Ics 2306: Computer Networks
Ics 2306: Computer Networks
Chapter 2
Network Protocols and Standards
2
LEARNING OUTCOME
3
WHAT IS A PROTOCOL?
Interms of network communications, a protocol is an
agreement between communicating parties on how a
communication will take place.
4
LAYERS AND PROTOCOLS
We have already examined the OSI 7-layer model.
The OSI model is a conceptual model – it does not tell us
how the communication is carried out.
5
PROTOCOL TYPES
We can divide protocols into general types depending upon
their purpose and how they are implemented:
6
HARDWARE PROTOCOLS
Define how hardware devices operate together
Includes:
Pins on connectors
Does not involve software but is controlled by electronic
circuitry
7
SOFTWARE PROTOCOLS
Programs communicate with each other via software
protocols.
8
HARDWARE/SOFTWARE INTERFACE
Software needs to access hardware, e.g. a message waiting in
memory
9
SOME COMMON PROTOCOLS
HTTP
FTP
10
PROTOCOLS AND THE OSI MODEL
There is no single protocol that is specific to a single layer.
11
CONNECTIONLESS VERSUS
CONNECTION-ORIENTED PROTOCOLS
Protocols that use connectionless delivery place data on
the network and assume it will get through
Connectionless protocols aren’t entirely reliable
12
ROUTABLE VERSUS NONROUTABLE
PROTOCOLS
The network layer (OSI) is responsible for moving data
across multiple networks
13
THE PHYSICAL LAYER
Largely mechanical, electrical, timing issues
The protocols associated with the physical layer are
dependent upon the type of network.
14
IEEE 802
Standards for many kinds of Local Area Networks (LANs)
Many have not survived with time, but there are a number
of important standards, including:
15
LANS
A LAN is a privately owned network covering a small area
such as:
An office
A building
A small geographical area (e.g. a campus)
LANs are distinguished by:
Their geographical size
The transmission technology
Their topology (the layout of computer
connections)
16
PHYSICAL LAYER STANDARDS
The Physical Layer is controlled by electronic devices, so
the standards relate to these, e.g.
17
THE DATA LINK LAYER
Responsible for communications between adjacent network
nodes
Divided into 2 sublayers:
18
THE DATA LINK SUBLAYERS
The Media Access Control (MAC) sublayer manages
protocol access to the physical network medium. The IEEE
MAC specification defines MAC addresses, which allow
19
WHAT IS A FRAME?
Data packets are encapsulated into frames. A header
with a hardware (MAC) destination and source address
are added. A data frame includes:
Source address
Data
20
DATA LINK LAYER PROTOCOLS
Ethernet , CSMA/CD
Token Ring
21
THE NETWORK LAYER
Responsible for establishing paths for data transfer through
the network (routing)
Translates the logical address into the physical address, e.g.
22
PACKETS
A packet is an independent, self-contained message sent
over the network
Includes:
23
NETWORK LAYER PROTOCOLS
IP
OSPF
24
THE TRANSPORT LAYER
Responsible for delivering messages between networked
hosts and the fragmentation and reassembly of messages
26
THE SESSION LAYER - 1
Responsible for establishing process-to-process
communications between networked hosts
Offers three communications modes
Connection establishment
Data transfer
Connection termination
Data type: session
Devices: gateway
28
SESSION LAYER PROTOCOLS
ASP
NetBIOS
30
ENCODING/ENCRYPTION SCHEMES
Conversion of character representation formats – e.g.
convert to ASCII characters
Common data representation formats - standard image,
31
PRESENTATION LAYER PROTOCOLS
AFP
SMB
32
THE APPLICATION LAYER
Responsible for providing end-user services, such as file
transfers, email, virtual terminal access, and network
management
33
APPLICATION LAYER PROTOCOLS
DHCP
FTP
34
NETWORK CLASSIFICATIONS
Defined by the area covered
Local Area Network (LAN)
35
NETWORKS
Ethernet
Fast Ethernet
36
ETHERNET
Very common LAN standard
Bus topology – all computers and peripherals are connected
along a single cable segment
37
BROADCAST NETWORK
When a node (computer) sends a message to another
computer, it broadcasts the message to the entire network
The other nodes listen and if the message is for them they
38
ETHERNET ISSUES
Cable breaks
What happens if there is a break in the cable?
There is a split in the network, so communication is
40
CSMA/CD
Carrier Sense Multiple Access with Collision Detection
A simple protocol
41
CSMA/CD COLLISIONS
Two nodes may detect that the network is free at any one
time and both transmit.
The signals collide preventing either from being received.
Stop transmitting
Wait for a random back-off interval
Then attempt to retransmit
42
CSMA/CD CHARACTERISTICS
No predetermined transmission order
No guaranteed wait time before transmission
43
FAST ETHERNET
Ethernet originally ran at 5Mbps, then 10 Mbps
This is too slow for many applications
44
TOKEN RING
All nodes are connected in a ring
IEEE 802.5
45
TOKEN PASSING
A token is a special frame that circulates the ring, node by
node.
