You are on page 1of 20

Network Protocols by MAZHAR IQBAL BUTT.

What is Protocol? A standard, formal, briefly described and technically defined set of communication rules for exchange data between peripheral devices/Computers and transmission across a network. It includes timing, format, sequencing, error checking, etc. between two communicating systems. OR A uniform agreed-upon formatted set of Transmission rules that enable two devices to connect and transmit data to one another.
Network Protocols by MAZHAR IQBAL BUTT. 2

A protocol is the "language" of the network. A method by which two dissimilar systems can communicate. Protocols can describe low-level details of machine-to-machine interfaces (eg, the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (eg, the way in which two programs transfer a file across the Internet). Low-level protocols define the electrical and physical standards to be observed, while highlevel protocols deal with data formatting.
Network Protocols by MAZHAR IQBAL BUTT. 3

The protocol determines The type of error checking to be used, Data compression method (if any), How the sending device will indicate that it has finished sending a message, How the receiving device will indicate that it has received a message. There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster.
Network Protocols by MAZHAR IQBAL BUTT. 4

Protocols may be implemented by hardware, software, or a combination of the two. These often use other protocols to provide services. A communications protocol is used for data representation, signaling, authentication, and error detection required to send information over a communications channel. Internet protocols include TCP/IP (Transfer Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), and SMTP (Simple Mail Transfer Protocol).
Network Protocols by MAZHAR IQBAL BUTT. 5

Protocols should be distinguished from technical standards, which variously specify how to build a computer or related hardware device, or how the contents of a file are structured, or describe the static structure of a network interface. Protocols are generally used to define realtime communications behavior, while standards are used to govern the structure of information committed to long-term storage. Protocols vary so greatly in purpose and sophistication.
Network Protocols by MAZHAR IQBAL BUTT. 6

PROTOCOLS BEHAVIORS Detection of the underlying physical connection (wired or wireless), or the existence of the other endpoint or node Handshaking Negotiation of various connection characteristics How to start and end a message How to format a message What to do with corrupted or improperly formatted messages (error correction) How to detect unexpected loss of the connection, and what to do next Termination of the session or connection
Network Protocols by MAZHAR IQBAL BUTT. 7

Generally, only the simplest protocols are used alone. Mostly, in the context of communications or networking, are layered together into protocol stacks where the various tasks are divided among different protocols in the stack. The protocol stack denotes a specific combination of protocols that work together, the reference model is a software architecture that lists each layer and the services each should offer. The classic seven-layer reference model is the OSI model, which is used for conceptualizing protocol stacks and peer entities. This model also provides an opportunity to teach more general software engineering concepts like hiding, modularity, and delegation of tasks.
Network Protocols by MAZHAR IQBAL BUTT. 8

NETWORK PROTOCOL DESIGN PRINCIPLES Network Systems engineering principles have been applied to create a set of common network protocols. These principles include Effectiveness, Reliability, and Resiliency.
Network Protocols by MAZHAR IQBAL BUTT. 9

EFFECTIVENESS A protocol will be considered as effective if its usage or implementation is easy. In human-machine systems, its design needs to facilitate routine usage by humans. Protocol layering accomplishes these objectives by dividing the protocol design into a number of smaller parts, each of which performs closely related sub-tasks, and interacts with other layers of the protocol only in a small number of well-defined ways. Protocol layering allows the parts of a protocol to be designed and tested by keeping each design relatively simple.
10

Network Protocols by MAZHAR IQBAL BUTT.

RELIABILITY It means assurance of data transmission involves error detection and correction, or some means of requesting retransmission, because communication media are always faulty. The conventional measure of quality is the number of failed bits per bit transmitted. This has the wonderful feature of Communication systems and corrects errors by selectively resending bad parts of a message. RESILIENCY Resiliency addresses a form of network failure known as topological failure in which a communications link is cut, or degrades below usable quality. Most modern communication protocols periodically send messages to test a link.
Network Protocols by MAZHAR IQBAL BUTT. 11

FUNCTIONS OF PROTOCOLS 1.Segmentation and Reassembly 2.Encapsulation 3.Connection Control 4.Ordered Delivery 5.Error Control
Network Protocols by MAZHAR IQBAL BUTT. 12

Segmentation and Reassembly A protocol breaks up the data into smaller blocks, called Segmentation or Fragmentation. At the receiving end, the segmented data must be reassembled, called Reassembly. Encapsulation A PDU (Protocol Data Unit) usually contains both data and control information (header). Some PDUs only contain control information and no data.The addition of control information to data is called Encapsulation.
Network Protocols by MAZHAR IQBAL BUTT. 13

Connection Control Data transfer between two stations can be connectionless or connectionoriented. In connection-oriented data transfer, a logical connection is established between the stations before actual transfer of data. In connectionless data transfer, both stations transfer data in an unplanned way.
Network Protocols by MAZHAR IQBAL BUTT. 14

In Connection-Oriented communication, the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent, each end point must be able to transmit so that it can communicate. Connection oriented means both the client and server must open the connection before data is sent. Connection-oriented protocol is a "reliable" network service, because it guarantees that data will arrive in the proper sequence. Transmission Control Protocol (TCP) is a connection-oriented protocol. These are also called STATFUL Protocols because they can keep track of a conversation.
15

Network Protocols by MAZHAR IQBAL BUTT.

In Connectionless communication between two network end points, a message can be sent from one end point to another without prior arrangement. The device at one end of the communication transmits data to the other, without first ensuring that the recipient is available and ready to receive the data. The device sending a message simply sends it addressed to the intended recipient. If there are problems with the transmission, it may be necessary to resend the data several times. Connectionless protocol is a fast" network service. The User Datagram Protocol (UDP) is connectionless protocol. These are also called STATELESS Protocols because they have no record of a conversation
Network Protocols by MAZHAR IQBAL BUTT. 16

Ordered Delivery PDUs received by the station may not be in the same order as they were sent by the transmitting station because of different paths in network. Each PDU is given a unique sequence number, the receiving station easily rearrange them in the same order they were sent.

Network Protocols by MAZHAR IQBAL BUTT.

17

Error Control Error control is used to recover from lost or damaged PDUs. Sequence numbers are used for error control. A receiving station acknowledges each PDU it receives correctly by sending back its sequence number to the transmitting station. If a sender does not receive a positive acknowledgment within a certain amount of time , the sender assumes that the PDU is either lost or was not received correctly. It then retransmits that PDU.
Network Protocols by MAZHAR IQBAL BUTT. 18

TUNNELING PROTOCOL A tunneling protocol is a network protocol which encapsulates one protocol or session inside another. Protocol A is encapsulated within protocol B, such that A treats B. Tunneling may be used to transport a network protocol through a network which would not otherwise support it.
Network Protocols by MAZHAR IQBAL BUTT. 19

Network Protocols by MAZHAR IQBAL BUTT.

20

You might also like