Network Protocol
Network Protocol
network devices. A protocol includes formatting rules that specify how data is packaged into
messages. It also may include conventions like message acknowledgement or data compression
to support reliable and/or high-performance network communication.
Network Layer
Transport Layer
The Network Layer allows data packet to be sent to the correct computer on the same network
or on another network, and a way to establish a connection to another computer.
The Transport Layer provides means how data exchange can be done, the quality of
data exchange in terms of: speed and priority ,and error correction.
The internet’s main network protocol is the TCP/IP stands for Transmission Control
Protocol/Internetwork Protocol.
Network topology:
- is the study of the arrangement or mapping of the elements (links, nodes, etc.) of a network,
especially the physical (real) and logical (virtual) interconnections between nodes.
Error Performance-Is the rate in which error occur which can be describe as either an expected
value or an empirical value.
Techniques
• Redundancy – is a form of error detection where each data unit is sent multiple times,
usually twice.
• Echoplex (echo checking) - is a relatively simple error detection scheme used almost
exclusively with data communications systems involving human operators working in real
time at computer terminals or PCs.
• Exact count-encoding – the number of binary 1s (and binary 0s) in each character is
the same.
• Redundancy Checking – adding bits for the sole purpose of detecting errors.
2. Checksum – is another relatively simple form of redundancy error checking where the data
within a message is summed together to produce an error checking character
• Double Precision Checksum – is computed in the same manner as with Single Precision
except the checksum 2n bits long.
• Residue Checksum – is virtually identical to the single precision checksum except for
the way the carry bit is handled.
Traditional Ethernet
MAC Sublayer
Physical Layer
Physical Layer Implementation
Bridged Ethernet
Switched Ethernet
Full-Duplex Ethernet
Introduction to TCP/IP
An entire suite of data communications protocols derive from two of the most important
protocols that belong to it: the Transmission Control Protocol and the Internet Protocol.
Developed by a Department of Defense (DOD) research project to connect a number of
different networks designed by different vendors into a network of networks (the "Internet").
IP - is responsible for moving packet of data from node to node.
tCP - is responsible for verifying the correct delivery of data from client to server.
sockets - is a name given to the package of subroutines that provide access to TCP/IP n
most systems.
Historical Background
-Developed by ARPA in the early 70s as an experimental protocol for their packet-switching
network (ARPANET).
-Adopted as Military Standard in 1983 and implemented in UNIX to aid in converting other
hosts connected in the network. Internet came into usage.
in 1985, NSF connected to the Internet linking 5 supercomputer which aims to extend the
network to every engineer and scientist in the US.
-Today, Internet has grown exponentially but TCP/IP remain its protocol suite.
TCP/IP Features
-Open protocol standards, freely available and developed independently from any specific
computer hardware or operating system.
-Independence from specific physical network hardware.
-A common addressing scheme that allows any TCP/IP device to uniquely address any
other device in the entire network, even if the network is as large as the worldwide Internet.
-Standardized high-level protocols for consistent, widely available user services.
Routing
Each node in a WAN is a router that accepts an input packet, examines the destination
address, and forwards the packet on to a particular telecommunications line.
How does a router decide which line to transmit on?
A router must select the one transmission line that will best provide a path to the destination
and in an optimal manner.
Often many possible routes exist between sender and receiver.
Centralized Routing
One routing table is kept at a “central” node.
Whenever a node needs a routing decision, the central node is consulted.
To survive central node failure, the routing table should be kept at a backup location.
The central node should be designed to support a high amount of traffic consisting of routing
requests.
Distributed Routing
Each node maintains its own routing table.
No central site holds a global table.
Somehow each node has to share information with other nodes so that the individual routing
tables can be created.
Possible problem with individual routing tables holding inaccurate information.
Adaptive Routing versus Static Routing
With adaptive routing, routing tables can change to reflect changes in the network
Static routing does not allow the routing tables to change.
Static routing is simpler but does not adapt to network congestion or failures.
Routing Examples - RIP
Routing Information Protocol (RIP) - First routing protocol used on the Internet.
A form of distance vector routing. It was adaptive and distributed
Each node kept its own table and exchanged routing information with its neighbors.
Routing Examples - OSPF
Open Shortest Path First (OSPF) - Second routing protocol used on the Internet
A form of link state routing
It too was adaptive and distributed but more complicated than RIP and performed much
better
Network Congestion
When a network or a part of a network becomes so saturated with data packets that packet
transfer is noticeably impeded, network congestion occurs.
What can cause network congestion? Node and link failures; high amounts of traffic;
improper network planning.
When serious congestion occurs buffers overflow and packets are lost.