Protocols Architecture

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 60

PROTOCOLS &

ARCHITECTURE
Objectives

 Explain network protocols


 State network protocols and their functions
 Identify the layers of the OSI model and their functions
 Differentiate between OSI and TCP/IP models
PROTOCOLS

 Theconcepts of distributed processing and computer


networking imply that entities in different systems need to
communicate.
 Examples of entities are user application programs, file
transfer packages, database management systems,
electronic mail facilities, etc
 Examples of systems are computers, terminals, and
remote sensors
 An entity is anything capable of sending or receiving
information
 A system is a physically distinct object that contains one
or more entities
 For two entities to successfully communicate, they must
speak the same language
 What is communicated, how it is communicated, and
when it is communicated must conform to some mutually
acceptable set of conventions between the entities
involved
 Protocolis defined as a set of rules governing the
exchange of data between two entities.
Key Elements of a Protocol

 Syntax. Includes such things as data format, coding, and


signal levels.
 Semantics. Includes control information for coordination
and error handling.
 Timing. Includes speed matching and sequencing.
Types of Network Protocols

 Hypertext Transfer Protocol (HTTP)


 Hyper Text Transfer Protocol Secure (HTTPS)
 Secure Socket Shell (SSH)
 Short Message Service (SMS)
 Transmission Control Protocol (TCP)
 Internet Protocol (IP)
 User Datagram Protocol (UDP)
 Post office Protocol (POP)
 Simple mail transport Protocol (SMTP)
 File Transfer Protocol (FTP)
 Telnet
 DHCP (Dynamic Host Configuration Protocol)
 Designed for transferring a hypertext
Hyper Text among two or more systems.
Transfer Protocol  HTML tags are used for creating links.
(HTTP)
 These links may be in any form like
text or images.
 HTTP is designed on Client-server
principles which allow a client system
for establishing a connection with the
server machine for making a request.
 The server acknowledges the request
initiated by the client and responds
accordingly.
 A standard protocol to secure the
Hyper Text communication among two computers,
Transfer Protocol one using the browser and other fetching
Secure (HTTPS) data from web server.
 HTTP is used for transferring data
between the client browser (request) and
the web server (response) in the
hypertext format
 In the case of HTTPS, the transferring of
data is done in an encrypted format.
 HTTPS can thwart hackers from
interpretation or modification of data
throughout the transfer of packets.
Secure Socket Shell
(SSH)  This protocol provides secure
access to a computer, even if it
is on an unsecured network.
 SSH is particularly useful
for network administrators who
need to manage different
systems remotely.
 A protocol created to send and
Short Message receive text messages over
Service (SMS) cellular networks.
 SMS refers exclusively to text-
based messages.
 Pictures,videos or other media
require Multimedia Messaging
Service (MMS), an extension of
the SMS protocol.
 TCP is a popular
Transmission
Control Protocol communication protocol used
(TCP) for communicating over a
network.
 Itdivides any message into
series of packets that are sent
from source to destination.
 Packets get reassembled at the
destination.
 IP isdesigned explicitly as
Internet Protocol addressing protocol.
(IP)  Mostly used with TCP.
 IP addresses in packets help in
routing them through different
nodes in a network until it
reaches the destination system.
 The most popular protocol
connecting the networks.
 UDP is a substitute
User Datagram
Protocol (UDP) communication protocol to
Transmission Control Protocol
implemented primarily for
creating loss-tolerating and low-
latency linking between
different applications.
Post office Protocol
(POP)
 POP3is designed for receiving
incoming E-mails.
Simple Mail
Transfer Protocol
(SMTP)
 SMTP is designed to send and
distribute outgoing E-Mail.
 FTP allows users to transfer
File Transfer files from one machine to
Protocol (FTP) another.
 Responsiblefor uploading and
downloading
 Types of files may include
program files, multimedia files,
text files, and documents, etc.
 Telnet is a set of rules designed
for connecting one system with
Telnet another.
 The connecting process here is
termed as remote login.
 The system which requests for
connection is the local
computer, and the system which
accepts the connection is the
remote computer.
 A client/server protocol that automatically
Dynamic Host provides an Internet Protocol (IP) host with
Configuration its IP address
Protocol (DHCP)  With DHCP, this entire process is
automated and managed centrally.
 DHCP server maintains a pool of IP
addresses and leases an address to any
DHCP-enabled client when it starts up on
the network.
 Because the IP addresses are dynamic
(leased) rather than static (permanently
assigned), addresses no longer in use are
automatically returned to the pool for
reallocation.
OSI MODEL

 OSI stands for Open System Interconnection


 A reference model that describes how information from
a software application in one computer moves through a
physical medium to the software application in another
computer.
 OSI consists of seven layers, and each layer performs a
particular network function.
 OSImodel was developed by the International
Organization for Standardization (ISO)
 Nowconsidered as an architectural model for the inter-
computer communications.
 OSI
model divides the whole task into seven smaller and
manageable tasks. Each layer is assigned a particular task.
Protocol Data Unit (PDU)

 A protocol data unit (PDU) is an open-system


interconnection (OSI) term used in telecommunications
that refers to a group of information added or removed by
a layer of the OSI model.
 Each layer in the model uses the PDU to:
 communicate and exchange information, which can only be
read by the peer layer on the receiving device and is then
handed over to next upper layer after stripping.
 In layered systems, PDU represents a unit of data
specified in the protocol of a given layer, which consists
of protocol control information and user data.
 PDU is a significant term related to the initial four layers
of the OSI model.
 Physical layer PDU is a bit,
 Data link layer, it is a frame
 Network layer, it is a packet
 Transport layer, it is a segment.
 In Layer 5 and above, PDU is referred to as data.
Layers of the OSI Model
1. Physical Layer

