Computer Communication Standards
Computer Communication Standards
The most important standard is Open System Interconnect OSI and TCP/IP.
Other standards are IETF Internet Engineering Task Force, IEEE Institute of
Electronic and Electrical Engineers
Importance of TCP/IP
Page 1 of 18
Application layer:
Provides user interface and support services such as E-mail, FTP, shared
database management, file remote access. Others are identification of
communication partner by name or address etc. It has industry protocol such as
banking (ATM), purchasing, invoicing, videotext.
Page 2 of 18
Presentation layer:
Session layer:
Transport layer:
Provides reliable transparent transfer of data between end points, provides end
to end error recovery and flow control, process (application on a host machine)
to process delivery. Breaks up messages into small units (segmentation) and does
reassembly. Manages packet transmission through the transmission connection;
TCP- connection or UDP-connectionless. Assures correct re-assembly at the
distant end for the packets. Error control and flow control from source to
destination.
Network layer:
Provides upper layers with independence from data transmission and switching
technologies used to connect systems. It’s responsible for establishing,
maintaining and terminating connections eg X.25 virtual circuits’ protocol and
Internet Protocol. It deals with packets, IP addressing logical addresses, routing
Provides reliable transfer of information across the physical link, sends blocks of
data (frames) with the necessary synchronization, error checking – CRC,
checksum and flow control. Does physical (MAC) addresses, establishes
connection between hosts, Sends and receives network addresses.
Physical layer:
Page 3 of 18
TCP Protocol Suite & IP Addressing
Any device on the Internet that wants to communicate with other Internet
devices must have a unique identifier. The identifier is known as the IP address
because routers use a Layer 3 protocol called the IP protocol to find the best route
to that device.
The TCP/IP model has become the standard on which the Internet is based.
Application layer
Transport layer
Internet layer
Network access layer
Page 4 of 18
issues into one layer. It ensures that the data is properly packaged before it is
passed on to the next layer.
Page 5 of 18
Transport Layer Protocol
Sliding windows
Sequence numbers
Acknowledgments
Page 6 of 18
UDP is a connectionless datagram protocol. Like IP, it is a best effort or
"unreliable" protocol. Reliability is addressed through error detection using a
weak checksum algorithm. UDP is typically used for applications such as
streaming media (audio, video, Voice over Internet etc) where on-time arrival is
more important than reliability.
The Internet Protocol (IP) is a protocol used for communicating data across a
Packet Switched Networks. IP is a network layer protocol in the Internet protocol
suite and is encapsulated in a data link layer protocol (e.g., Ethernet). As a lower
layer protocol IP provides the service of communicable unique global addressing
amongst computers.
The Internet layer is used to select the best path through the network for packets
to travel. Best path determination and packet switching occur at this layer.
The purpose of the Internet layer is to select the best path through the
network for packets to travel
Page 7 of 18
IP performs the following operations:
Reliability
IP provides an unreliable service (i.e., best effort delivery). This means that the
network makes no guarantees about the packet and none, some, or all of the
following may apply:
Data corruption
Out-of-order delivery (packets arriving out of sequence.)
Duplicate arrival
Lost or dropped/discarded packages
For reliability IP ensure the IP packet's header is error-free through the use of a
checksum. This has the side-effect of discarding packets with bad headers on the
spot, and with no required notification to either end (though an ICMP message
may be sent).
IP does provide re-ordering of any fragments that arrive out of order by using the
fragmentation flags and offset. TCP is a protocol that will adjust its segment size
to be smaller than the MTU. UDP and Internet Control Message Protocol (ICMP)
are examples of protocols that disregard MTU size thereby forcing IP to fragment
oversized datagrams.
The primary reason for the lack of reliability is to reduce the complexity of
routers. So, even though no guarantees are made, the better the effort made by
the network, the better the experience for the user. Most protocols are built
around the idea that error checking is best done at each end of the
communication line.
The network access layer allows an IP packet to make a physical link to the
network media. It includes the LAN and WAN technology details and all the
Page 8 of 18
details contained in the OSI physical and data link layers. Network access layer
protocols also map IP addresses to physical hardware addresses and
encapsulate IP packets into frames. The network access layer defines the physical
media connection based on the hardware type and network interface.
ARP and RARP work at both Internet and Network access layers
Drivers for software applications, modem cards, and other devices operate at the
network access layer.
The network access layer defines the procedures used to interface with the
network hardware and access the transmission medium. Modem protocol
standards such as Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol
(PPP) provide network access through a modem connection. Many protocols are
required to determine the hardware, software, and transmission-medium
specifications at this layer.
Page 9 of 18
Here are some differences of the OSI and TCP/IP models:
The Internet was developed based on the standards of the TCP/IP protocols.
The TCP/IP model gains credibility because of its protocols. The OSI model
is not generally used to build networks. The OSI model is used as a guide to
understand the communication process
IP addressing
For any two systems to communicate, they must be able to identify and locate
each other.
Page 10 of 18
The dotted decimal notation is an easier method to understand than the binary
ones and zeros method. This dotted decimal notation also prevents a large
number of transposition errors that would result if only the binary numbers were
used. Each octet ranges from 0 to 255.
Both the binary and decimal numbers in Figure above represent the same values.
However, the address is easier to understand in dotted decimal notation. This is
one of the common problems associated with binary numbers. The long strings
of repeated ones and zeros make errors more likely.
IPv4 addressing
A router uses IP to forward packets from the source network to the destination
network. The packets must include an identifier for both the source and
destination networks. A router uses the IP address of the destination network to
deliver a packet to the correct network. When the packet arrives at a router
connected to the destination network, the router uses the IP address to locate the
specific computer on the network.
