Intenrnet Protocols and Network Hardware2
Intenrnet Protocols and Network Hardware2
What is a Protocol?
Protocols are basically sets of rules
Protocol is a controlled
Protocol Functions ; sequence of messages that is
exchanged between two or
•Identifies errors. more systems to accomplish a
•Applies compression techniques given task.
•Decides on;
•How to announce sent data Protocol specifications define
•How to announce received data. this sequence together with
•How to address data. the format or layout of the
•How the data is to be sent.
messages that are
exchanged.
Protocols – basically sets of rules
Layer
1. Physical Modem ; represents the basic communication bit by bit.
01010101
Primary bit
ISO stands for International organization of Standardization
Open System Interconnection (OSI)
Feature of OSI Model :
Big picture of communication over
network is understandable through
this OSI model.
We see how hardware and software
work together.
We can understand new
technologies as they are developed.
Troubleshooting is easier by
separate networks.
Can be used to compare basic
functional relationships on different
networks.
Functions of Different Layers :
Data link layer synchronizes the This layer sends and expects
information which is to be acknowledgements for frames
transmitted over the physical layer. received and sent respectively.
The main function of this layer is to Resending of non-
make sure data transfer is error acknowledgement received frames
free from one node to another, over is also handled by this layer.
the physical layer. This layer establishes a logical
Transmitting and receiving data layer between two nodes and also
frames sequentially is managed by manages the Frame traffic control
this layer. over the network. It signals the
transmitting node to stop, when the
frame buffers are full.
Layer 4: Transport Layer
Ehernet needs:
In any network
there is NIC
(Network
Interface card)
contains MAC
address for every
computer (fixed)
MAC ( Media
Access Control)
MAC 1
• MAC: unique
NO. given to
the computer
when
connected to
MAC 2
LAN.
• IP: unique No.
given to the
computer when
connected to
Hub with WAN.
MAC 3
16 ports
Packets Handshaking
TCP/IP
Source IP Distance IP
Distance IP
Source
• No Handshaking
• Appropriate for real time applications such as; Internet television &
video on demand.
Client –server.
Client encrypted Web server
Client –server.
4. Telnet ; telecommunication network protocol.
Client Server
telnet software telnet software
• No security
When you download a web page like this one, your computer connects
to the web server and downloads the data directly from that server.
Each computer that downloads the data downloads it from the web
page’s central server. This is how much of the traffic on the web works.
BitTorrent is a peer-to-peer protocol, which means that the
computers in a BitTorrent “swarm” (a group of computers
downloading and uploading the same torrent) transfer data
between each other without the need for a central server.
Traditionally, a computer joins a BitTorrent swarm by loading a torrent file
into a BitTorrent client.
The BitTorrent client contacts a “tracker” specified in the torrent file.
The tracker is a special server that keeps track of the connected computers.
The tracker shares their IP addresses with other BitTorrent clients in the
swarm, allowing them to connect to each other.
Once connected, a BitTorrent client downloads bits of the files in the torrent
in small pieces, downloading all the data it can get. Once the BitTorrent
client has some data, it can then begin to upload that data to other
BitTorrent clients in the swarm. In this way, everyone downloading a torrent
is also uploading the same torrent. This speeds up everyone’s download
speed. If 10,000 people are downloading the same file, it doesn’t put a lot of
stress on a central server. Instead, each downloader contributes upload
bandwidth to other downloaders, ensuring the torrent stays fast.
TASK
Research some of these protocols:
SMTP PPP
Telnet
UDP