Only the node in possession of the token can transmit.
46
PROBLEM
Transmission is one way, a break in the ring stops
transmission
47
FDDI
Fibre Distributed Data Interface
Double ring transmitting in two directions, so transmission
is possible if one ring is broken
48
ATM
Asynchronous Data Transfer Mode
Intended as a replacement for telephony and data networks
49
CLIENT-SERVER NETWORKS
Typically star-shaped networks
Central server holds data and programs for client computers
50
THIN CLIENT (1)
51
THIN CLIENT (2)
Main Advantages of a Thin Client Network.
Highly reliable system that delivers dependable computing
52
THIN CLIENT (3)
Main Disadvantages of a Thin Client Network.• As the
server(s) is critical to the operation of all computers on the
network, there is a
54
DYNAMIC HOST CONFIGURATION
PROTOCOL (DHCP)
Detailed configuration of devices, keeping track of
assigned addresses and to which machine they were
assigned, etc., is difficult in large networks
55
PEER-TO-PEER (P2P) NETWORKS
Nodes generally have their own hard drive
Nodes often have their own peripheral devices
56
WHAT IS THE INTERNET?
A collection
of networks that use common protocols to
provide common services.
Have an IP address
Be able to send IP packets to other machines on
the Internet
57
TCP/IP REFERENCE MODEL
• Has 4 layers
59
INTERNET LAYER
Permits hosts to inject packets into any network and travel
independently to their destination
Packets may be delivered in any order
60
TRANSPORT LAYER
Is designed to allow source and destination to have a
conversation
Uses one of two protocols:
61
APPLICATION LAYER
The TCP/IP model does not have session or presentation
layers
This layer consists of high level protocols such as:
62
INTERNET PROTOCOL
Defines the rules that determine how packets are transferred
from one host to another
It is not a reliable protocol:
63
IPV4 ADDRESSES
Internet Protocol version 4
Each address is a dotted quad in the form 101.4.233.1
64
IP ADDRESSING
Logical addresses are 32 bits (4 bytes) long
Each byte is represented as an octet (decimal number from 0
to 255)
65
IP ADDRESSING (CONTINUED)
Classes
Class A: first octet between 1-126
16,777,214 hosts per network address
66
IP ADDRESSING (CONTINUED)
127.0.0.0 network is called the loopback address
localhost always corresponds to address 127.0.0.1
67
CLASSLESS INTERDOMAIN ROUTING
(CIDR)
Addressing by class has been superseded by a more
flexible addressing method
68
WHY SUBNET?
Subnetting
Makes more efficient use of available IP addresses
Enables dividing networks into logical groups
69
SUBNET MASKS
Subnet mask determines which part of address denotes
network portion and which denotes host
Class C: 255.255.255.0
70
Network Protocols and Standards
71
IP DATAGRAM - 1
IP DATAGRAM - 2
The datagram is the packet sent around the network.
Header information contains detail of where it came from,
where it is going to and processing information.
72
SUBNETS
A subnet is a logical subdivision of an IP network.
Subnets are meaningless to any router outside the business.
73
SUBNET ADDRESSING
The most significant part of the address is used to indicate
which network is intended, e.g. 192.168.1.0.
Devices on this subnet have addresses in the range
74
MULTIPLE SUBNETS
A router could have the address 192.168.0.0.
There could be a number of subnets within an address:
75
NETWORK ADDRESS TRANSLATION
(NAT)
77
FROM IPV4 TO IPV6
Address increased from 32-bit to 128-bit
Allows node to specify the message path
78
TRANSMISSION CONTROL PROTOCOL -
1
Designed to provide reliable delivery for IP
Takes care of breaking data into packets and reassembling at
the destination host
79
TRANSMISSION CONTROL PROTOCOL -
2
A connection-oriented protocol - a connection is established
and maintained until such time as the messages have been
exchanged
80
USER DATAGRAM PROTOCOL - 1
A simple transmission model using headers of only 8 bytes
Does not provide:
81
USER DATAGRAM PROTOCOL - 2
Does not have the delays that can be associated with TCP
Used with IP in time-sensitive applications:
82
FILE TRANSFER PROTOCOL
Uses TCP/IP to transmit/receive
Works at the application layer
83
SIMPLE MAIL TRANSFER PROTOCOL
Uses TCP/IP to transmit
Does not provide a user interface for sending and receiving
messages
84
HYPERTEXT TRANSFER PROTOCOL
Used throughout the World Wide Web for sending messages
and getting responses from servers
Most common method is the GET method to request and
PUT
POST
DELETE
TRACE
85
REFERENCES
PriceB. (ed) (2003). Networking Complete, 3rd edition.
Sybex.
Tanenbaum, A.S. & Weatherall, D.J. (2010). Computer
86