100% found this document useful (1 vote)
41 views25 pages

Intenrnet Protocols and Network Hardware2

The document discusses internet protocols and how they enable communication across networks and the internet. It describes the layers of the OSI model and the functions of common protocols like TCP/IP and HTTP. The document contains detailed information about protocols and how they establish rules for network communication.

Uploaded by

mohannad awad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
41 views25 pages

Intenrnet Protocols and Network Hardware2

The document discusses internet protocols and how they enable communication across networks and the internet. It describes the layers of the OSI model and the functions of common protocols like TCP/IP and HTTP. The document contains detailed information about protocols and how they establish rules for network communication.

Uploaded by

mohannad awad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

Internet Protocols

What is a Protocol?
Protocols are basically sets of rules

 Protocol is a controlled
Protocol Functions ; sequence of messages that is
exchanged between two or
•Identifies errors. more systems to accomplish a
•Applies compression techniques given task.
•Decides on;
•How to announce sent data  Protocol specifications define
•How to announce received data. this sequence together with
•How to address data. the format or layout of the
•How the data is to be sent.
messages that are
exchanged.
Protocols – basically sets of rules

 Network Communication Protocol – a way (that is the same for


everyone) for transmitting data from one computer to another across a
network.

– Network – computers are linked together to


communicate and share information.
 Network engineers write rules for computers to follow in order to
communicate with each other. These must always be followed in exactly
the same way.
 There are many different types of protocol to allow for different types of
data
Protocol services

There are a number of models representing the Internet group of


protocols. One has seven layers , another has five and the original
had four.

Layer
1. Physical Modem ; represents the basic communication bit by bit.

01010101
Primary bit
ISO stands for International organization of Standardization
 Open System Interconnection (OSI)
 Feature of OSI Model :
 Big picture of communication over
network is understandable through
this OSI model.
 We see how hardware and software
work together.
 We can understand new
technologies as they are developed.
 Troubleshooting is easier by
separate networks.
 Can be used to compare basic
functional relationships on different
networks.
Functions of Different Layers :

Layer 1: The Physical Layer :

 It is the lowest layer of the OSI Model.


 It activates, maintains and deactivates the physical connection.
 It is responsible for transmission and reception of the unstructured raw
data over network.
 Voltages and data rates needed for transmission is defined in the
physical layer.
 It converts the digital/analog bits into electrical signal or optical signals.
 Data encoding is also done in this layer.
Layer 2: Data Link Layer

 Data link layer synchronizes the  This layer sends and expects
information which is to be acknowledgements for frames
transmitted over the physical layer. received and sent respectively.
 The main function of this layer is to Resending of non-
make sure data transfer is error acknowledgement received frames
free from one node to another, over is also handled by this layer.
the physical layer.  This layer establishes a logical
 Transmitting and receiving data layer between two nodes and also
frames sequentially is managed by manages the Frame traffic control
this layer. over the network. It signals the
transmitting node to stop, when the
frame buffers are full.
Layer 4: Transport Layer

 It decides if data transmission should be on parallel path or single


path.
 Functions such as Multiplexing, Segmenting or Splitting on the
data are done by this layer
 It receives messages from the Session layer above it, convert the
message into smaller units and passes it on to the Network layer.
 Transport layer can be very complex, depending upon the
network requirements.
 Transport layer breaks the message (data) into small units so that
they are handled more efficiently by the network layer.
Layer 5: The Session Layer Layer 6: The Presentation
 Session layer manages and  Presentation layer takes care that the data
synchronize the conversation is sent in such a way that the receiver will
between two different understand the information (data) and will
applications. be able to use the data.
 While receiving the data, presentation layer
 Transfer of data from source transforms the data to be ready for the
to destination session layer application layer.
streams of data are marked
 Languages(syntax) can be different of the
and are resynchronized two communicating systems. Under this
properly, so that the ends of condition presentation layer plays a role of
the messages are not cut translator.
prematurely and data loss is  It perfroms Data compression, Data
avoided. encryption, Data conversion etc.
Layer 7: Application Layer :

 It is the topmost layer.


