol at this layer and supports all
standard and proprietary protocols.
 Network Layer : The network layer is responsible for delivering data to the
destination. It does not guarantee the delivery of data and assumes that the
upper layer will handle this issue. This layer consists of several supporting
protocols :
 Internet Protocol (IP) : is a network layer protocol that provides a
connectionless, “best effort” delivery of packets through an internetwork. The
term best effort means that there is no error checking or tracking done for the
sequence of packets being transmitted. It assumes that the higher-layer protocol
takes care of the reliability of packet delivery. The packets being transmitted are
called datagrams. Each of these datagrams is transmitted independently and
may take different routes to reach the same destination. IP supports a
mechanism of fragmentation and reassembly of datagrams to handle data links
with different maximum-transmission unit (MTU) sizes.
TCP/IP Protocol
 Internet Control Message Protocol (ICMP) : is a companion protocol to IP that
provides a mechanism for error reporting and query to a host or a router. The
query message is used to probe the status of host or a router by the network
manager whereas the error-reporting message is used by the host and routers to
report errors.
 Internet Group Management Protocol (IGMP) : is used to maintain multicast
group membership within a domain. Similar to ICMP, it uses query and reply
messages to maintain multicast group membership in its domain. A multicast
router sends a periodic IGMP query message to find out the multicast session
members in its domain. If a new host wants to join a multicast group, it sends an
IGMP join message to its neighboring multicast router, which takes care of
adding the host to the multicast delivery tree.
 Dynamic Host Configuration Protocol (DHCP) : is designed to handle dynamic
assignments of IP addresses in a domain. This protocol is an extension of the
bootstrap protocol (BOOTP) and provides a way for the mobile nodes to request
an IP address from a DHCP server in case nodes move to a different network.
 This dynamic assignment of IP address is also applicable to the hosts that attach
to the network occasionally. It saves precious IP address space by utilizing the
same IP address for needed hosts. DHCP is fully compatible with BOOTP, which
supports only static binding of physical address to IP address.
TCP/IP Protocol
 Internet Routing Protocols : Some of the widely used routing protocols at
the network layer are routing information protocol (RIP) , open shortest
path first (OSPF) , and border gateway protocol (BGP) .
 Routing information protocol (RIP): RIP is a distance vector–based
interior routing protocol. It uses the Bellman-Ford algorithm (discussed in
the following subsection) to calculate routing tables. In distance vector
routing, each router periodically shares its knowledge about other routers
in the network with its neighbors. Each router also maintains a routing
table consisting of each destination IP address, the shortest distance to
reach the destination in terms of hop count, and the next hop to which
the packet must be forwarded. The current RIP message contains the
minimal amount of information necessary for routers to route messages
through a network and is meant for small networks.
 RIP version 2 enables RIP messages to carry more information, which
permits the use of a simple authentication mechanism to update routing
tables securely. More important, RIP version 2 supports subnet masks, a
critical feature that was not available in RIP
TCP/IP Protocol
Open shortest path first (OSPF): OSPF is an interior routing protocol developed
for IP networks. This protocol is based on the shortest path first (SPF)
algorithm, which sometimes is referred to as the Dijkstra algorithm.
OSPF supports hierarchical routing, in which hosts are partitioned into
autonomous systems (AS). Based on the address range, an AS is further split into
OSPF areas that help border routers to identify every single node in the area. The
concept of OSPF area is similar to subnetting in IP networks. Routing can be
limited to a single OSPF or can cover multiple OSPFs. OSPF is a link-state
routing protocol that requires sending link-state advertisements (LSAs) to all
other routers within the same hierarchical area. As OSPF routers accumulate
link-state information, they use the SPF algorithm to calculate the shortest path
to each node. As a link-state routing protocol, OSPF contrasts with RIP, which
is a distance vector routing protocol.
Routers running the distance vector algorithm send all or a portion of their
routing tables in routing-update messages to their neighbors.
TCP/IP Protocol
 Border gateway protocol (BGP): BGP is an interdomain or
interautonomous system routing protocol. Using BGP, interautonomous
systems communicate with each other to exchange reachability
information.
 BGP is based on the Path Vector Routing Protocol, wherein each entry in
the routing table contains the destination network, the next router, and
the path to reach the destination. The path is an ordered list of
autonomous systems that a packet should travel to reach the destination.
 TCP : is a connection-oriented reliable transport protocol that sends data
as a stream of bytes. At the sending end, TCP divides the stream of data
into smaller units called segments. TCP marks each segment with a
sequence number.
 The sequence number helps the receiver to reorder the packets and
detect any lost packets. If a segment has been lost in transit from source
to destination, TCP retransmits the data until it receives a positive
acknowledgment from the receiver.
 TCP can also recognize duplicate messages and can provide flow control
mechanisms in case the sender is transmitting at a faster speed than the
receiver can handle.
TCP/IP Protocol
 Application Layer : In TCP/IP the top three layers of OSI—session,
presentation, and application layers—are merged into a single layer called
the application layer. Some of the applications running at this layer are
domain name server (DNS), simple mail transfer protocol (SMTP), Telnet,
file transfer protocol (FTP), remote login (Rlogin), and network file
system (NFS).
 Routing Using Bellman-Ford Algorithm : One step that can take a
substantial amount of time is the selection of a route between the source
and destination. This is important as appropriate path selection is critical
for minimizing communication delays.
 The Bellman-Ford algorithm is one of the
routing algorithms designed to find shortest
paths between two nodes of a given graph
(Figure 9.3).
TCP/IP Protocol
Figure 9.4 Steps in the Bellman-Ford algorithm for the sample network.
TCP/IP Protocol
 Need for TCP over Wireless : The existing Internet employs TCP/IP as its protocol
stack. Many of the existing applications require TCP as the transport layer for
reliable transfer of data packets.
 Accessing the Internet is essential for commercial applications, while voice and
other data communications utilize the underlying Internet backbone. For
wireless networks to become popular, support for the existing applications and
compatibility with the wired Internet must be provided. Therefore, it is
imperative that wireless networks also adopt and support TCP for reliable
