0% found this document useful (0 votes)
2 views

COMPUTER NETWORK part 3

The document outlines communication protocols, which are sets of rules for information exchange between computers, and lists key protocols such as FTP, HTTP, and TCP. It also describes the OSI model, which consists of seven layers that facilitate data flow in a network, detailing the functions and protocols associated with each layer. Additionally, it explains network addressing through IP addresses and distinguishes between lower and upper layers in relation to communications and user applications.

Uploaded by

fredjunior763
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

COMPUTER NETWORK part 3

The document outlines communication protocols, which are sets of rules for information exchange between computers, and lists key protocols such as FTP, HTTP, and TCP. It also describes the OSI model, which consists of seven layers that facilitate data flow in a network, detailing the functions and protocols associated with each layer. Additionally, it explains network addressing through IP addresses and distinguishes between lower and upper layers in relation to communications and user applications.

Uploaded by

fredjunior763
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

I.

1 COMMUNICATION PROTOCOLS
A communication protocol is a set of rules that coordinates the exchange of information. If one
computer is sending information to another and they both follow the same protocol, the message gets
through; regardless of what types of machines they are and on what operating systems they are running.
a. Network protocol
A protocol defines what is communicated, how it is communicated, and when it is
communicated. Some important protocols are:
Protocol Full meaning Its job
FTP File Transfer Protocol Allows file transfer between two computers
HTTP Hyper Text Transfer Protocol Protocol used in the web service
TCP Transmission Control Protocol A reliable connection oriented protocol used to control
the management of application level services between
computers.
IP Internet Protocol Identifier of each computer or communication devices
on the network and internet.
ICMP Internet control message protocol provides management and error reporting to help
manage the process of sending data between computers
SMTP Simple Mail Transfer Protocol An Internet protocol for transferring e-mail.
POP post office protocol Transfer of e-mail, used to synchronize messages
Telnet Telephone Network A method of opening a user session on a remote host.
PPP Point-to-Point Protocol Data transfer using modem

b. Network Addressing
An IP (Internet Protocol) address is a unique identifier for a computer on a network. An IP address is
separated into four sections by periods for the convenience of human reader. Each section is called
Octal. The number in each section cannot exceed 255.
OSI (Open System Interface) Model
The OSI model describes the flow of data in a network, from the lowest layer (the physical
connections) up to the layer containing the user‘s applications. Data going to and from the network is
passed layer to layer. Each layer is able to communicate with the layer immediately above it and the
layer immediately below it. When a layer receives a packet of information, it checks the destination
address, and if its own address is not there, it passes the packet to the next layer.

THE SEVEN OSI REFERENCE MODEL LAYERS


➢ The Application layer (layer 7) represents the level at which applications access network
services. This layer represents the services that directly support applications such as software
for file transfers, database access, and electronic mail.
Protocol: DHCP, DNS, FTP, HTTP, IMAP4, NNTP, POP3, SMTP, SNMP, SSH, TELNET and
NTP
Device: PC
Data Unit: data
➢ The Presentation layer (layer 6) translates data from the Application layer into an intermediary
format. This layer also manages security issues by providing services such as data encryption, and
compresses data so that fewer bits need to be transferred on the network.
Protocol: SSL, WEP, WPA, Kerberos
Device: Gateway
➢ The Session layer (layer 5) allows two applications on different computers to establish, use,
and end a session. This layer establishes dialog control between the two computers in a session,
regulating which side transmits, plus when and how long it transmits.
Protocols: NetBIOS, RPC, X.225
Device: gateway
Data Unit: data
➢ The Transport layer (layer 4) handles error recognition and recovery. It also repackages long
messages when necessary into small packets for transmission and, at the receiving end, rebuilds
packets into the original message. The receiving Transport layer also sends receipt
acknowledgments.
Protocols: TCP, SPX and UDP
Device: Router, gateway
Data Unit: Segments
➢ The Network layer (layer 3) addresses messages and translates logical addresses and
names into physical addresses. It also determines the route from the source to the destination
computer and manages traffic problems, such as switching, routing, and controlling the
congestion of data packets.
Protocols: IPv4, IPV6, IPX, OSPF, NWlink, NetBEUI, ICMP, ARP, RARP
Device: Router, switch, WAP
Data Unit: Packet, Datagram
➢ The Data Link layer (layer 2) packages raw bits from the Physical layer into frames (logical,
structured packets for data). This layer is responsible for transferring frames from one computer
to another, without errors. After sending a frame, it waits for an acknowledgment from the
receiving computer.
Protocols: PPP, FDDI, Token ring, Ethernet, SLIP
Device: NIC, Token Ring switches, Bridges
Data Unit: Frame
➢ The Physical layer (layer 1) transmits bits from one computer to another and regulates the
transmission of a stream of bits over a physical medium. This layer defines how the cable is
attached to the network adapter and what transmission technique is used to send data over the
cable
Protocols: Fast Ethernet, ATM
Device: Hubs, Repeaters, Cables and Connectors
Data Unit: Bit
Layers 1-4 (lower Layer) relate to communications
technology. Layers 5-7 (Upper Layer) relate to user
applications
This partition into ‗lower‘ and ‗upper‘ layers is a widely used way to distinguish between the
communications- oriented layers and the applications- oriented layers.
In fact layers 5 and 6 are often ignored in practical applications (the Internet protocol hierarchy has no
equivalents to layers 5 and 6).

You might also like