Install and manage network protocols-Short note
Install and manage network protocols-Short note
2
LO1 INTRODUCTION TO NETWORK PROTOCOL
3
CONT...
• A protocol is a standardized set of rules for formatting and
processing data. Protocols enable computers to communicate
with one another.
• Network protocols are a set of rules, conventions, and data
structures that dictate how devices exchange data across
networks.
• Network Protocols are a set of rules governing exchange of
information in an easy, reliable and secure way.
• In order for two computers to talk to each other, they must be
speaking the same language.
4
List of Network Protocols
5
Communication
• Communication protocols allow different network devices to communicate with
each other. They are used in both analog and digital communications and can be
used for important processes, ranging from transferring files between devices to
accessing the internet.
• Common types of communication protocols include the following:
• Automation: These protocols are used to automate different processes in both
commercial and personal settings, such as in smart buildings, cloud technology or
self-driving vehicles.
• Instant messaging: Instantaneous, text-based communications on smartphones and
computers occur because of a number of different instant messaging network
protocols.
• Routing: Routing protocols permit communication between routers and other
network devices. There are also routing protocols specifically for ad hoc networks.
• Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and
computers — work due to a variety of different Bluetooth protocols.
• File transfer: If you have ever moved files from one device to another, either via a
physical or digital medium, you’ve used file transfer protocols (FTP).
• Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via
the internet. The internet could not operate as it currently does without IP. 6
Network management
• protocols define and describe the various procedures needed to effectively
operate a computer network. These protocols affect various devices on a
single network — including computers, routers and servers — to ensure
each one, and the network as a whole, perform optimally.
7
Security
• Security protocols, also called cryptographic protocols, work to
ensure that the network and the data sent over it are protected from
unauthorized users.
• Common functions of security network protocols include the
following:
• Encryption: Encryption protocols protect data and secure areas by
requiring users to input a secret key or password in order to access
that information.
• Entity Authentication: Entity authentication protocols create a
system that requires different devices or users on a network to verify
their identity before accessing secure areas.
• Transportation: Transportation security protocols protect data
while it is transported from one network device to another.
8
Here are a few examples of the most commonly used network
protocols:
10
How to implement network protocols
11
Levels of a Protocol
12
Types of Protocols
• Protocols can be broadly divided into the
following two types:
– Standard Protocols
– Proprietary Protocols
13
Standard Protocols
• A standard protocol is a mandated protocol for all
devices. It supports multiple devices and acts as a
standard.
• Standard protocols are not vendor-specific i.e.
they are not specific to a particular company or
organization. They are developed by a group of
experts from different organizations .
• These protocols are publicly available, and we
need not pay for them.
• Some of the examples of Standard Protocols
are FTP, DNS, DHCP, SMTP, TELNET, TFTP, etc.
14
Proprietary Protocols
16
Syntax
• Syntax refers to the structure or format of data
and signal levels. It indicates how to read the data
in the form of bits or fields. It also decides the
order in which the data is presented to the
receiver.
• Example: A protocol might expect that the size of
a data packet will be 16 bits. In which, the first 4
bits are the sender’s address, the next 4 bits are
the receiver’s address, the next 4 bits are the
check-sum bits, and the last 4 bits will contain the
message. So, every communication that is
following that protocol should send 16-bit data.
17
Semantics
18
Timing
• Timing refers to two characteristics:
– when the data should be sent?
– what will be the speed of sending and receiving the
data?
• It performs speed matching, sequencing and flow
control of the data items.
• Example: A sender can send the data at a speed
of 100 Mbps, but the receiver can consume it only
at a speed of 20 Mbps, then there may be data
losses or the packets might get dropped. So,
proper synchronization must be there between a
sender and a receiver.
19
Functions of protocols
20
Cont…
• Encapsulation: It refers to the process of taking
one protocol and transferring it to some other
another protocol.
• Segmentation & Reassembly: It deals with
segmenting the data message i.e. diving the data
into packets when data flows from the upper
protocol layer to lower, and reassembly is vice-
versa of segmentation i.e. all the segmented
packets are recollected in the correct order at the
receiver side.
• Connection Control: It ensures connection
oriented data transfer for lengthy data items.
21
cont...