 Transferring of files disturbing the results to the user is
also done in this layer. Mail services, directory services,
network resource etc are services provided by application
layer.
 This layer mainly holds application programs to act upon
the received and to be sent data.
2. Data Link - Controls the sending of data in a LAN (local Area
Network).
- Wifi and Ehernet Protocol

Ehernet needs:

In any network
there is NIC
(Network
Interface card)
contains MAC
address for every
computer (fixed)
MAC ( Media
Access Control)
MAC 1
• MAC: unique
NO. given to
the computer
when
connected to
MAC 2
LAN.
• IP: unique No.
given to the
computer when
connected to
Hub with WAN.
MAC 3
16 ports

1. Active Hub; 100 m refreshes the signal to


avoid deterioration of signals.
2. Passive Hub; Passes signal as it is .
 Hub: a device that connects computers together in a network
and distributes data from one device to the others on the
network.

 Router: A network device used to connect a LAN to a WAN. It


handles any differences in the protocols being used by the
WAN and LAN, and directs data packets to the correct network.
3. Network / Internet

Internet Protocol (IP address).


Assigns unique address for every computer connected to the internet
Every IP address is represented by 4 bytes

255 255 255 255


4. Transport

1. TCP/IP ( Transmission control Protocol)


e.mail , www & File transfer
Packet
Header
1
Source IP
message Distance IP Distance IP
sequencel
Packet
Header
2

Packets Handshaking
TCP/IP

 Transmission Control  Internet Protocol,


Protocol, manages the handles the address
assembling of a part of each packet so
message or file into that it gets to the right
smaller packets that are destination
transmitted over the
Internet and received by
a TCP layer that
reassembles the packets
into the original message
TCP:
1.Responsible of dividing the message into switched
packets.
2.Ensures all the messages are sent accurately.
3.Ensures all the message is received in correct order/
correct destination.
4.Ensures any duplication is removed.
2. UDP: User Datagram Protocol
Connectionless service.

Source IP Distance IP
Distance IP
Source

• No Handshaking
• Appropriate for real time applications such as; Internet television &
video on demand.

Why TCP is not appropriate for real time applications?

Because it contains a congestion control mechanism , it limits the speed


of data transfer so bandwidth is reduced (reduces loss and congestion of
data because it ensures accuracy of data).
5. Application

 1. http: hypertext transfer protocol http


daemon
software
whose
purposes is
Web browser
Web browser (search for
server
html file
The request can be requested
made either by by the
typing in a uniform client)
resource locator
(URL)
Client – server system The URL will converted into an IP
http:// www. Cie. Org. uk address, which is used to locate the
server.
The server will store resources such
IP address as text , images and numbers either in
those formats or as HTML pages.
1. Secure Shell (SSH) : Secure Socket Layer (SSL)

Client –server.
Client encrypted Web server

3. FTP. File Transfer Protocol


• Login
download (username &
Web browser Web server password) to
upload
• No security.
upload

Client –server.
4. Telnet ; telecommunication network protocol.

Client Server
telnet software telnet software

• Used in a LAN or Internet (WAN), it enables the user to gain


access to a computer in a network and use its data & program.

• No security

• Helps to diagnose faults in computers in a networks.


How BitTorrent Works

 When you download a web page like this one, your computer connects
to the web server and downloads the data directly from that server.
 Each computer that downloads the data downloads it from the web
page’s central server. This is how much of the traffic on the web works.
BitTorrent is a peer-to-peer protocol, which means that the
computers in a BitTorrent “swarm” (a group of computers
downloading and uploading the same torrent) transfer data
between each other without the need for a central server.
 Traditionally, a computer joins a BitTorrent swarm by loading a torrent file
into a BitTorrent client.
 The BitTorrent client contacts a “tracker” specified in the torrent file.
 The tracker is a special server that keeps track of the connected computers.
 The tracker shares their IP addresses with other BitTorrent clients in the
swarm, allowing them to connect to each other.
 Once connected, a BitTorrent client downloads bits of the files in the torrent
in small pieces, downloading all the data it can get. Once the BitTorrent
client has some data, it can then begin to upload that data to other
BitTorrent clients in the swarm. In this way, everyone downloading a torrent
is also uploading the same torrent. This speeds up everyone’s download
speed. If 10,000 people are downloading the same file, it doesn’t put a lot of
stress on a central server. Instead, each downloader contributes upload
bandwidth to other downloaders, ensuring the torrent stays fast.
TASK
Research some of these protocols:
 SMTP PPP
 Telnet
 UDP

You might also like