CH 03

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 36

NETWORK PROTOCOLS

CHAPTER 3
Network Protocols
• After studying this chapter, one could do the following:
– Define and describe protocols.
– Identify where protocols fit in networks.
– Identify and define protocol standards.
– Identify and describe the major protocols currently in use.
The Role of Protocols

A protocol can be thought of as a language that a computer or another


network device speaks. It defines methods and rules for communication.
The Role of Protocols
• Two critical types of protocols:
– Data Link layer protocols (access protocols or
access methods).
– Network layer protocols (network or
communication protocols).
• For two computer to communicate, must have
one language (protocol) in common or use
translator (bridge).
Identifying Protocols by Role
• Each network device must support two protocols: Data Link
layer protocol and Network layer protocol.
• Protocol stack.
– Protocol software components running on computer.
– Made of different protocols from protocol suite.
– Each layer performs functions, wrapping message content
with control information.
• Computers may run multiple protocol suites.
– As packet moves through OSI layers, it is checked against
defined protocols and processed according to matching
protocol.
TCP/IP Stack Use
Transmitting Digital Data
• Digital transmission is the transmission of
binary electrical or light signals, and it has only
two possible states, a 1 or a 0.
– Sender and receiver must agree on:
• Voltage levels
• Encoding method
• Data rate
• Unipolar signaling: Voltage always positive or
negative.
Transmitting Digital Data
• Bipolar signaling:
– NRZ (non return to zero)
– RZ (return to zero)

• Manchester encoding:
– Unipolar signaling type used by Ethernet
Digital Transmission Methods
Comparing Access Methods
• 802 standards:
– Network access methods used in PC networks are defined by the IEEE
802 standards (examples).
• 802.1: LAN and MAN MANs
Bridging and Management • 802.9: Integrated Services
• 802.2: Logical Link Control • 802.10: LAN/MAN Security
• 802.3: CSMA/CD • 802.11: Wireless LANs
• 802.4: Token Passing Bus • 802.12: High-Speed LANs
• 802.5: Token Ring • 802.14: Cable TV
• 802.6 DQDB • 802.15: Wireless PAN
• 802.7: Broadband LANs • 802.16: WirelessMAN™
• 802.8: Fiber-Optic LANs and
802 Standards
• 802.1 LAN and MAN Bridging and
Management
– Defines way in which a networking device such as
a bridge selects a path to connect LANs and
MANs.

• 802.2 Logical Link Control


– Defines LLC sublayer (upper portion of Data Link
layer), which uses LLC protocol; responsible for
providing connection-oriented service.
802 Standards
802.3 Carrier-Sense Multiple Access/Collision
Detection (CSMA/CD)
– Specifies access method used by Ethernet.
– Requires all devices to listen to cable before transmitting
(carrier sense).
– When line is clear, any device can transmit (multiple
access).
– If two devices transmit at same time, collision occurs, and
both must retransmit (collision detection).
802 Standards
802.4 Token Passing Bus
– Developed to provide benefits of Token Ring without
physical requirements of a ring.

802.5 Token Ring


– Describes Token Ring networking; devices take turns
transmitting data; must have empty token; token with data
travels from source to destination around network.

802.6 Distributed Queue Dual Bus (DQDB)


– Developed for MANS, using two parallel cables in bus
network topology.
802 Standards
802.7 Broadband LANs
– Specifies the design, installation, and testing necessary for
broadband transmissions, which allow for multiple
transmissions using different channels at the same time.

802.8 Fiber-Optic Local and MANs


– States the recommendations for configuring and testing
fiber-optic LANs and MANs to ensure integrity of fiber-
optic cabling.

802.9 Integrated Services


– Defines a unified access method that offers Integrated
Services for both public and private backbone networks.
802 Standards
802.10 LAN/MAN Security
– Defines assignment of unique security association
identifiers (SAIDs) for use with LANs and MANs.

802.11 Wireless LANs


– Identifies group of standards for wireless LANs; uses
various specific transmission methods, depending on
substandard.
• 802.11a: 5GHz, 54Mbps
• 802.11b: 2.4GHz, 11Mbps
• 802.11g: 2.4GHz, 54 Mbps
• 802.11n: emerging standard, backwardly compatible
802 Standards
802.12 High-Speed LANs
– Defines how Physical layer and MAC sublayer support 100Mbps signal
transmission using demand priority access method.

