0% found this document useful (0 votes)
66 views104 pages

Networking Protocols

test

Uploaded by

Bam Guerrero
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views104 pages

Networking Protocols

test

Uploaded by

Bam Guerrero
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 104

PROTOCOLS

Rules That Govern


Communications
PROTOCOL SUITE
Network Protocols
• The format of the message, such as how
much data to put into each segment
• The way intermediary devices share
information about the path to the
destination
• The method to handle update messages
between intermediary devices
• The process to initiate and terminate
communications between hosts
Protocol Suites and
Industry Standards
Protocol Suites and Industry Standards
The organizations that standardize networking
protocols are the Institute of Electrical and Electronics
Engineers (IEEE) and the Internet Engineering Task
Force (IETF).
Example: Interaction of Protocols
• Hypertext Transfer Protocol (HTTP)
• Transport Protocol (TCP)
• Internetwork Protocol (IP)
• Network Access Protocols
• Data-link Management Protocols
• Physical Transmission of Data on the Media
Layered Models
The IT industry uses layered models to
describe the complex process of network
communication. Protocols for specific
functions in the process are grouped by
purpose into well-defined layers.
The Benefits of a Layered Model
Defines common terms that describe
the network functions to those working
in the industry and allows greater
understanding and cooperation.
The Benefits of a Layered Model
Segments the process to allow
technologies performing one function
to evolve independently of
technologies performing other
functions. For example, advancing
technologies of wireless media is not
dependent on advances in routers.
The Benefits of a Layered Model
Fosters competition because products
from different vendors can work
together.
The Benefits of a Layered Model
Provides a common language to
describe networking functions and
capabilities.
The Benefits of a Layered Model
Assists in protocol design, because
protocols that operate at a specific
layer have defined information that
they act upon and a defined interface
to the layers above and
below.
The Benefits of a Layered Model
As a student, you will benefit from the
layered approach as you build your
understanding of the network
communication process.
Protocol and
Reference Models
Two Networking Models to
Communicate within the Industry:
Protocol Models and Reference Models.
Protocol Model
• It provides a model that closely
matches the structure of a particular
protocol suite.
• The TCP/IP model is a protocol model
because it describes the functions
that occur at each layer of protocols
within the TCP/IP suite.
Reference Model
• It provides a common reference for
maintaining consistency within all
types of network protocols and
services.
Reference Model
• It is not intended to be an
implementation specification or to
provide a sufficient level of detail to
define precisely the services of the
network architecture.
Reference Model
• The primary purpose of a reference
model is to aid in clearer
understanding of the functions and
process involved.
Reference Model
• The Open Systems Interconnection
(OSI) model is the most widely known
internetwork reference model.
TCP/IP vs. ISO OSI Model
The OSI model describes the entire
communication process in detail, and
the TCP/IP model describes the
communication process in terms of the
TCP/IP protocol suite and the way it
functions.
TCP/IP vs. ISO OSI Model
It is important to know details of the
OSI model to understand the entire
network communication process and to
know the TCP/IP model to understand
how the process is implemented in
current networks.
TCP/IP vs. ISO OSI Model
The OSI model is used to reference the
process of communication, not to
regulate it.

Some of the layers of the OSI model are


combined in the TCP/IP model
ISO OSI Model TCP/IP Model
TCP/IP Model
Application Layer
Transport Layer
Internet Layer
Network Access Layer
TCP/IP Model
The rules and implementations of the
TCP/IP model were cooperatively
developed by members of the industry
using Request for Comments (RFC)
documents.
TCP/IP Model
Communication Process
1. Creation of data at the application
layer of the originating source end
device.
2. Segmentation and encapsulation of
data as it passes down the protocol
stack in the source end device.
Communication Process
3. Generation of the data onto the
media at the network access layer
of the stack.
4. Transportation of the data through
the internetwork, which consists of
media and any intermediary
devices.
Communication Process
5. Reception of the data at the network
access layer of the destination end
device.
6. Decapsulation and reassembly of the
data as it passes up the stack in the
destination device. You learn more about
the encapsulation and decapsulation
processes in the next section.
Communication Process
7. Passing this data to the destination
application at the application layer
of the destination end device.
Protocol Data Units
and Encapsulation
Header or Control Data
Encapsulation and Decapsulation
Encapsulation
It is the process of adding control
information as it passes through the
layered model.
Decapsulation
It is the process of removing the extra
information and sending only the
original application data up to the
destination application layer.
Protocol Data Unit (PDU)
It is the generic term for data at each
level, but it is different at each layer.