transfer of data.
 Limitations of Wired Version of TCP : The primary concern in the use of
conventional TCP over wireline networks is packet loss, because congestion can
be present at various nodes in the network.
 In such systems where congestion is the only source for errors, TCP congestion
avoidance mechanisms are extremely useful. However, the same cannot be said
about wireless networks, as errors can be introduced due to inherent use of air
as a medium of packet transport. Errors can also be attributed to the mobility of
users in the network. In such cases, TCP’s congestion-avoidance and error-
recovery mechanisms lead to unnecessary retransmissions, thereby leading to
inefficient use of available wireless bandwidth. In the following subsection, a
summary of the various approaches used to improve the efficiency of TCP over
wireless networks is given. These strategies range from modifying link layer
modules to using split TCP.
TCP over Wireless
 Solutions for Wireless Environment : The scarce spectrum imposes
a fundamental limit on the performance of the wireless channel,
and MSs have limited computing resources and severe energy
constraints. Due to these characteristics, a lot of work has been
done to optimize the performance of the protocol stack.
 Some of the approaches to improving the performance of TCP over
wireless links are as follows:
 End-to-end protocols attempt to make the TCP sender handle
losses through the use of two techniques :
 First, they use some form of selective acknowledgments to allow
the sender to recover from multiple packet losses in a window,
without resorting to a coarse timeout.
 Second, they attempt to have the sender distinguish between
congestion and other forms of losses using an explicit loss
notification (ELN) mechanism.
TCP over Wireless
 TCP–SACK : Standard TCP uses a cumulative acknowledgment scheme, which
does not provide the sender with sufficient information to recover quickly from
multiple packet losses within a single transmission window.
 A selective acknowledgment (SACK) mechanism, combined with a selective
repeat retransmission policy, can help to overcome these limitations. The
receiving TCP sends back SACK packets to the sender, informing the sender of
the data that have been received. The sender can then retransmit only the
missing data segments. If the duplicate segment is received and is part of a
larger block of noncontiguous data in the receiver’s data queue, then the next
SACK block should be used to specify this larger block.
 Wireless wide-area transmission control protocol (WTCP) : WTCP protocol is a
reliable transport layer protocol for a network with wireless links. WTCP runs on
the BS that is involved in the TCP connection. In this protocol, the BS buffers
data from the fixed host and uses separate flow and congestion control
mechanisms for the link between itself and the MS. It temporarily hides the fact
that a mobile link breakage has occurred by using local retransmissions of the
data for which the MS has not sent an ACK. Once it has received an ACK from the
MS, it sends this ACK to the fixed host, but only after changing the timestamp
value in the ACK, so that the TCP’s round-trip estimation at the fixed sender is
not affected. This mechanism effectively hides the wireless link errors from the
fixed sender.
TCP over Wireless
 Freeze-TCP protocol [9.14]: The main idea behind freeze-TCP is to move the onus of
signaling an impending disconnection to the client. A mobile node can certainly
monitor signal strengths in wireless antennas and detect an impending handoff and,
in certain cases, might even be able to predict a temporary disconnection. In such a
case, it can advertise a zero window size, to force the sender into zero window probe
mode and prevent it from dropping its congestion window.
 Explicit bad state notification (EBSN) : Explicit bad state notification uses local
retransmission from the BS to shield the wireless link errors and improve
performance of TCP over the wireless link. However, while the BS is performing local
recovery, the source could still timeout, causing unnecessary source retransmission.
The EBSN approach avoids source timeout by using the EBSN message to the source
during local recovery. The EBSN message causes the source to reset its timeout
value. In this way, timeouts at the source during local recovery are eliminated.
 Fast retransmission approach : The fast retransmission approach tries to reduce the
effect of MS handoff. Regular TCP at the sender interprets the delay caused by a
handoff process to be due to congestion. Therefore, whenever a timeout occurs, its
TCP window size is reduced and these packets are retransmitted.
 The fast retransmission approach alleviates the retransmission problem by having
the MS send a certain number of duplicate acknowledgments to the sender
immediately after completing the handoff. This step causes TCP at the sender to
reduce its window size immediately and retransmit packets starting from the first
missing packet for which the duplicate acknowledgment has been sent, without
waiting for the timeout period to expire.
TCP over Wireless
 Link Layer Protocols : There are two main classes of techniques
employed for reliable link layer protocols:
1. Error correction using techniques such as FEC
2. Retransmission of lost packets in response to ARQ messages
 Transport unaware link improvement protocol (TULIP) : TULIP
provides a link layer that is transparent to the TCP, has no
knowledge of the TCP’s state, takes advantage of the TCP’s
generous timeouts, and makes efficient use of the bandwidth over
the wireless link. TULIP provides reliability only for packets
(frames) that require such service (service awareness), but it does
not know any details of the particular protocol to which it provides
reliable service for packets carrying TCP data traffic and unreliable
service for other packet types, such as user datagram protocol
(UDP) traffic. TULIP maintains local recovery of all lost packets at
the wireless link in order to prevent unnecessary and delayed
retransmission of packets over the entire path and a subsequent
 reduction in TCP’s congestion window.
TCP over Wireless
 AIRMAIL protocol : AIRMAIL is the abbreviation of Asymmetric Reliable Mobile
Access in Link Layer. This protocol employs a combination of FEC and ARQ
techniques for loss recovery. The BS sends an entire window of data before the
mobile receiver returns an acknowledgment. The rationale for this approach is
not to waste bandwidth on ACKs and to limit the amount of work done by the
mobile unit in order to conserve power.
 Snoop protocol : In the snoop protocol, a transport layer aware agent, called a
snoop agent, is introduced at the BS. The agent monitors the link interface for
any TCP segment destined for the MS and caches it if buffer space is available.
The BS also monitors the acknowledgments from the MS. A segment loss is
detected by the arrival of duplicate acknowledgments from the MS or by a local
timeout.
 The snoop agent retransmits the lost segment if it has been cached and
suppresses the duplicate acknowledgments. The snoop agent essentially hides
the link failures in the wireless link by using local retransmissions rather than