• Multiplexing: It allows combining multiple transmission unit
signals or channels of higher-level protocols in one transmission unit
of a lower-level protocol. Multiplexing can be upward or downward.
• Ordered Delivery: Protocol facilitates ordered delivery of data, by
providing a unique sequence number to each data packet. It is the
function of the sender to maintain ordered delivery. By doing so, the
receiver will receive the data in the same order as sent by the sender.
• Transmission Services: I t mainly deals with priority, Quality of
Service (QoS), and security of data packets.
• Addressing: It mainly deals with addressing levels, addressing
scope, communication identifiers, and addressing modes.
• Flow Control: It facilitates to limit the flow of data. It is the
function of the receiver's end to maintain flow control of data.
22
cont...
23
There are various types of protocols that support a major and compassionate
role in communicating with different devices across the network. These are:
25
Cont..
• User Datagram Protocol (UDP): UDP is a
substitute communication protocol to Transmission
Control Protocol implemented primarily for
creating loss-tolerating and low-latency linking
between different applications.
• Post office Protocol (POP): POP3 is designed
for receiving incoming E-mails.
• Simple mail transport Protocol (SMTP): SMTP
is designed to send and distribute outgoing E-Mail.
• File Transfer Protocol (FTP): FTP allows users
to transfer files from one machine to another.
Types of files may include program files,
multimedia files, text files, and documents, etc.
26
Cont…
• Hyper Text Transfer Protocol (HTTP): HTTP is designed for
transferring a hypertext among two or more systems. HTML tags are
used for creating links. These links may be in any form like text or
images.
– HTTP is designed on Client-server principles which allow a client system
for establishing a connection with the server machine for making a request.
– The server acknowledges the request initiated by the client and responds
accordingly.
• Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is
abbreviated as Hyper Text Transfer Protocol Secure is a standard
protocol to secure the communication among two computers one
using the browser and other fetching data from web server.
– HTTP is used for transferring data between the client browser (request) and
the web server (response) in the hypertext format, same in case of HTTPS
except that the transferring of data is done in an encrypted format.
– So it can be said that https thwart hackers from interpretation or
modification of data throughout the transfer of packets.
27
Cont…
• Telnet: Telnet is a set of rules designed for
connecting one system with another. The
connecting process here is termed as remote
login.
– The system which requests for connection is the local
computer, and the system which accepts the
connection is the remote computer.
• Gopher: Gopher is a collection of rules
implemented for searching, retrieving as well as
displaying documents from isolated sites.
– Gopher also works on the client/server principle.
28
cont...
29
Cont…
• some other popular protocols act as co-functioning protocols associated
with these primary protocols for core functioning. These are:
• ARP (Address Resolution Protocol)
• DHCP (Dynamic Host Configuration Protocol)
• IMAP4 (Internet Message Access Protocol)
• SIP (Session Initiation Protocol)
• RTP (Real-Time Transport Protocol)
• RLP (Resource Location Protocol)
• RAP (Route Access Protocol)
• L2TP (Layer Two Tunneling Protocol)
• PPTP (Point To Point Tunneling Protocol)
• SNMP (Simple Network Management Protocol)
• TFTP (Trivial File Transfer Protocol)
30
cont...
• ARP (Address Resolution Protocol)
– is a procedure for mapping a dynamic IP address to a permanent physical
machine address in a local area network (LAN). Or IP into MAC
• (RARP) Reverse Address Resolution Protocol is a protocol a
physical machine in a local area network (LAN) can use to request
its IP address.
– It does this by sending the device's physical address to a specialized RARP
server that is on the same LAN and is actively listening for RARP requests.
31
Cont..
32
Border Gateway Protocol (BGP)
• BGP:- version 4 is widely used on the public internet
and by Internet Service Providers (ISP) to maintain
very large routing tables and traffic processing. BGP
is one of the few protocols that have been designed to
deal with the astronomically large routing tables that
must exist on the public Internet.
• User Datagram Protocol (UDP) is a Transport Layer
protocol. UDP is a part of the Internet Protocol suite,
referred to as UDP/IP suite. Unlike TCP, it is
an unreliable and connectionless protocol.
• RDP:-
– It enables you to establish a connection with a remote
computer.
33
SSL
34
What is protocol port
35
Some protocols within their ports
HTTPS 443
POP3 110
NetBIOS 137/138/139
37