e.g. a PDU at the internetwork layer is


different from the PDU at the transport
layer, because internetwork layer data
has been added to the transport layer
data.
Protocol Data Unit (PDU)
Encapsulation
Sending and Receiving Process
1. An end user, using an e-mail
application, creates data. The
application layer codes the data as
e-mail and sends the data to the
transport layer.
Sending and Receiving Process
2. The message is segmented, or broken
into pieces, for transport. The transport
layer adds control information in a
header so that it can be assigned to the
correct process and all segments put into
proper order at the destination. The
segment is sent down to the
internetwork layer.
Sending and Receiving Process
3. The internetwork layer adds IP
addressing information in an IP
header. The segment is now an
addressed packet that can be
handled by routers en route to the
destination. The internetwork layer
sends the packet down to the
network access layer.
Sending and Receiving Process
4. The network access layer creates an
Ethernet frame with local network
physical address information in the
header. This enables the packet to get to
the local router and out to the web. The
frame also contains a trailer with error-
checking information. After the frame is
created, it is encoded into bits and sent
onto the media to the destination.
Sending and Receiving Process
5. At the destination host, the process
is reversed. The frame is
decapsulated to a packet, then to a
segment, and then the transport
layer puts all segments into the
proper order.
Sending and Receiving Process
6. When all data has arrived and is
ready, it is sent to the application
layer, and then the original
application data goes to the
receiver’s e-mail application. The
message is successful.
OSI Model
Application Layer Transport Layer
Presentation Layer Network Layer
Session Layer Data Link Layer
Physical Layer
OSI Model
The Open Systems Interconnection
(OSI) model, known as the OSI model,
provides an abstract description of the
network communication process.
OSI Model
It was developed by the International
Organization for Standardization (ISO)
to provide a road map for
nonproprietary protocol development.
OSI Model
The communication process begins at
the application layer of the source, and
data is passed down to each lower
layer to be encapsulated with
supporting data until it reaches the
physical layer and is put out on the
media.
Comparing the OSI Model to the TCP/IP Model
OSI Model TCP/IP Model
Network Addressing
Addressing in the Network
Addressing of data happens in three
different layers of the OSI model.