allowing the TCP sender to invoke congestion avoidance mechanisms and the
fast retransmission scheme.
 Split TCP Approach : Split connection protocols split each TCP connection
between a sender and receiver into two separate connections at the BS—one
TCP connection between the sender and the BS, and the other between the BS
and the MS. Over the wireless hop, a specialized protocol may be used that can
tune into the wireless environment.
TCP over Wireless
 Indirect-TCP (I-TCP) : I-TCP is a split connection solution that uses standard TCP
for its connection over the wireline link. The indirect protocol model for MSs
suggests that any interaction from a MS to a fixed host should be split into two
separate interactions—one between the MS and its mobile support router
(MSR) over the wireless medium and another between the MSR and the fixed
host over the fixed network. All the specialized support that is needed for the
mobile applications and low-speed and unreliable wireless medium can be built
into the wireless side of the interaction while the fixed side is left unchanged at
the transport layer. Handoff between two different MSRs is supported on the
wireless side without having to reestablish the connection at the new MSR.
 M-TCP protocol : In this approach, the BS relays ACKs back to the sender only
when the receiver (MS) has acknowledged data; therefore, the end-to-end
semantics is maintained, though it also splits up the connection between a
sender (fixed host) and a mobile receiver (MS) into two parts: one between fixed
host and BS and another between BS and MS, which uses a customized wireless
protocol. The receiver can make the sender enter the persist mode by
advertising a zero window size in the presence of frequent disconnections. In
this case, the sender freezes all packet retransmit timers and does not drop the
congestion window so that the idle time during the slow start phase can be
avoided. Whenever the BS detects a disconnection or packet loss, it sends back
an ACK with a zero window size to force the sender into persist mode and to
force it not to drop the congestion window.
TCP over Wireless
 IPv6 also known as IPng (Internet Protocol next generation) has been
proposed to address the unforeseen growth of the Internet and the
limited address space provided by IPv4.
 Transition from IPv4 to IPv6 :
 IPv4 has extensively been used for data communication in wired
networks. We introduce this Internet protocol to understand its format.
This is important, because a large number of IPv4-hosts and IPv4-routers
have been installed and we need to maintain their compatibility.
 The IPv4 uses a 32-bit address to provide unreliable and connectionless
best effort delivery service. Datagrams (packets in the IP layer) may need
to be fragmented into smaller datagrams due to the maximum packet
size in some physical networks. It also depends on checksum to protect
corruption during the transmission. However, the following are some
disadvantages of IPv4:
1. Since the 32-bit address is not sufficient according to the rapidly increased size
of the Internet, more address space is needed.
2. Real-time audio and video transmissions are being used increasingly, and they
require strategies to minimize transmission delay and resource reservation.
Unfortunately, those features are neither provided nor supported by IPv4.
3. IPv4 does not have encryption or authentication.
Internet Protocol Version 6 (IPv6)
 The transition from IPv4 to IPv6 is supposed to be simple and
without any considerable (temporal) dependencies upon other
measures. The IETF plans the following transition mechanisms:
 The basic principle should be Dual-IP-Stack (i.e., IPv4 hosts and
IPv4 routers get an IPv6 stack in addition to their IPv4 stack). This
coexistence ensures full compatibility between not yet updated
systems, and already upgraded systems make it possible to employ
IPv6 for communication right away.
 IPv6-in-IPv4 encapsulation: IPv6 datagrams can get encapsulated
in IPv4 datagrams enabling IPv6 communication via pure IPv4
topologies. This so-called tunneling of IPv6 packets allows early
worldwide employment of IPv6, although not all networks that are
part of the communication path support IPv6. The tunnels between
two routers must be manually configured, whereas tunnels
between hosts and routers may be built up automatically.
Tunneling of IPv6 datagrams can be removed as soon as all routers
along the respective path have been upgraded with IPv6.
Internet Protocol Version 6 (IPv6)
Internet Protocol Version 6 (IPv6)
Figure 9.5
IPv4 header
format.
Figure 9.6
Format of IPv6.
 Features of IPv6 : IPv6 uses a 128-bit (16-byte) address to identify a host in the
Internet. Some of the salient features of IPv6 are as follows:
 Address space: An IPv6 address is 128 bits long, which can effectively handle the
problems created by a limited IPv4 address space.
 Resource allocation: IPv6 supports resource allocation by adding the mechanism of
flow label. By using flow label, a sender can request special handling of the packet in
the Internet.
 Modified header format: IPv6 separates options from the base header. This helps
speed up the routing process since most of the options need not be checked by
routers.
 Support for security: IPv6 supports encryption and decryption options, which
provide authentication and integrity.
 Differences between IPv6 and IPv4 : The main differences between IPv6 and IPv4 are
as follows:
 Expanded addressing capabilities: In IPv6 the address space is increased from 32 to
128 bits. This way, more hierarchical address levels are possible and address prefix
routing may be used more efficiently. Furthermore, the longer IPv6 addresses allow
more devices and simplify address auto-configuration. The multicast capabilities are
improved, and a new address type “anycast” is introduced for addressing the nearest
interface out of a group of interfaces.
Internet Protocol Version 6 (IPv6)
 Simplified header format: To optimize the speed of processing an IPv6 packet
and to minimize its bandwidth requirements, some fields of the IPv4 header have
been eliminated for IPv6 or made optional.
 Improved support for options and extensions: A new design concept for IPv6 is
the extension header, which means that options and extensions can be more
efficiently added, transmitted, and processed. The size of options is not so
strictly limited as in IPv4, which facilitates flexibility for installing future options.
 Flow labeling capabilities: In IPv6, it is possible to label data flows, which
enables the sender to require a special treatment of packets (QoS) by routers on
the way to the destination. This may be a non-default QoS or a real-time service
for multimedia applications such as audio or video. In particular, the capabilities
of ATM can be used effectively.
 Support for authentication and encryption: IPv6 supports authentication of the
sender (i.e., a form of digital signature) and data encryption.
 IPv6 supports mobility and auto configuration. MSs such as laptops are
supposed to be reachable everywhere in the Internet with their home IP address,
and a computer that is connected to a network is supposed to configure its
correct address automatically.
Internet Protocol Version 6 (IPv6)
Internet Protocol Version 6 (IPv6)
Format of IPv6.
The End
Of
Network
Protocols

