0% found this document useful (0 votes)
4 views

Advance networking important notes

A protocol is a set of rules that enables communication and data exchange between devices in a network, ensuring data integrity, security, and error handling. Key elements include syntax, semantics, timing, error handling, flow control, addressing, encapsulation, and session management. Protocols are classified into various types such as network communication, transport layer, application layer, data link layer, security, management, and specialized protocols, each serving specific functions in network communication.

Uploaded by

haq4ibtisam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Advance networking important notes

A protocol is a set of rules that enables communication and data exchange between devices in a network, ensuring data integrity, security, and error handling. Key elements include syntax, semantics, timing, error handling, flow control, addressing, encapsulation, and session management. Protocols are classified into various types such as network communication, transport layer, application layer, data link layer, security, management, and specialized protocols, each serving specific functions in network communication.

Uploaded by

haq4ibtisam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Protocol

A protocol is a set of rules or standards that govern the communication and


exchange of data between devices in a network. It ensures that devices can
communicate efficiently and accurately.

Purpose of Protocols

1.​ Enable communication between devices.


2.​ Ensure data integrity and security.
3.​ Define error handling mechanisms.
4.​ Facilitate interoperability among devices.

Key Elements of Protocols


Protocols are designed with specific elements to ensure effective communication.
These include:

1. Syntax (Structure and Format)

●​ Defines the structure and format of data being transmitted.


●​ Examples:
○​ Data packet structure (e.g., headers, payloads).
○​ Character encoding (e.g., ASCII, Unicode).

2. Semantics (Meaning and Purpose)

●​ Specifies the meaning of each part of the data.


●​ Determines what actions are taken based on the content of the message.
●​ Example: HTTP status codes (e.g., 200 for success, 404 for not found).

3. Timing (Synchronization and Order)

●​ Refers to the timing rules of data exchange:


○​ When to send data (synchronization).
○​ Speed of transmission (bit rate).
●​ Example: Managing delays in real-time communication.
4. Error Handling

●​ Mechanisms to detect, correct, and manage errors during data


transmission.
●​ Example: Parity checks, Cyclic Redundancy Check (CRC).

5. Flow Control

●​ Ensures that the sender does not overwhelm the receiver with data.
●​ Example: TCP uses sliding window protocols.

6. Addressing

●​ Identifies the source and destination of the data.


●​ Example: IP addresses (IPv4, IPv6).

7. Encapsulation and Decapsulation

●​ Encapsulation: Wrapping data with headers and footers as it moves


through layers.
●​ Decapsulation: Removing headers and footers at the destination.

8. Session Management

●​ Establishing, maintaining, and terminating communication sessions.


●​ Example: Handshakes in TCP/IP.

Examples of Protocols
●​ Network Layer: IP (Internet Protocol).
●​ Transport Layer: TCP (Transmission Control Protocol), UDP (User
Datagram Protocol).
●​ Application Layer: HTTP, FTP, SMTP.
●​ Security Protocols: SSL/TLS, HTTPS.

Types of Protocols
Protocols are classified based on their function and the layer of the OSI or
TCP/IP model in which they operate. Below are the major types of protocols:

1. Network Communication Protocols


These protocols enable communication between devices in a network.

Examples:

●​ IP (Internet Protocol):
○​ Responsible for addressing and routing packets.
○​ Types: IPv4, IPv6.
●​ ARP (Address Resolution Protocol):
○​ Maps IP addresses to MAC (Media Access Control) addresses.

2. Transport Layer Protocols


These ensure reliable data transmission and manage communication sessions.

Examples:

●​ TCP (Transmission Control Protocol):


○​ Ensures reliable, ordered, and error-checked delivery of data.
●​ UDP (User Datagram Protocol):
○​ Provides faster but less reliable transmission. Used in real-time
applications like video streaming.

3. Application Layer Protocols


These protocols are used by applications to communicate over the network.

Examples:

●​ HTTP (Hypertext Transfer Protocol):


○​ Used for accessing web pages.
○​ HTTPS (Secure HTTP) adds encryption via SSL/TLS.
●​ FTP (File Transfer Protocol):
○​ Transfers files between devices.
●​ SMTP (Simple Mail Transfer Protocol):
○​ Sends emails.
●​ DNS (Domain Name System):
○​ Translates domain names (e.g., google.com) to IP addresses.
●​ POP3/IMAP:
○​ Used for retrieving emails.

4. Data Link Layer Protocols


These handle physical addressing and access to the medium.

Examples:

●​ Ethernet:
○​ Defines communication over wired LANs.
●​ Wi-Fi (IEEE 802.11):
○​ Wireless communication in a LAN.
●​ PPP (Point-to-Point Protocol):
○​ Used for direct communication between two nodes.

5. Security Protocols
These ensure secure data transmission and communication.

Examples:

●​ SSL/TLS (Secure Sockets Layer/Transport Layer Security):


○​ Encrypts data for secure communication (e.g., HTTPS).
●​ IPSec (Internet Protocol Security):
○​ Secures IP communications by authenticating and encrypting
packets.
●​ SSH (Secure Shell):
○​ Secure remote login and command execution.
6. Management Protocols
These manage and monitor network devices.

Examples:

●​ SNMP (Simple Network Management Protocol):


○​ Monitors and manages network devices.
●​ NTP (Network Time Protocol):
○​ Synchronizes time across network devices.

7. Specialized Protocols
Used for specific purposes or industries.

Examples:

●​ VoIP Protocols (Voice over IP):


○​ SIP (Session Initiation Protocol) and RTP (Real-time Transport
Protocol) for voice and video communication.
●​ IoT Protocols (Internet of Things):
○​ MQTT, CoAP.