802.14 Cable TV
– Provides reference for digital communications services over cable television
networks using branching bus system.

802.15 WPANs
– Standard under development for short-distance wireless networks called
wireless personal area networks; utilizes portion of Bluetooth specifications.

802.16 WirelessMAN™
– A group of broadband wireless communication standards for MANs developed
by the IEEE; enable multimedia applications with wireless connection and have
a range up to 30 miles.
LAN Access
• Token Ring
– Advantages:
• Determinant access method.
– Token’s path traceable, always follows same order.
• Somewhat self-healing.
– Most MAUs able to block nonresponding PCs.
– Disadvantages:
• Hardware less available, more expensive.
• Limited performance compared to recent Ethernet versions.
Hybrid Network with Token Rings
LAN Access Ethernet
• Ethernet
– Advantages:
• Hardware relatively inexpensive, available.
• High speed versions:
– 802.3x: 100Mbps Ethernet
– 802.3z: 1Gbps Ethernet
– Disadvantages:
• Performance can suffer as network size increases,
increasing number of possible collisions.
Simple Ethernet Network
Comparing Network Protocols
• Two important internetworking protocol suites:
– Transmission Control Protocol/Internet Protocol (TCP/IP)
– AppleTalk
• Each suite’s protocols function from OSI layer 2 (Data
Link) to layer 7 (Application).
The TCP/IP Suite
• TCP/IP is designed to work with a wide range of physical
access methods.
• The TCP/IP suite offers a number of features and benefits,
including interoperability, flexibility, and multivendor support.
• Another big benefit of the TCP/IP suite is the fact that almost
all network software vendors support its use.
• TCP/IP addressing uses a network address and a host address.
– Subnet mask identifies which portion of the address is used as the
network address and which is used as the host address.
– IP defines unique addresses for each computer that communicates on
a network.
• IPv4 vs. IPv6
The TCP/IP Suite
Manually Assign IP Address
Identifying the TCP/IP Protocols
• Network layer protocols:
– Internet Protocol (IP)
• Provides for network identification through addressing and
connectionless delivery of packets.
– Address Resolution Protocol (ARP)
• Provides a device’s MAC address from its IP address.
– Reverse Address Resolution Protocol (RARP)
• Provides a device’s IP address when the MAC address is known.
– Internet Control Message Protocol (ICMP)
• A management and troubleshooting protocol.
Identifying the TCP/IP Protocols
• Transport layer protocols:
– Transmission Control Protocol (TCP)
• Provides connection-oriented delivery services (error
checking, sequence numbering), with destination
device responding with receipt.

– User Datagram Protocol (UDP)