Contenu connexe

Tendances

TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network FundamentalsN.Jagadish Kumar
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) ModelNetwax Lab
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layeradil raja
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
03 internetworking
03 internetworking03 internetworking
03 internetworkingbajulusiraj
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP ModelAbir Junayed
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layeradil raja
 

Tendances (20)

TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network Fundamentals
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) Model
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
03 internetworking
03 internetworking03 internetworking
03 internetworking
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
 
Week2 lec1-bscs1
Week2 lec1-bscs1Week2 lec1-bscs1
Week2 lec1-bscs1
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
C0343015019
C0343015019C0343015019
C0343015019
 
Network layer osi
Network layer osiNetwork layer osi
Network layer osi
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 

En vedette

Issues Involving Recruitment and Placement of International Medical Graduates...
Issues Involving Recruitment and Placement of International Medical Graduates...Issues Involving Recruitment and Placement of International Medical Graduates...
Issues Involving Recruitment and Placement of International Medical Graduates...mdtaber
 
Malta OT Erasmus Students 2013
Malta OT Erasmus Students 2013Malta OT Erasmus Students 2013
Malta OT Erasmus Students 2013Rebecca Ferriday
 
Overseas Placement Departure Checklist
Overseas Placement Departure ChecklistOverseas Placement Departure Checklist
Overseas Placement Departure ChecklistRebecca Ferriday
 
Linkoping OT Students 2013
Linkoping OT Students 2013Linkoping OT Students 2013
Linkoping OT Students 2013Rebecca Ferriday
 
02 Network Models(강의용)
02 Network Models(강의용)02 Network Models(강의용)
02 Network Models(강의용)guestafa80f
 
E-Portfolios for International Competence: Introducing Evidence-Based Learni...
E-Portfolios for International Competence:  Introducing Evidence-Based Learni...E-Portfolios for International Competence:  Introducing Evidence-Based Learni...
E-Portfolios for International Competence: Introducing Evidence-Based Learni...HelmOpen
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing marwan aldulaimy
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSAshita Agrawal
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 

En vedette (20)

Issues Involving Recruitment and Placement of International Medical Graduates...
Issues Involving Recruitment and Placement of International Medical Graduates...Issues Involving Recruitment and Placement of International Medical Graduates...
Issues Involving Recruitment and Placement of International Medical Graduates...
 
Chap2
Chap2Chap2
Chap2
 
Ch02
Ch02Ch02
Ch02
 
Cork Autumn 2014
Cork Autumn 2014Cork Autumn 2014
Cork Autumn 2014
 
Lund University Sweden
Lund University SwedenLund University Sweden
Lund University Sweden
 
Malta OT Erasmus Students 2013
Malta OT Erasmus Students 2013Malta OT Erasmus Students 2013
Malta OT Erasmus Students 2013
 
Overseas Placement Departure Checklist
Overseas Placement Departure ChecklistOverseas Placement Departure Checklist
Overseas Placement Departure Checklist
 
Linkoping OT Students 2013
Linkoping OT Students 2013Linkoping OT Students 2013
Linkoping OT Students 2013
 
02 Network Models(강의용)
02 Network Models(강의용)02 Network Models(강의용)
02 Network Models(강의용)
 
E-Portfolios for International Competence: Introducing Evidence-Based Learni...
E-Portfolios for International Competence:  Introducing Evidence-Based Learni...E-Portfolios for International Competence:  Introducing Evidence-Based Learni...
E-Portfolios for International Competence: Introducing Evidence-Based Learni...
 
