0% found this document useful (0 votes)
85 views

Network Protocols and Services

The document discusses network protocols and services, specifically focusing on the OSI model and TCP/IP model. It provides details on the seven layers of the OSI model and their functions, including the physical, data link, network, transport, session, presentation, and application layers. It also describes some common protocols that operate at each layer, such as TCP and IP in the TCP/IP model. The document aims to provide an overview of these standard network models and their layered architecture to help understand how different protocols enable communication and services.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

Network Protocols and Services

The document discusses network protocols and services, specifically focusing on the OSI model and TCP/IP model. It provides details on the seven layers of the OSI model and their functions, including the physical, data link, network, transport, session, presentation, and application layers. It also describes some common protocols that operate at each layer, such as TCP and IP in the TCP/IP model. The document aims to provide an overview of these standard network models and their layered architecture to help understand how different protocols enable communication and services.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Network Protocols and Services – Providing network services to applications such as

email and Web browsers


Understanding the OSI Model  This layer is concerned with user interaction
 Open Systems Interconnection (OSI) model with the computer and the network
– Presented in 1984 by the International Organization for – Contains many protocols and utilities, such as telnet,
Standardization (ISO) to provides the architectural FTP, HTTP, DNS, SMTP, and SNMP
framework for all of network and computing
communication. 6. Presentation layer
– Based on examination of existing protocols, ISO  Presentation responsibilities
recommended a seven-layer network model – Data translation
– OSI allows different vendors to implement networks – Data formatting
that permit communication among the wide variety of – Data syntax restructuring
network implementations – Data encryption
 The OSI model is not an absolute standard for – Data compression
computer networks  This layer also provides encryption services
– Used as a reference model, a conceptual framework, a when data encryption is used in network
blueprint of how communication should take place. communications

Reasons for Layering 5. Session layer


 Advantages  Session services
– Simplifies the networking model – Control for data exchange (full or half duplex)
– Enables programmers to specialize in a particular level – Clocking or timing
or layer – Failure recovery
– Provides design modularity – Initial link setup and link termination when
– Encourages interoperability communications complete
– Allows networking vendors to produce standardized  The Session layer allows the transfer of a large
interfaces set of data across the network
 Protocol  Examples of Session layer protocols include
– Defined method for communicating between systems NetBIOS, SQL, RPC, and X-Windows
 Computers must use a common protocol to
communicate properly 4. Transport layer
– Examples: TCP/IP and IPX/SPX  Transport responsibilities
Peer OSI Communication – End-to-end, error-free transmission and delivery
 Peer communication between the ultimate sender and ultimate receiver
– Each layer will only talk to its peer on the opposite – Flow control
side of the communications process – Data segmentation into maximum transmission unit
– Each layer is unaware of the activities of all other (MTU) size
layers of the model – Messaging service for the Session layer
– Allows error checking to occur on two separate layers  Protocols that reside at the Transport layer can
simultaneously be connection-oriented or connectionless
 Each layer does provide services to the layer  datagram
above it and receives services from the layer - Data sent by a connectionless transport
below it
– Layers do not acknowledge these 3. Network layer
services in any way  Network functions
– Software/logical addressing for data packets
OSI model 7 layers – Data routing and connectivity
 For IT professionals, – Best path selection
this a conceptual framework that  Protocols at the Network layer allow computers
describes the functions of a networking to route packets to remote networks using a
or telecommunication system. logical address
- Keith Shaw
7. Application layer 2. Data Link layer
 Application responsibilities  Network functions
– Initiating the request for network services – Software/logical addressing for data packets
– Data routing and connectivity
– Best path selection
 Protocols at the Network layer allow computers to
route packets to remote networks using a logical
address

1. Physical layer
 Physical responsibilities
– Defines the physical characteristics of the network
hardware, including cable and connectors
– Represents binary digits as voltages (encoding)
– Transmits signals on the wire
 Physical layer example:
EIA/TIA:
Electronic Industrial Association /
Telecommunication Industrial Association
The 568B specification define a wiring system for data-
grade cable

Note for OSI Model


 The four lower layers (called the data flow layers)
define connection protocols and methods for
exchanging data.
 The three upper layers (called the application layers)
define how the applications within the end stations
communicate with each other and with users.

What is TCP/IP model?


 Internet Protocol (IP) is the primary OSI network
layer (layer three) protocol that provides addressing,
datagram routing and other functions in an
internetwork.
 Transmission Control Protocol (TCP) is the
primary transport layer (layer four) protocol, and is
responsible for connection establishment and
management and reliable data transport between
software processes on devices.

How the TCP/IP model works?