• Provides connectionless packet delivery services (no
error checking, sequence numbering, or guaranteed
delivery).
Identifying the TCP/IP Protocols
• Application layer protocols:
– File Transfer Protocol (FTP)
• Protocol, service, and application that provides reliable file transfer
between TCP/IP hosts.
– Trivial File Transfer Protocol (TFTP)
• Used for file transfer over the Internet using UDP but requiring
acknowledgement (through TFTP) for each packet before the next is sent.
– Simple Mail Transfer Protocol (SMTP)
• Protocol used to transfer e-mail messages between computers using TCP
as its delivery protocol.
– Hypertext Transfer Protocol (HTTP)
• Used to access Hypertext Markup Language (HTML) files (web pages)
over the Internet or through an intranet, allowing for rapid, reliable data
exchange.
Identifying the TCP/IP Protocols
• Application layer protocols (continued):
– Domain Name System (DNS)
• Protocol and service used for host name to IP address resolution.
– Telnet
• Protocol and application that provides remote terminal emulation
services in clear text.
– Dynamic Host Configuration Protocol (DHCP)
• Protocol and service used to automatically provide IP address and
other TCP/IP configuration settings for host computers.
– Simple Network Management Protocol (SNMP)
• Protocol enabling remote configuration, monitoring, and
management of network devices, services, and resources.
AppleTalk
• AppleTalk is the proprietary protocol suite for
Apple Macintosh networks.
• Features and benefits:
– Ease of addressing.
• Network administrator assigns network address.
• Device numbers dynamically assigned.
– Built-in mechanisms for limiting network traffic.
• Devices organized into logical zones.
– Zones block broadcasts sent within network.
– Each zone can be connected to router, limiting traffic but enabling
access to all connected zones.
AppleTalk Protocols
• Data Link layer protocols:
– EtherTalk Link Access Protocol (ELAP)
• Provides physical access to an 802.3 (Ethernet) network.
– AppleTalk Address Resolution Protocol (AARP)
• Used to retrieve a computer’s physical address for packet delivery.
– LocalTalk Link Access Protocol (LLAP)
• Combined Physical and Data Link layer protocol supporting
multipoint connectivity in a bus topology wired as a daisy-chain.
• Supports dynamically addressed workgroups with up to 32
computers per workgroup.
– TokenTalk Link Access Protocol (TLAP)
• Provides physical access to an 802.5 (Token Ring) network.
AppleTalk Protocols
• Middle-layer protocols:
– Operate at the Network and Transport layers of the OSI model.
• Datagram Delivery Protocol (DDP)
– Provides what is described as best-effort, but not guaranteed, delivery.
– Short DDP or Long DDP depending on the range required for the packet.
• Routing Table Maintenance Protocol (RTMP)
– Used to manage and maintain AppleTalk routers and pass routing table
information between the routers.
• Name Binding Protocol (NBP)
– Matches device names to network addresses, similar to DNS on a TCP/IP
network, allowing for user-defined logical naming conventions.
• AppleTalk Transaction Protocol (ATP)
– Provides reliable transport services between computers or applications,
including keeping track of application transactions.
AppleTalk Protocols
• Upper-layer protocols:
– Implemented at the Session, Presentation, and Application OSI model
layers.
• AppleTalk Data Stream Protocol (ADSP)
– Responsible for establishing connections, sequencing, and packet flow control.
– Can be used as an alternative to ATP but without transaction tracking.
• AppleTalk Session Protocol (ASP)
– Implemented specifically at the OSI Session layer providing Session-layer services.
• Printer Access Protocol (PAP)
– Used to support shared and network printers and print job management.
• Zone Information Protocol (ZIP)
– Responsible for keeping track of network numbers and zones, matching network
numbers to AppleTalk network zones.
• AppleTalk Filing Protocol (AFP)
– Supports file sharing, file transfer, and end-user printer sharing to Macintosh and
non-Macintosh clients.
Summary
• Protocols are components that allow computers
to communicate and can be understood
through the OSI model, with each layer of the
model represented by one or more protocols.
• The IEEE standards committee defines the 802
standard. The 802 standard includes methods
for various types of data communications.
• The TCP/IP suite was developed for use on the
Internet, and the AppleTalk protocol suite was
developed for Apple Macintosh networks.
Key Terms
• • Access
Device protocols
numbers
• • Backoff
Dynamic Host Configuration Protocol (DHCP)
• • Bipolar
Internet signaling
Protocol (IP)
• • Bluetooth
Listen before transmit method
• • Demand
Long DDP Priority Access
• Method encoding
Manchester
• • Destination
Media service
Access Unit access
(MAU)
• point (DSAP)
Multiplexing
• Determinant access method
Key Terms
• • Network
Short DDP number
• • Network
Source serviceprotocols
access point (SSAP)
• • Nonreturn to zero (NRZ)
Stack
• • Phase
Subnet 1
mask
• • PhasePersonal
Wireless 2 Area Networks (WPANs)
• • Protocol stack
Zones
• Protocol suite
• Return to zero (RZ)
Copyright Notice
Copyright 2013 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this
work beyond that permitted in section 117 of the 1976
United States Copyright Act without express
permission of the copyright owner is unlawful.
Requests for further information should be addressed
to the Permissions Department, John Wiley & Sons,
Inc. The purchaser may make back-up copies for
his/her own use only and not for distribution or resale.
The Publisher assumes no responsibility for errors,
omissions, or damages caused by the use of these
programs or from the use of the information herein.

You might also like