Ch 02
Ch 02Ch 02
Ch 02
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMS
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Osi model
Osi modelOsi model
Osi model
 
Introduction to Java
Introduction to JavaIntroduction to Java
Introduction to Java
 

Similaire à four

Similaire à four (20)

Osi model
Osi modelOsi model
Osi model
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Osi
OsiOsi
Osi
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
Computer networking
Computer networkingComputer networking
Computer networking
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
cns-unit-4-onlinenotepad.io.pdf
cns-unit-4-onlinenotepad.io.pdfcns-unit-4-onlinenotepad.io.pdf
cns-unit-4-onlinenotepad.io.pdf
 

Plus de م.وائل الزعبي (6)

Full error detection and correction
Full error detection and correctionFull error detection and correction
Full error detection and correction
 
six
sixsix
six
 
five
fivefive
five
 
three
threethree
three
 
tow
towtow
tow
 
one
oneone
one
 

Dernier

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Dernier (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

four

  • 2.  The OSI model is a layered framework for the design of network systems that allows communication between all types of data systems. The OSI model is composed of seven ordered layers:  Layer 1: Physical Layer : The physical layer supports the electrical or mechanical interface to the physical medium and performs services requested by the data link layer. The major functions and services performed by the physical layer are as follows: 1. Establishment and termination of a connection to a communications medium. 2. Participation in the process whereby the communication resources are effectively shared among multiple users (e.g., contention resolution and flow control). 3. Conversion between the representation of digital data in the end user’s equipment and the corresponding signals transmitted over a communications channel .  The physical layer is concerned with the following: 1. Physical characteristics of interfaces and media 2. Representation of bits, transmission rate, synchronization of bits 3. Link configuration 4. Physical topology, and transmission mode Introduction
  • 3.  Layer 2: Data Link Layer : The data link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the physical layer. This layer responds to service requests from the network layer and issues service requests to the physical layer. Specific responsibilities of the data link layer include the following: 1. Framing 2. Physical addressing 3. Flow control 4. Error control 5. Access control  Layer 3: Network Layer : The network layer provides the functional and procedural means of transferring variable-length data sequences from a source to a destination via one or more networks while maintaining the QoS requested by the transport layer. The network layer performs network routing, flow control, segmentation and reassembly, and error control functions. This layer responds to service requests from the transport layer and issues service requests to the data link layer. Specific responsibilities of the network layer include the following: 1. Logical addressing 2. Routing Introduction
  • 4.  Layer 4: Transport Layer : The purpose of the transport layer is to provide transparent transfer of data between end users, thus relieving the upper layers from any concern with providing reliable and cost-effective data transfer.  This layer responds to service requests from the session layer and issues service requests to the network layer. Specific responsibilities of the transport layer include the following: 1. Service-point addressing 2. Segmentation and reassembly 3. Connection control and flow control 4. Error control  Layer 5: Session Layer : The session layer provides the mechanism for managing a dialog between end user application processes. It supports either duplex or half-duplex operations and establishes check pointing, adjournment, termination, and restart procedures. This layer responds to service requests from the presentation layer and issues service requests to the transport layer. Specific responsibilities of the session layer include the following: 1. Dialog control 2. Synchronization Introduction
  • 5.  Layer 6: Presentation Layer : The presentation layer relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. This layer responds to service requests from the application layer and issues service requests to the session layer. Specific responsibilities of the presentation layer include the following: 1. Translation 2. Encryption 3. Compression  Layer 7: Application Layer : The application layer is the highest layer. This layer interfaces directly to and performs common application services for the application processes and also issues requests to the presentation layer.  The common application services provide semantic conversion between associated application processes. Specific services provided by the application layer include the following: 1. Network virtual terminal 2. File transfer, access, and management 3. Mail services 4. Directory services Introduction
  • 6.  The TCP/IP protocol suite provides service to transfer data from one network device to another using the Internet. The TCP/IP protocol suite is composed of five layers:  Physical and Data Link Layers : The physical and data link layers are responsible for communicating with the actual network hardware (e.g., the Ethernet card). Data received from the physical medium are handed over to the network layer, and data received from the network layer are sent to the physical medium. The TCP/IP does not specify any specific protocol at this layer and supports all standard and proprietary protocols.  Network Layer : The network layer is responsible for delivering data to the destination. It does not guarantee the delivery of data and assumes that the upper layer will handle this issue. This layer consists of several supporting protocols :  Internet Protocol (IP) : is a network layer protocol that provides a connectionless, “best effort” delivery of packets through an internetwork. The term best effort means that there is no error checking or tracking done for the sequence of packets being transmitted. It assumes that the higher-layer protocol takes care of the reliability of packet delivery. The packets being transmitted are called datagrams. Each of these datagrams is transmitted independently and may take different routes to reach the same destination. IP supports a mechanism of fragmentation and reassembly of datagrams to handle data links with different maximum-transmission unit (MTU) sizes. TCP/IP Protocol
