You are on page 1of 30

PROTOCOLS

MITM 205 Advance Computer Networks

Ralph Vincent H. Badon


1

NETWORK PROTOCOLS

a protocol is the special set of rules that


end points in a telecommunication
connection use when they communicate.
Protocols exist at several levels in a
telecommunication connection.
Protocols are often described in an
industry or international standard.
An agreed-upon format for transmitting
data between two devices.

NETWORK PROTOCOLS

The protocol determines the following:


the type of error checking to be used
data compression method, if any
how the sending device will indicate that
it has finished sending a message
how the receiving device will indicate
that it has received a message.

NETWORK PROTOCOLS

Key Concerns Addressed by Protocols


Syntax: data format, voltage levels and
bit encoding
Semantics: control information for
controlling network functions
Timing: synchronization and flow
control
Above concerns are the minimum to
insure reliable communications between
computers
4

Protocol Functions

Segmentation/Reassembly
data is segmented into protocol data
units (PDUs)
buffer size of intermediate nodes
error control is more efficient with
smaller blocks of data
Encapsulation
PDUs contain control information as well
as the data handed to it
attaching of control information to the
head of a PDU is known as encapsulation
5

Protocol Functions
Connection Control
data transfer can be either connectionless or
connection-oriented
in connectionless transfers each PDU is
independent of all others sent
in connection-oriented transfers a logical
connection is established prior to the data
transfer, then each PDU sent has a sequence
number
sequencing supports ordered delivery, flow
control, and error control
connection control function of a protocol
manages the establishment and disconnection of
a link
6

Protocol Functions
Ordered Delivery
PDUs may travel different routes, and may
arrive out of order with respect to the
transmitting order
a protocol must be able to reorder the PDUs in
the correct order
Flow Control
a receiver may not be able to process the PDUs
as fast as the transmitter can send them
a receiver requires some way of limiting the
rate of the transmitter
flow control functions ensure that data sent
does not overwhelm the receiver
7

Protocol Functions
Error Control
PDUs can be lost or damaged
methods for detecting and correcting errors is
required
retransmission upon failure of
acknowledgement of receipt is a common
method for handling lost PDUs
Addressing
a protocol must have a means for identifying a
particular user using a particular application
on a particular host residing on some network
addressing is a means for protocols to identify
these needs
8

Protocol Functions

Multiplexing
multiplexing is used to improve the
efficiency and usage of the transmission
medium
Transmission Services
other types of services to the upper
layers exist
three common services are: priority,
grade of service, and security

Protocol Suites

TCP/IP
Netware Protocol Suite

10

TCP/IP

most popular protocol suite in use today


DEFACTO standard
TCP was originally developed back in
1974, while TCP and IP came together in
1978
January 1, 1983 - all systems on the
Internet (then known as the ARPANET)
officially had to use TCP/IP
Widely used by hardware and software
vendors
Well suited for LANs and WANs
11

The TCP/IP Network Architecture

12

Internet Protocol (IP)

a connectionless protocol
it doesnt request acknowledgements for
data sent
a packet-based protocol used to exchange
data over computer networks.
IP handles addressing, fragmentation,
reassembly, and protocol multiplexing.
a network-layer protocol that contains
addressing and control information that
allows data packets to be routed
13

Internet Protocol (IP)


Every IP network requires a unique network ID,
and each host on a network requires a unique
host ID.
An IP address simply gives us information as to
the network on which a unique host can be
found.
In order to communicate with a host on a
different network, communication requires the
use of routing. IP is what is referred to as a
routed or routable protocol.
That simply means that if a network is configured
correctly, a host on one network will be able to
communicate with a host on another
14

Transmission Control Protocol (TCP)

used along with the Internet Protocol (IP)


to send data in the form of message units
between computers over the Internet.
takes care of keeping track of the
individual units of data (called packets)
that a message is divided into for efficient
routing through the Internet.