Every IP address also has two parts. The first part identifies the network where
the system is connected and the second part identifies the system.
Page 11 of 18
Identifying Address Classes
IP addresses are divided into classes to define the large, medium, and small
networks. Class A addresses are assigned to larger networks. Class B addresses
are used for medium-sized networks, and Class C for small networks. The first
step in determining which part of the address identifies the network and which
part identifies the host is identifying the class of an IP address.
Classful Addressing
Page 12 of 18
The Class A address was designed to support extremely large networks, with
more than 16 million host addresses available. Class A IP addresses use only the
first octet to indicate the network address. The remaining three octets provide for
host addresses.
The first bit of a Class A address is always 0. With that first bit a 0, the lowest
number that can be represented is 00000000, decimal 0. The highest number that
can be represented is 01111111, decimal 127. The numbers 0 and 127 are reserved
and cannot be used as network addresses. Any address that starts with a value
between 1 and 126 in the first octet is a Class A address.
The 127.0.0.0 network is reserved for loopback testing. Routers or local machines
can use this address to send packets back to themselves. Therefore, this number
cannot be assigned to a network.
The Class B address was designed to support the needs of moderate to large-
Page 13 of 18
sized networks. A Class B IP address uses the first two of the four octets to
indicate the network address. The other two octets specify host addresses.
Class B address
The first two bits of the first octet of a Class B address are always 10. The
remaining six bits may be populated with either 1s or 0s. Therefore, the lowest
number that can be represented with a Class B address is 10000000, decimal 128.
The highest number that can be represented is 10111111, decimal 191. Any
address that starts with a value in the range of 128 to 191 in the first octet is a
Class B address.
The Class C address space is the most commonly used of the original address
classes. This address space was intended to support small networks with a
maximum of 254 hosts.
A Class C address begins with binary 110. Therefore, the lowest number that can
be represented is 11000000, decimal 192. The highest number that can be
represented is 11011111, decimal 223. If an address contains a number in the
range of 192 to 223 in the first octet, it is a Class C address.
Class D address
Page 14 of 18
The Class D address space, much like the other address spaces, is mathematically
constrained. The first four bits of a Class D address must be 1110. Therefore, the
first octet range for Class D addresses is 11100000 to 11101111, or 224 to 239. An
IP address that starts with a value in the range of 224 to 239 in the first octet is a
Class D address.
A Class E address has been defined. However, the Internet Engineering Task
Force (IETF) reserves these addresses for its own research. Therefore, no Class E
addresses have been released for use in the Internet. The first four bits of a Class
E address are always set to 1s. Therefore, the first octet range for Class E
addresses is 11110000 to 11111111, or 240 to 255.
Class E address
The stability of the Internet depends directly on the uniqueness of publicly used
network addresses.
No two machines that connect to a public network can have the same IP address
because public IP addresses are global and standardized. All machines connected
to the Internet agree to conform to the system. Public IP addresses must be
obtained from an Internet service provider (ISP) or a registry at some expense.
With the rapid growth of the Internet, public IP addresses were beginning to run
out. New addressing schemes, such as classless interdomain routing (CIDR) and
IPv6 were developed to help solve the problem. CIDR and IPv6 are discussed
later in the course.
Page 15 of 18
Private IP addresses are another solution to the problem of the impending
exhaustion of public IP addresses. As mentioned, public networks require hosts
to have unique IP addresses. However, private networks that are not connected
to the Internet may use any host addresses, as long as each host within the
private network is unique. Many private networks exist alongside public
networks. However, a private network using just any address is strongly
discouraged because that network might eventually be connected to the Internet.
RFC 1918 sets aside three blocks of IP addresses for private, internal use.
Private IP Addresses
These three blocks consist of one Class A, a range of Class B addresses, and a
range of Class C addresses. Addresses that fall within these ranges are not routed
on the Internet backbone. Internet routers immediately discard private
addresses. If addressing a nonpublic intranet, a test lab, or a home network, these
private addresses can be used instead of globally unique addresses.
IPv4 and IPv6
The Class A and B addresses make up 75 percent of the IPv4 address space,
however fewer than 17,000 organizations can be assigned a Class A or B network
number.
Class C network addresses are far more numerous than Class A and Class B
addresses, although they account for only 12.5 percent of the possible four billion
IP addresses.
Unfortunately, Class C addresses are limited to 254 usable hosts. This does not
meet the needs of larger organizations that cannot acquire a Class A or B
address. Even if there were more Class A, B, and C addresses, too many network
addresses would cause Internet routers to come to a stop under the burden of the
Page 16 of 18
enormous size of routing tables required to store the routes to reach each of the
networks.
As early as 1992, the Internet Engineering Task Force (IETF) identified the
following two specific concerns:
Over the past two decades, numerous extensions to IPv4 have been developed.
These extensions are specifically designed to improve the efficiency with which
the 32-bit address space can be used. Two of the more important of these are
subnet masks and classless interdomain routing (CIDR), which are discussed in
more detail in later lessons.
IPv6 uses 128 bits rather than the 32 bits currently used in IPv4. IPv6 uses
hexadecimal numbers to represent the 128 bits. IPv6 provides 640 sextrillion
addresses. This version of IP should provide enough addresses for future
communication needs.
IPv4 addresses:
Page 17 of 18
IPv6 addresses:
IPv6 addresses are assigned to interfaces, not nodes. Since each interface belongs
to a single node, any of the unicast addresses assigned to the interfaces of the
node may be used as an identifier for the node.
Conclusion
Page 18 of 18