The PDU at each layer adds address


information for use by the peer layer at
the destination.
Addressing in the Network
Getting Data to the End Device
• During the process of encapsulation,
address identifiers are added to the
data as it travels down the protocol
stack on the source host.
• There are two layers of addressing
added to ensure that data is delivered
to the destination.
Getting Data to the End Device
• During the process of encapsulation,
address identifiers are added to the
data as it travels down the protocol
stack on the source host.
• There are two layers of addressing
added to ensure that data is delivered
to the destination.
Getting Data to the End Device
The Host Physical Address
• It is contained in the header of the Layer
2 PDU, called a frame.
• Layer 2 is concerned with the delivery of
messages on a single local network.
• The Layer 2 address is unique on the
local network and represents the
address of the end device on the
physical media.
Getting Data to the End Device
• The physical address comes from codes
placed on the NIC by the manufacturer.
• In a LAN using Ethernet, this address is
called the MAC address.
• When two end devices communicate on
the local Ethernet network, the frames
that are exchanged between them
contain the destination and source MAC
addresses.
Getting Data to the End Device
• After a frame is successfully received by
the destination host, the Layer 2
address information is removed as the
data is decapsulated and moved up the
protocol stack to Layer 3.
Getting Data Through the Internetwork
• Layer 3 protocols are primarily
designed to move data from one local
network to another local network
within an internetwork.
Getting Data Through the Internetwork
The IP Address
• In the TCP/IP protocol suite, every IP
host address contains information about
the network where the host is located.
• At the boundary of each local network,
an intermediary network device, usually
a router, decapsulates the frame to read
the destination host address contained
in the header of the packet, the Layer 3
PDU.
Getting Data Through the Internetwork
• Routers use the network identifier
portion of this address to determine
which path to use to reach the
destination host.
• When the path is determined, the
router encapsulates the packet in a new
frame and sends it on its way toward
the destination end device.
Getting Data Through the Internetwork
• When the frame reaches its final
destination, the frame and packet
headers are removed and the data
moved up to Layer 4.
Getting Data Through the Internetwork
Getting Data to the Right Application
• The transport layer adds port numbers to
its segment header information to ensure
that the destination host knows which
application process is to receive the
packet.
Getting Data to the Right Application
• The transport layer adds port numbers to
its segment header information to ensure
that the destination host knows which
application process is to receive the packet.
Getting Data to the Right Application
The Port Number
• The end host assigns a port number to each
type of traffic going in and out.
• A user can send and receive many types of
traffic over a single network interface, and
using port numbers for each segment keeps
traffic for web pages separate from e-mail
traffic and so on.
• The segment contains both source and
destination ports in case the receiver needs to
contact the sender.
Getting Data to the Right Application
Application Layer
Application Layer Transport Layer
Presentation Layer Network Layer
Session Layer Data Link Layer
Physical Layer
Interfacing Human and Data Networks
Application Layer
• The application layer of the OSI model
provides the first step of getting data onto
the network.
Application Software
• Applications are the software programs
used by people to communicate over the
network.
• Examples of application software, including
HTTP, FTP, e-mail, and others, are used to
explain the differences between these two
concepts.
OSI and TCP/IP Model
Application Layer
• Layer 7 provides the interface between
the applications you use to
communicate and the underlying
network over which your messages are
transmitted.
• Application layer protocols are used to
exchange data between programs
running on the source and destination
hosts.
Application Layer
Three Primary Functions
1. Coding and conversion of application
layer data to ensure that data from the
source device can be interpreted by
the appropriate application on the
destination device.
Three Primary Functions
2. Compression of the data in a manner
that can be decompressed by the
destination device.
Three Primary Functions
3. Encryption of the data for transmission
and decryption of data upon receipt by
the destination.
Examples
Video
• QuickTime
• Motion Picture Experts Group (MPEG)
Examples
Graphic Image Formats
• Graphics Interchange Format (GIF)
• Join Photographic Experts Group
(JPEG)
• Tagged Image File Format (TIFF)
Session Layer
It creates and maintain dialogs between
source and destination applications.

It handles the exchange of information to


initiate dialogs and keep them active, and
to restart sessions that are disrupted or
idle for a long period of time.
SEATWORK
TCP/IP Application Layer Protocols
• Domain Name System (DNS)
• Hypertext Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
• Telnet
• File Transfer Protocol (FTP)
Application Layer
Software
Two Forms of Software Programs or Processes
• Applications
• Services
Software Processes
Network-Aware Applications
Some end-user applications are
network aware, meaning that they
implement the application layer
protocols and are able to communicate
directly with the lower layers of the
protocol stack. E-mail clients and web
browsers are examples of these types
of applications.
Application Layer Services
Different types of data—whether it is
text, graphics, or video—require
different network services to ensure
that it is properly prepared for
processing by the functions occurring
at the lower layers of OSI model.
User Applications, Services, and
Application Layer Protocols
Interfacing Human and Data Networks
Application Layer
protocols specify..
• what messages are exchanged between the source and
destination hosts,
• the syntax of the control commands,
• the type and format of the data being transmitted, and
• the appropriate methods for error notification and
recovery.
Application Layer Protocol Functions
Protocols perform the following tasks:
• Establish consistent rules for exchanging data between
applications and services loaded on the participating
devices.
Application Layer Protocol Functions
Protocols perform the following tasks:
• Specify how data inside the messages is structured and the
types of messages that are sent between source and
destination. These messages can be requests for services,
acknowledgments, data messages, status messages, or
error messages.
Application Layer Protocol Functions
Protocols perform the following tasks:
• Define message dialogues, ensuring that a message being
sent is met by the expected response and that the correct
services are invoked when data transfer occurs.
Making Provisions for
Applications and Services
Client/Server Model
Servers
Application Layer Services and Protocols
Peer-to-Peer (P2P) Networking and Applications
P2P Applications
Application Layer Protocols and
Services Examples
DNS Services and Protocol
How DNS Works
DNS Service Hierarchy
WWW Service and HTTP

The Browser interprets the three parts of the URL


•The protocol or scheme
•The server name
•The specific filename requested
WWW Service and HTTP

Three Most Common Message Types:


•GET
•POST
•PUT
WWW Service and HTTP

You might also like