  • 7.  Internet Control Message Protocol (ICMP) : is a companion protocol to IP that provides a mechanism for error reporting and query to a host or a router. The query message is used to probe the status of host or a router by the network manager whereas the error-reporting message is used by the host and routers to report errors.  Internet Group Management Protocol (IGMP) : is used to maintain multicast group membership within a domain. Similar to ICMP, it uses query and reply messages to maintain multicast group membership in its domain. A multicast router sends a periodic IGMP query message to find out the multicast session members in its domain. If a new host wants to join a multicast group, it sends an IGMP join message to its neighboring multicast router, which takes care of adding the host to the multicast delivery tree.  Dynamic Host Configuration Protocol (DHCP) : is designed to handle dynamic assignments of IP addresses in a domain. This protocol is an extension of the bootstrap protocol (BOOTP) and provides a way for the mobile nodes to request an IP address from a DHCP server in case nodes move to a different network.  This dynamic assignment of IP address is also applicable to the hosts that attach to the network occasionally. It saves precious IP address space by utilizing the same IP address for needed hosts. DHCP is fully compatible with BOOTP, which supports only static binding of physical address to IP address. TCP/IP Protocol
  • 8.  Internet Routing Protocols : Some of the widely used routing protocols at the network layer are routing information protocol (RIP) , open shortest path first (OSPF) , and border gateway protocol (BGP) .  Routing information protocol (RIP): RIP is a distance vector–based interior routing protocol. It uses the Bellman-Ford algorithm (discussed in the following subsection) to calculate routing tables. In distance vector routing, each router periodically shares its knowledge about other routers in the network with its neighbors. Each router also maintains a routing table consisting of each destination IP address, the shortest distance to reach the destination in terms of hop count, and the next hop to which the packet must be forwarded. The current RIP message contains the minimal amount of information necessary for routers to route messages through a network and is meant for small networks.  RIP version 2 enables RIP messages to carry more information, which permits the use of a simple authentication mechanism to update routing tables securely. More important, RIP version 2 supports subnet masks, a critical feature that was not available in RIP TCP/IP Protocol
  • 9. Open shortest path first (OSPF): OSPF is an interior routing protocol developed for IP networks. This protocol is based on the shortest path first (SPF) algorithm, which sometimes is referred to as the Dijkstra algorithm. OSPF supports hierarchical routing, in which hosts are partitioned into autonomous systems (AS). Based on the address range, an AS is further split into OSPF areas that help border routers to identify every single node in the area. The concept of OSPF area is similar to subnetting in IP networks. Routing can be limited to a single OSPF or can cover multiple OSPFs. OSPF is a link-state routing protocol that requires sending link-state advertisements (LSAs) to all other routers within the same hierarchical area. As OSPF routers accumulate link-state information, they use the SPF algorithm to calculate the shortest path to each node. As a link-state routing protocol, OSPF contrasts with RIP, which is a distance vector routing protocol. Routers running the distance vector algorithm send all or a portion of their routing tables in routing-update messages to their neighbors. TCP/IP Protocol
  • 10.  Border gateway protocol (BGP): BGP is an interdomain or interautonomous system routing protocol. Using BGP, interautonomous systems communicate with each other to exchange reachability information.  BGP is based on the Path Vector Routing Protocol, wherein each entry in the routing table contains the destination network, the next router, and the path to reach the destination. The path is an ordered list of autonomous systems that a packet should travel to reach the destination.  TCP : is a connection-oriented reliable transport protocol that sends data as a stream of bytes. At the sending end, TCP divides the stream of data into smaller units called segments. TCP marks each segment with a sequence number.  The sequence number helps the receiver to reorder the packets and detect any lost packets. If a segment has been lost in transit from source to destination, TCP retransmits the data until it receives a positive acknowledgment from the receiver.  TCP can also recognize duplicate messages and can provide flow control mechanisms in case the sender is transmitting at a faster speed than the receiver can handle. TCP/IP Protocol
  • 11.  Application Layer : In TCP/IP the top three layers of OSI—session, presentation, and application layers—are merged into a single layer called the application layer. Some of the applications running at this layer are domain name server (DNS), simple mail transfer protocol (SMTP), Telnet, file transfer protocol (FTP), remote login (Rlogin), and network file system (NFS).  Routing Using Bellman-Ford Algorithm : One step that can take a substantial amount of time is the selection of a route between the source and destination. This is important as appropriate path selection is critical for minimizing communication delays.  The Bellman-Ford algorithm is one of the routing algorithms designed to find shortest paths between two nodes of a given graph (Figure 9.3). TCP/IP Protocol
  • 12. Figure 9.4 Steps in the Bellman-Ford algorithm for the sample network.
  • 14.  Need for TCP over Wireless : The existing Internet employs TCP/IP as its protocol stack. Many of the existing applications require TCP as the transport layer for reliable transfer of data packets.  Accessing the Internet is essential for commercial applications, while voice and other data communications utilize the underlying Internet backbone. For wireless networks to become popular, support for the existing applications and compatibility with the wired Internet must be provided. Therefore, it is imperative that wireless networks also adopt and support TCP for reliable transfer of data.  Limitations of Wired Version of TCP : The primary concern in the use of conventional TCP over wireline networks is packet loss, because congestion can be present at various nodes in the network.  In such systems where congestion is the only source for errors, TCP congestion avoidance mechanisms are extremely useful. However, the same cannot be said about wireless networks, as errors can be introduced due to inherent use of air as a medium of packet transport. Errors can also be attributed to the mobility of users in the network. In such cases, TCP’s congestion-avoidance and error- recovery mechanisms lead to unnecessary retransmissions, thereby leading to inefficient use of available wireless bandwidth. In the following subsection, a summary of the various approaches used to improve the efficiency of TCP over wireless networks is given. These strategies range from modifying link layer modules to using split TCP. TCP over Wireless