3. Data Link Layer + Protocol Layers


Data Link Layer

●​ The second layer in the OSI model.


●​ Manages communication between adjacent network nodes.
●​ Ensures error-free transmission of data frames over a physical link.

Functions of Data Link Layer

1.​ Framing: Divides the data into manageable frames.


2.​ Error Detection & Correction: Identifies and corrects errors in data
transmission.
3.​ Flow Control: Ensures sender does not overwhelm the receiver.
4.​ Access Control: Manages access to the shared medium.
Protocols in Data Link Layer

●​ Ethernet (IEEE 802.3): Used in wired LANs.


●​ Wi-Fi (IEEE 802.11): Used for wireless LANs.
●​ PPP (Point-to-Point Protocol): Direct communication between two
nodes.
●​ HDLC (High-Level Data Link Control): Error-free communication in
WANs.

Protocol Layers (OSI vs. TCP/IP Models)


OSI Model Layers

1.​ Application Layer


2.​ Presentation Layer
3.​ Session Layer
4.​ Transport Layer
5.​ Network Layer
6.​ Data Link Layer
7.​ Physical Layer

TCP/IP Model Layers

1.​ Application Layer (includes OSI’s Application, Presentation, Session


layers).
2.​ Transport Layer
3.​ Internet Layer (equivalent to OSI’s Network layer).
4.​ Network Interface Layer (combines Data Link and Physical layers).

4. Bit and Character-Oriented Protocols


Bit-Oriented Protocols

●​ Treat data as a stream of bits.


●​ Framing and control information are represented as specific bit patterns.
●​ Examples:
○​ HDLC (High-Level Data Link Control)
○​ PPP (Point-to-Point Protocol)

Character-Oriented Protocols

●​ Treat data as a stream of characters (bytes).


●​ Use special characters for framing and control.
●​ Examples:
○​ BSC (Binary Synchronous Communication)
○​ ASCII-based protocols.

5. Synchronous and Asynchronous Protocols


Synchronous Protocols

●​ Data is transmitted continuously in a synchronized manner.


●​ Requires a shared clock signal between sender and receiver.
●​ Examples:
○​ SDLC (Synchronous Data Link Control)
○​ HDLC

Asynchronous Protocols

●​ Data is transmitted in small chunks with start and stop bits for
synchronization.
●​ No shared clock; timing is implicit.
●​ Examples:
○​ UART (Universal Asynchronous Receiver-Transmitter)
○​ Serial communication protocols.

6. Collision Detection (Assignment)


Definition
●​ Collision detection occurs when two devices attempt to transmit data on
the same network channel simultaneously.

Mechanism:

●​ Used in CSMA/CD (Carrier Sense Multiple Access with Collision


Detection), primarily in Ethernet networks.

Steps in CSMA/CD:

1.​ Device senses if the channel is idle.


2.​ If idle, it transmits data.
3.​ If a collision is detected:
○​ Devices stop transmitting.
○​ A jam signal is sent.
○​ Each device waits a random backoff time before retrying.

Assignment Task Suggestion:

●​ Objective: Write a program or simulation for CSMA/CD in a LAN.


●​ Implementation Details:
○​ Simulate multiple devices attempting to transmit.
○​ Detect and handle collisions.

7. TCP and UDP Applications


TCP (Transmission Control Protocol)

●​ Connection-oriented protocol.
●​ Ensures reliable, ordered, and error-checked delivery of data.
●​ Applications:
○​ HTTP/HTTPS: Web browsing.
○​ FTP: File transfer.
○​ SMTP: Sending emails.
○​ Telnet/SSH: Remote login.

UDP (User Datagram Protocol)

●​ Connectionless protocol.
●​ Offers faster but less reliable data transfer.
●​ Applications:
○​ DNS: Resolving domain names to IP addresses.
○​ VoIP: Voice over IP communication.
○​ Streaming: Real-time video/audio (e.g., YouTube, Spotify).
○​ Gaming: Online multiplayer games.

What is a Collision?

A collision occurs in a wireless network when two or more devices attempt to


send data over the same channel simultaneously. This leads to interference,
causing the transmitted data to become corrupted and requiring retransmission.

Causes of Collisions in Wireless Networks:


1.​ Shared Medium: Wireless devices use the same frequency/channel.
2.​ Hidden Node Problem: Devices cannot detect each other’s signals
because they are out of range but share the same access point.
3.​ Overlapping Channels: Nearby networks operating on the same
frequency band.
4.​ High Traffic: Too many devices using the same network.

How to Avoid Collisions in Wireless Networks?


1. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA):

●​ Devices "listen" to the channel before sending data.


●​ If the channel is busy, the device waits a random backoff time before
retrying.

2. RTS/CTS (Request to Send / Clear to Send):

●​ Prevents the hidden node problem:


○​ The sender sends an RTS signal to the receiver.
○​ The receiver responds with a CTS signal, granting permission to
send data.

3. Use Non-Overlapping Channels:

●​ In 2.4 GHz Wi-Fi, use channels like 1, 6, or 11 to avoid interference.


●​ In 5 GHz Wi-Fi, choose less congested channels.

4. Reduce Network Traffic:

●​ Limit the number of devices connected to the network.


●​ Use Quality of Service (QoS) settings to prioritize important traffic.

5. Use Directional Antennas:

●​ Focus signals in specific directions to avoid interference from other


networks.

6. Hidden Node Mitigation:

●​ Deploy additional access points to reduce the range issue.

7. Upgrade to Modern Standards:

●​ Use newer technologies like Wi-Fi 6, which handle congestion better.

Key Takeaway:
Wireless collisions can degrade network performance. Techniques like
CSMA/CA, RTS/CTS, better channel selection, and network optimization can
minimize them.

4o

You might also like