0% found this document useful (0 votes)
21 views8 pages

Lecture 2

This document discusses network standards and protocols. It describes how standards bodies like IEEE and IETF define protocols to allow different operating systems to communicate over networks. It explains how protocols like TCP, IP, and HTTP interact and are layered, with higher level protocols using lower level protocols to transmit data. It provides details on the seven layers of the OSI model and what functions each layer performs, such as the physical layer handling physical connections and the application layer providing end-user services.

Uploaded by

jasmhmyd205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views8 pages

Lecture 2

This document discusses network standards and protocols. It describes how standards bodies like IEEE and IETF define protocols to allow different operating systems to communicate over networks. It explains how protocols like TCP, IP, and HTTP interact and are layered, with higher level protocols using lower level protocols to transmit data. It provides details on the seven layers of the OSI model and what functions each layer performs, such as the physical layer handling physical connections and the application layer providing end-user services.

Uploaded by

jasmhmyd205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Lecture_2

NETWORK STANDARDS

Protocol Suites and Industry Standards

• Electrical and Electronics Engineers (IEEE) and the


Internet Engineering Task Force (IETF).

• Microsoft, Apple, and Linux operating systems each


have a way to implement the TCP/IP protocol stack.
This allows the users of different operating systems to
have common access to network communication.
Interaction of Protocols

• Hypertext Transfer Protocol (HTTP)


• Transport protocol Transmission Control Protocol (TCP)
Internetwork protocol Internet Protocol (IP)
Network access protocols two primary functions: data-link
management and the physical transmission of data on the media

Layered Models
 Defines common terms that describe the network functions to those
working in the industry and allows greater understanding and
cooperation.
 Segments the process to allow technologies performing one function
to evolve independently of technologies performing other functions.
For example, advancing technologies of wireless media is not
dependent on advances in routers.
 Fosters competition because products from different vendors can
work together.
 Provides a common language to describe networking functions and
capabilities.
 Assists in protocol design, because protocols that operate at a
specific layer have defined information that they act upon and a
defined interface to the layers above and below.
TCP/IP models

Protocol Data Units and Encapsulation

Some People Fear Birthday


Sending and Receiving Process

OSI Model
7. Application Layer
The application layer is used by end-user software such as web browsers
and email clients. It provides protocols that allow software to send and
receive information and present meaningful data to users. A few examples
of application layer protocols are the Hypertext Transfer Protocol (HTTP),
File Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer
Protocol (SMTP), and Domain Name System (DNS).
6. Presentation Layer
The presentation layer prepares data for the application layer. It defines
how two devices should encode, encrypt, and compress data so it is
received correctly on the other end. The presentation layer takes any data
transmitted by the application layer and prepares it for transmission over
the session layer.

5. Session Layer
The session layer creates communication channels, called sessions, between
devices. It is responsible for opening sessions, ensuring they remain open and
functional while data is being transferred, and closing them when
communication ends. The session layer can also set checkpoints during a data
transfer—if the session is interrupted, devices can resume data transfer from
the last checkpoint.
4. Transport Layer
The transport layer takes data transferred in the session layer and breaks it
into “segments” on the transmitting end. It is responsible for reassembling the
segments on the receiving end, turning it back into data that can be used by
the session layer. The transport layer carries out flow control, sending data at a
rate that matches the connection speed of the receiving device, and error
control, checking if data was received incorrectly and if not, requesting it
again.
3. Network Layer
The network layer has two main functions. One is breaking up segments into network
packets, and reassembling the packets on the receiving end. The other is routing packets
by discovering the best path across a physical network. The network layer uses network
addresses (typically Internet Protocol addresses) to route packets to a destination node.
2. Data Link Layer
The data link layer establishes and terminates a connection between two physically-
connected nodes on a network. It breaks up packets into frames and sends them from
source to destination. This layer is composed of two parts—Logical Link Control (LLC),
which identifies network protocols, performs error checking and synchronizes frames, and
Media Access Control (MAC) which uses MAC addresses to connect devices and define
permissions to transmit and receive data.
1. Physical Layer
The physical layer is responsible for the physical cable or wireless connection between
network nodes. It defines the connector, the electrical cable or wireless technology
connecting the devices, and is responsible for transmission of the raw data, which is
simply a series of 0s and 1s, while taking care of bit rate control.

TCP/IP Application Layer Protocols


Domain Name System (DNS) is used to resolve
Internet names to IP addresses.
Hypertext Transfer Protocol (HTTP) is used to
transfer files that make up the web pages of the
World Wide Web.
Simple Mail Transfer Protocol (SMTP) is used for the
transfer of mail messages and attachments.
Telnet, a terminal emulation protocol, is used to
provide remote access to servers and networking
devices.
File Transfer Protocol (FTP) is used for interactive file
transfer between systems.
Application Layer Protocols and
Services
• ■ Domain Name System (DNS): TCP/UDP port 53
• ■ HTTP: TCP port 80
• ■ Simple Mail Transfer Protocol (SMTP): TCP port
25
• ■ Post Office Protocol (POP): UDP port 110
• ■ Telnet: TCP port 23
• ■ DHCP: UDP port 67
• ■ FTP: TCP ports 20 and 21

You might also like