  • 15.  Solutions for Wireless Environment : The scarce spectrum imposes a fundamental limit on the performance of the wireless channel, and MSs have limited computing resources and severe energy constraints. Due to these characteristics, a lot of work has been done to optimize the performance of the protocol stack.  Some of the approaches to improving the performance of TCP over wireless links are as follows:  End-to-end protocols attempt to make the TCP sender handle losses through the use of two techniques :  First, they use some form of selective acknowledgments to allow the sender to recover from multiple packet losses in a window, without resorting to a coarse timeout.  Second, they attempt to have the sender distinguish between congestion and other forms of losses using an explicit loss notification (ELN) mechanism. TCP over Wireless
  • 16.  TCP–SACK : Standard TCP uses a cumulative acknowledgment scheme, which does not provide the sender with sufficient information to recover quickly from multiple packet losses within a single transmission window.  A selective acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations. The receiving TCP sends back SACK packets to the sender, informing the sender of the data that have been received. The sender can then retransmit only the missing data segments. If the duplicate segment is received and is part of a larger block of noncontiguous data in the receiver’s data queue, then the next SACK block should be used to specify this larger block.  Wireless wide-area transmission control protocol (WTCP) : WTCP protocol is a reliable transport layer protocol for a network with wireless links. WTCP runs on the BS that is involved in the TCP connection. In this protocol, the BS buffers data from the fixed host and uses separate flow and congestion control mechanisms for the link between itself and the MS. It temporarily hides the fact that a mobile link breakage has occurred by using local retransmissions of the data for which the MS has not sent an ACK. Once it has received an ACK from the MS, it sends this ACK to the fixed host, but only after changing the timestamp value in the ACK, so that the TCP’s round-trip estimation at the fixed sender is not affected. This mechanism effectively hides the wireless link errors from the fixed sender. TCP over Wireless
  • 17.  Freeze-TCP protocol [9.14]: The main idea behind freeze-TCP is to move the onus of signaling an impending disconnection to the client. A mobile node can certainly monitor signal strengths in wireless antennas and detect an impending handoff and, in certain cases, might even be able to predict a temporary disconnection. In such a case, it can advertise a zero window size, to force the sender into zero window probe mode and prevent it from dropping its congestion window.  Explicit bad state notification (EBSN) : Explicit bad state notification uses local retransmission from the BS to shield the wireless link errors and improve performance of TCP over the wireless link. However, while the BS is performing local recovery, the source could still timeout, causing unnecessary source retransmission. The EBSN approach avoids source timeout by using the EBSN message to the source during local recovery. The EBSN message causes the source to reset its timeout value. In this way, timeouts at the source during local recovery are eliminated.  Fast retransmission approach : The fast retransmission approach tries to reduce the effect of MS handoff. Regular TCP at the sender interprets the delay caused by a handoff process to be due to congestion. Therefore, whenever a timeout occurs, its TCP window size is reduced and these packets are retransmitted.  The fast retransmission approach alleviates the retransmission problem by having the MS send a certain number of duplicate acknowledgments to the sender immediately after completing the handoff. This step causes TCP at the sender to reduce its window size immediately and retransmit packets starting from the first missing packet for which the duplicate acknowledgment has been sent, without waiting for the timeout period to expire. TCP over Wireless
  • 18.  Link Layer Protocols : There are two main classes of techniques employed for reliable link layer protocols: 1. Error correction using techniques such as FEC 2. Retransmission of lost packets in response to ARQ messages  Transport unaware link improvement protocol (TULIP) : TULIP provides a link layer that is transparent to the TCP, has no knowledge of the TCP’s state, takes advantage of the TCP’s generous timeouts, and makes efficient use of the bandwidth over the wireless link. TULIP provides reliability only for packets (frames) that require such service (service awareness), but it does not know any details of the particular protocol to which it provides reliable service for packets carrying TCP data traffic and unreliable service for other packet types, such as user datagram protocol (UDP) traffic. TULIP maintains local recovery of all lost packets at the wireless link in order to prevent unnecessary and delayed retransmission of packets over the entire path and a subsequent  reduction in TCP’s congestion window. TCP over Wireless
  • 19.  AIRMAIL protocol : AIRMAIL is the abbreviation of Asymmetric Reliable Mobile Access in Link Layer. This protocol employs a combination of FEC and ARQ techniques for loss recovery. The BS sends an entire window of data before the mobile receiver returns an acknowledgment. The rationale for this approach is not to waste bandwidth on ACKs and to limit the amount of work done by the mobile unit in order to conserve power.  Snoop protocol : In the snoop protocol, a transport layer aware agent, called a snoop agent, is introduced at the BS. The agent monitors the link interface for any TCP segment destined for the MS and caches it if buffer space is available. The BS also monitors the acknowledgments from the MS. A segment loss is detected by the arrival of duplicate acknowledgments from the MS or by a local timeout.  The snoop agent retransmits the lost segment if it has been cached and suppresses the duplicate acknowledgments. The snoop agent essentially hides the link failures in the wireless link by using local retransmissions rather than allowing the TCP sender to invoke congestion avoidance mechanisms and the fast retransmission scheme.  Split TCP Approach : Split connection protocols split each TCP connection between a sender and receiver into two separate connections at the BS—one TCP connection between the sender and the BS, and the other between the BS and the MS. Over the wireless hop, a specialized protocol may be used that can tune into the wireless environment. TCP over Wireless