4 layers of TCP/IP model send e-mail while POP3 (Post Office Protocol ver.3)
is used to deliver email
 Terminal emulation protocol (telnet port #23) -
Enables a user on a remote host called telnet client
to access resources on a telnet server as if it was
directly attached to it.
 Remote login application (rlogin) - allows you to
gain access to TCP/IP hosts that support rlogin. This
command-line utility allows you to navigate and
manipulate a remote computer’s directory structure.
 Simple Network Management Protocol (SNMP) -
is a connectionless protocol that permits remote
tracking and management of TCP/IP hosts.
 Domain Name System (DNS port #53) - service
provides TCP/IP host name to IP address resolution.
 Dynamic Host Configuration (DHCP port #67 &
68) - assigns IP addresses to hosts. It allows easier
administration and works well in the small to even
very large network environments.

 Hypertext Transfer Protocol (HTTP port #80) -


This connection-oriented protocol allows you to
connect your computer to other computers on the
Internet and view Web page content. Used to fetch a
4. Application layer website from a web server.
Defines protocols for node-to-node application
communication and provide services to the application 3. Transport layer
software running on a computer. Protocols at the TCP/IP • defines protocols for setting up the level of
Application layer include: transmission service for applications. This layer is
– File Transfer Protocol (FTP port #21 - data transfer, responsible for reliable transmission of data and the
port #2 - control port) error-free delivery of packets. Protocols such:
– Trivial File Transfer Protocol (TFTP port #69) – TCP provides reliable, connection-oriented
– Network File System (NFS port #119) communications between two hosts. Requires more
– Simple Mail Transfer Protocol (SMTP port #25 ) network overhead
– Terminal emulation protocol (telnet port #23 ) – UDP provides connectionless datagram services
– Remote login application (TCP rlogin port #513) between two hosts. Faster but less reliable. Reliability is
– Simple Network Management Protocol (SNMP) left to the Application layer
– Domain Name System (DNS port #53 – TCP & UDP ) Ports:
– Hypertext Transfer Protocol (HTTP port #80 ) – TCP and UDP use port numbers for communications
– Dynamic Host Configuration(DHCP port #67 & 68) between hosts
 File Transfer Protocol (FTP port #21) - sends data
2. Internet layer
over a reliable connection. Allows
• defines the protocols for the logical transmission of
uploading/downloading and transfer of files from
packets over the network.
one computer to another reliably.
• Four main protocols function:
 Trivial File Transfer Protocol (TFTP) - sends data
1. Internet Protocol (IP) - provides a
using an unreliable connection. This protocol
connectionless delivery service.
functions similarly to FTP, but is faster and less
2. Internet Control Message Protocol (ICMP) -
reliable.
controls and manages IP communications.
 Network File System (NFS) - is a distributed file 3. Address Resolution Protocol (ARP) - resolves
system developed by Sun Microsystems that allows IP addresses to MAC addresses for source hosts
data to be shared across a network, regardless of the that know the IP address of the destination host
type of computer, operating system, network but not the MAC address.
architecture, or protocol. 4. Reverse Address Resolution Protocol (RARP)
 Simple Mail Transfer Protocol (SMTP port #25) - - provides IP address to MAC address resolution
is the messaging or e-mail transfer protocol. Used to
in a manner similar to that of ARP, but does so o Especially a relatively large network or one that
under different circumstances. is expected to grow
 Each layer of the model is involved in specific
1. Network access or Link layer functions
• defines the protocols and hardware required to deliver o Is typically defined by a particular type of device
data across a physical network.  The three layers of the model from bottom up are
• The MAC address, network card drivers, and specific Access, Distribution, and Core
interfaces for the network card function at this level
• No specific IP functions exist at this layer
– Because the layer’s focus is on communication with
the network card and other networking hardware

Data Encapsulation and De-encapsulation in network


The Cisco Three-Layer Hierarchical Model

 Encapsulation
– Data is sent from one computer to another in a data
packet. Each layer in the protocol stack may add a
protocol data unit (PDU) to the data as it is passed down
the layers.
Access Layer

 The layer closest to the users, where it is attach to the


network
 Router is the device that can be used if the network is
very small
o But typically a hub or layer 2 switch
  De-encapsulation  Sometimes called the desktop layer because it deals with
– Header and trailer added by a layer in the sending connecting workstations to the network
computer can be removed only by the peer layer in the  Frames are delivered to the users at this layer
receiving computer.
Distribution Layer
 Separates the Access layer from the Core layer
 Implements network policies, and provides many
networking services such as Network Address Translation
(NAT), firewall protection, and quality of service (QoS)
 IP addressing hierarchy is managed at this layer
 IP addressing is the process of assigning unique IP
addresses to devices on the network
 It involves all of the router functions which provides
almost all of the connectivity tasks
Core Layer
The
 Responsible for switching large amounts of data quickly
and efficiently
 To prevent slowing down the switching process, this layer
should not be burdened with security or traffic control
measures or any unnecessary additional equipment
 high-end layer 3 switch - primary device used at this
layer. The backbone of the network and typically connects
the user to corporate resources, servers, gateway and the
Internet.

Cisco Three-Layer Hierarchical Model


Cisco Three-Layer Hierarchical model
 Does not describe how communications take place
o Focuses on how best to design a network

You might also like