15

Transmission Control Protocol (TCP)

the connection-oriented transport protocol


in the TCP/IP protocol suite
attempts to make connections reliable
through the use of positive
acknowledgement with retransmission
a system where acknowledgements are
required for all data sent
specifies the procedures that the
computers use to ensure that the data
arrives correctly.
16

Transmission Control Protocol (TCP)

When two systems wish to communicate


via TCP, they first establish a session
Once data has been transmitted and the
session is complete, it is closed
TCP communicates with upper-layer
applications and protocols through the use
of port numbers.
When combined with an IP address, a port
number defines a unique endpoint for
communication. There are 65,536 port
numbers available to TCP.
17

Transmission Control Protocol (TCP)

For example, when a file is sent to you


from a computer, the TCP program layer in
that computer divides the file into one or
more packets, numbers the packets, and
then forwards them individually to the IP
program layer.
Although each packet has the same
destination IP address, it may get routed
differently through the network.
At the other end (the recipient computer),
TCP reassembles the individual packets
and waits until they have arrived to
forward them to you as a single file.
18

TCP/IP Application Layer

Telnet. Telnet is used to create a terminal


session with a remote host, providing
command-line access to the target system
running a telnet server (daemon).
FTP. The File Transfer Protocol is used to
reliably transfer files between an FTP
client and server using TCP.
SMTP. The Simple Mail Transfer Protocol
is used for the exchange of email between
systems.
19

TCP/IP Application Layer

DNS. The Domain Name Service is a


distributed database that is queried to
resolve (or translate) names such as
www.2000trainers.com to an IP address.
SNMP. The Simple Network Management
Protocol is a lightweight network protocol
that allows information to be gathered
about network devices.
Examples include information about
utilization, hardware configuration, and
so forth.
20

TCP/IP Application Layer

TFTP. The Trivial File Transfer Protocol is


used to transfer files between a client and
a TFTP server over UDP.
HTTP (Hypertext Transfer Protocol)
enables services to terminals running
WWW clients and browsers.
DHCP. Dynamic Host Configuration
Protocol.

21

User Datagram Protocol (UDP)

a very simple protocol


a connection-less-oriented protocol
relies on upper layer applications and
services for reliability
also makes use of 65,536 port numbers to
define communication endpoints.
Common network applications that use UDP
include: the Domain Name System (DNS),
streaming media applications such as IPTV,
Voice over IP (VoIP), Trivial File Transfer
Protocol (TFTP) and online games.
22

UDP Packet Structure

23

Address Resolution Protocol (ARP)

protocol found at the Internet layer of the


TCP/IP model
used to resolve addresses that is finding the
MAC address that corresponds to an IP address
data is encapsulated before being sent over the
network, even though a system may know the
IP address it wants to ultimately send data to,
it may not know the MAC address
On an Ethernet LAN, systems communicate
directly using CSMA/CD, and as such must
know the MAC address of the system that data
must be sent to.
24

Address Resolution Protocol (ARP)

when a system needs to obtain the MAC


address associated with an IP address, it
sends out a broadcast message asking
that the system with the specified IP
address reply with its MAC address
Once it receives a reply, the answer is
cached for a limited period of time
(typically between 2 and 20 minutes) in
the systems ARP table

25

Address Resolution Protocol (ARP)

Since an ARP request is a broadcast, it will


be seen by every system in the same
broadcast domain.
When a system comes across an ARP
request, it will check to see if it is the
intended recipient. If it is, the system will
process the frame. If not, the frame is
ignored.
When a system wishes to communicate
with another system in a different
broadcast domain, the packets must be
sent to a router.
26

Internet Control Message Protocol (ICMP)

another protocol at the Internet layer


used as an error reporting protocol in the
TCP/IP suite; reports on error situations
that exist or occur
Example:
when a router receives more data than
it can handle, the router will send the
source host a message, effectively
letting the source know that it should
send data at reduced rate
27

Internet Control Message Protocol (ICMP)

the message doesnt include any


information on packets that may have
been lost
it simply makes the sender aware that a
situation exists.
It is still the responsibility of upper-layer
protocols to ensure that data arrives at its
destination.
Ping is an example of a simple ICMP utility
that provides information on whether or
not hosts can be reached.
28

ICMP segment structure


Type - ICMP type (Ex. 3 Destination
Unreachable)
Code - further specification of the ICMP type;
e.g. : an ICMP Destination Unreachable might
have this field set to 1 through 15 each bearing
different meaning.
Checksum - This field contains error checking
data calculated from the ICMP header+data, with
value 0 for this field.
ID - This field contains an ID value, should be
returned in case of ECHO REPLY.
Sequence - This field contains a sequence value,
should be returned in case of ECHO REPLY.
29

Any questions?

End of Lecture.
MITM 205 Advance Computer Networks
30

You might also like