Network Protocol
Network Protocol
The OSI 7 layers model has clear characteristics at each layer. Basically,
layers 7 through 4 deal with end to end communications between data
source and destinations, while layers 3 to 1 deal with communications
between network devices. On the other hand, the seven layers of the
OSI model can be divided into two groups: upper layers (layers 7, 6 & 5)
and lower layers (layers 4, 3, 2, 1). The upper layers of the OSI model
deal with application issues and generally are implemented only in
software. The highest layer, the application layer, is closest to the end
user. The lower layers of the OSI model handle data transport issues.
The physical layer and the data link layer are implemented in hardware
and software. The lowest layer, the physical layer, is closest to the
physical network medium (the wires, for example) and is responsible
for placing data on the medium.
The TCP/IP 4-layer model and the key functions of each layer is
described below:
Application Layer
Network Layer
The Internet Protocol (IP) is the primary protocol in the TCP/IP Network
Layer. All upper and lower layer communications must travel through IP
as they are passed through the TCP/IP protocol stack. In addition, there
are many supporting protocols in the Network Layer, such as ICMP, to
facilitate and manage the routing process.
In the TCP/IP architecture, the Data Link Layer and Physical Layer are
normally grouped together to become the Network Access layer.
TCP/IP makes use of existing Data Link and Physical Layer standards
rather than defining its own. Many RFCs describe how IP utilizes and
interfaces with the existing data link protocols such as Ethernet, Token
Ring, FDDI, HSSI, and ATM. The physical layer, which defines the
hardware communication properties, is not often directly interfaced
with the TCP/IP protocols in the network layer and above.
Self learn:
The TCP/IP suite’s core functions are addressing and routing (IP/IPv6 in
the networking layer) and transportation control (TCP, UDP in the
transport layer).
BOOTSTRAP Protocol
Finger
Ex- http:www.google.com
Rwhois
X windows protocol
Request:
Reply:
Event:
Error:
As a result, high-level protocols that need to transmit data all use TCP
Protocol. Examples include peer-to-peer sharing methods like File
Transfer Protocol (FTP), Secure Shell (SSH), and Telnet. It is also used to
send and receive email through Internet Message Access Protocol
(IMAP), Post Office Protocol (POP), and Simple Mail Transfer Protocol
(SMTP), and for web access through the Hypertext Transfer Protocol
(HTTP).
An alternative to TCP is the User Datagram Protocol (UDP), which is
used to establish low-latency connections between applications and
decrease transmissions time. TCP can be an expensive network tool as
it includes absent or corrupted packets and protects data delivery with
controls like acknowledgments, connection startup, and flow control.
UDP does not provide error connection or packet sequencing nor does
it signal a destination before it delivers data, which makes it less
reliable but less expensive. As such, it is a good option for time-
sensitive situations, such as Domain Name System (DNS) lookup, Voice
over Internet Protocol (VoIP), and streaming media.
TCP is then responsible for transporting and routing data through the
network architecture and ensuring it gets delivered to the destination
application or device that IP has defined.