  • 20.  Indirect-TCP (I-TCP) : I-TCP is a split connection solution that uses standard TCP for its connection over the wireline link. The indirect protocol model for MSs suggests that any interaction from a MS to a fixed host should be split into two separate interactions—one between the MS and its mobile support router (MSR) over the wireless medium and another between the MSR and the fixed host over the fixed network. All the specialized support that is needed for the mobile applications and low-speed and unreliable wireless medium can be built into the wireless side of the interaction while the fixed side is left unchanged at the transport layer. Handoff between two different MSRs is supported on the wireless side without having to reestablish the connection at the new MSR.  M-TCP protocol : In this approach, the BS relays ACKs back to the sender only when the receiver (MS) has acknowledged data; therefore, the end-to-end semantics is maintained, though it also splits up the connection between a sender (fixed host) and a mobile receiver (MS) into two parts: one between fixed host and BS and another between BS and MS, which uses a customized wireless protocol. The receiver can make the sender enter the persist mode by advertising a zero window size in the presence of frequent disconnections. In this case, the sender freezes all packet retransmit timers and does not drop the congestion window so that the idle time during the slow start phase can be avoided. Whenever the BS detects a disconnection or packet loss, it sends back an ACK with a zero window size to force the sender into persist mode and to force it not to drop the congestion window. TCP over Wireless
  • 21.  IPv6 also known as IPng (Internet Protocol next generation) has been proposed to address the unforeseen growth of the Internet and the limited address space provided by IPv4.  Transition from IPv4 to IPv6 :  IPv4 has extensively been used for data communication in wired networks. We introduce this Internet protocol to understand its format. This is important, because a large number of IPv4-hosts and IPv4-routers have been installed and we need to maintain their compatibility.  The IPv4 uses a 32-bit address to provide unreliable and connectionless best effort delivery service. Datagrams (packets in the IP layer) may need to be fragmented into smaller datagrams due to the maximum packet size in some physical networks. It also depends on checksum to protect corruption during the transmission. However, the following are some disadvantages of IPv4: 1. Since the 32-bit address is not sufficient according to the rapidly increased size of the Internet, more address space is needed. 2. Real-time audio and video transmissions are being used increasingly, and they require strategies to minimize transmission delay and resource reservation. Unfortunately, those features are neither provided nor supported by IPv4. 3. IPv4 does not have encryption or authentication. Internet Protocol Version 6 (IPv6)
  • 22.  The transition from IPv4 to IPv6 is supposed to be simple and without any considerable (temporal) dependencies upon other measures. The IETF plans the following transition mechanisms:  The basic principle should be Dual-IP-Stack (i.e., IPv4 hosts and IPv4 routers get an IPv6 stack in addition to their IPv4 stack). This coexistence ensures full compatibility between not yet updated systems, and already upgraded systems make it possible to employ IPv6 for communication right away.  IPv6-in-IPv4 encapsulation: IPv6 datagrams can get encapsulated in IPv4 datagrams enabling IPv6 communication via pure IPv4 topologies. This so-called tunneling of IPv6 packets allows early worldwide employment of IPv6, although not all networks that are part of the communication path support IPv6. The tunnels between two routers must be manually configured, whereas tunnels between hosts and routers may be built up automatically. Tunneling of IPv6 datagrams can be removed as soon as all routers along the respective path have been upgraded with IPv6. Internet Protocol Version 6 (IPv6)
  • 23. Internet Protocol Version 6 (IPv6) Figure 9.5 IPv4 header format. Figure 9.6 Format of IPv6.
  • 24.  Features of IPv6 : IPv6 uses a 128-bit (16-byte) address to identify a host in the Internet. Some of the salient features of IPv6 are as follows:  Address space: An IPv6 address is 128 bits long, which can effectively handle the problems created by a limited IPv4 address space.  Resource allocation: IPv6 supports resource allocation by adding the mechanism of flow label. By using flow label, a sender can request special handling of the packet in the Internet.  Modified header format: IPv6 separates options from the base header. This helps speed up the routing process since most of the options need not be checked by routers.  Support for security: IPv6 supports encryption and decryption options, which provide authentication and integrity.  Differences between IPv6 and IPv4 : The main differences between IPv6 and IPv4 are as follows:  Expanded addressing capabilities: In IPv6 the address space is increased from 32 to 128 bits. This way, more hierarchical address levels are possible and address prefix routing may be used more efficiently. Furthermore, the longer IPv6 addresses allow more devices and simplify address auto-configuration. The multicast capabilities are improved, and a new address type “anycast” is introduced for addressing the nearest interface out of a group of interfaces. Internet Protocol Version 6 (IPv6)
  • 25.  Simplified header format: To optimize the speed of processing an IPv6 packet and to minimize its bandwidth requirements, some fields of the IPv4 header have been eliminated for IPv6 or made optional.  Improved support for options and extensions: A new design concept for IPv6 is the extension header, which means that options and extensions can be more efficiently added, transmitted, and processed. The size of options is not so strictly limited as in IPv4, which facilitates flexibility for installing future options.  Flow labeling capabilities: In IPv6, it is possible to label data flows, which enables the sender to require a special treatment of packets (QoS) by routers on the way to the destination. This may be a non-default QoS or a real-time service for multimedia applications such as audio or video. In particular, the capabilities of ATM can be used effectively.  Support for authentication and encryption: IPv6 supports authentication of the sender (i.e., a form of digital signature) and data encryption.  IPv6 supports mobility and auto configuration. MSs such as laptops are supposed to be reachable everywhere in the Internet with their home IP address, and a computer that is connected to a network is supposed to configure its correct address automatically. Internet Protocol Version 6 (IPv6)
  • 26. Internet Protocol Version 6 (IPv6) Format of IPv6.