 The physical layer is responsible for the physical cable or


wireless connection between network nodes.
 It defines the connector, the electrical cable or wireless
technology connecting the devices, and is responsible for
transmission of the raw data, which is simply a series of
0s and 1s
 Electrical, mechanical, and physical systems and
networking devices that include specifications such as
cable size, signal frequency, voltages, etc.
 Topologies such as Bus, Star, Ring, and Mesh
 Communication modes such as Simplex, Half Duplex,
and Full Duplex
 Data transmission performance, such as Bit rate and Bit
synchronisation
 Modulation, switching, and interfacing with the physical
transmission medium
 Common protocols include Wi-Fi, Ethernet, etc
 Hardware including networking devices, antennas, cables,
modem, and intermediate devices such as repeaters and hubs
2. Data Link Layer

 Establishes and terminates a connection between two


physically-connected nodes on a network.
 Itbreaks up packets into frames and sends them from
source to destination.
 It is composed of two parts:
 Logical Link Control (LLC), which identifies network
protocols, performs error checking and synchronizes frames,
and
 Media Access Control (MAC) which uses MAC addresses to
connect devices and define permissions to transmit and receive
data.
 Thedata is transmitted sequentially and the layer expects
acknowledgement for the encapsulated raw data sent
between the nodes.
3. Network Layer

 Organizes and transmits data between multiple networks.


 Responsible for routing the data via the best physical path.
 The network layer implements logical addressing for data
packets to distinguish between the source and destination
networks.
 Outgoing data is divided into packets and incoming data is
reassembled into information that is consumable at a higher
application level.
 The network layer has two main functions.
 Breaking up segments into network packets, and reassembling
the packets on the receiving end.
 Routing packets by discovering the best path across a physical
network.
 Thenetwork layer uses network addresses (typically IP
addresses) to route packets to a destination node.
 Network layer hardware includes router, 3-layer switches
 Protocols such as Internet Protocol (IPv4) version 4 and
Internet Protocol (IPv6) version 6
4. Transport Layer

 Ittakes data transferred in the session layer and breaks it


into “segments” on the transmitting end
 Itis responsible for reassembling the segments on the
receiving end, turning it back into data that can be used
by the session layer.
 Its functions include:
 error control, thus, resend the information that fails delivery.
 flow control
 congestion control to keep track of the data packets
 check for errors and duplication
 Protocols at transport layer include:
 TCP for connection-oriented data transmission
 UDP for connectionless data transmission
5. Session Layer

 Itmanages sessions between servers to coordinate


communication.
 Session refers to any interactive data exchange between
two entities within a network e.g. HTTPS session
 Itcreates communication channels, called sessions,
between devices.
 It is responsible for opening sessions, ensuring they
remain open and functional while data is being
transferred, and closing them when communication ends.
 Itcan also set checkpoints during data transfer - if the
session is interrupted, devices can resume data transfer
from the last checkpoint.
 Other functions are:
 authentication and authorization of communication between
specific apps and servers
 identifying full-duplex or half-duplex operations
 synchronizing data streams
 Session layer protocols include:
 Remote Procedure Call protocol (RPC)
 Point-to-Point Tunnelling Protocol (PPTP)
 Session Control Protocol (SCP)
 Session Description Protocol (SDP)
6. Presentation Layer

 Converts data formats between applications and the


networks.
 Maps the semantics and syntax of the data such that the
received information is consumable for every distinct
network entity.
 E.g. the data we transfer from our encryption-based
communication app is formatted and encrypted at this layer
before it is sent across the network.
 Itdefines how two devices should encode, encrypt, and
compress data so it is received correctly at the other end.
 Ittakes any data transmitted by the application layer and
prepares it for transmission over the session layer.
 Atthe receiving end, the data is decrypted and formatted
into text or media information as originally intended.
 Summary of presentation layer functions:
 Data conversion
 Character code translation
 Data compression
 Encryption and decryption
7. Application Layer

 Itconcerns the networking processes at the application


level.
 This layer interacts directly with end-users to provide
support for email, network data sharing, file transfers, and
directory services, among other distributed information
services.
 It facilitates networking requests by end-user requests
 Determines resource availability
 Synchronizes communication
 Manages application-specific networking requirements
 Protocols at the application layer include:
 Hypertext Transfer Protocol (HTTP)
 File Transfer Protocol (FTP)
 Post Office Protocol (POP)
 Simple Mail Transfer Protocol (SMTP)
 Domain Name System (DNS)
TCP/IP MODEL

 TCP/IP specifies how data is exchanged over the internet


by providing end-to-end communications that identify how
it should be broken into packets, addressed, transmitted,
routed and received at the destination.
 TCP/IP requires little central management and is designed
to make networks reliable with the ability to recover
automatically from the failure of any device on the
network.
 TCP defineshow applications can create channels of
communication across a network.
 Italso manages how a message is assembled into smaller
packets before they are then transmitted over the internet
and reassembled in the right order at the destination
address.
 IP defines how to address and route each packet to make
sure it reaches the right destination.
 Each gateway computer on the network checks this IP
address to determine where to forward the message.
 TheTCP/IP model is a concise version of the OSI
model.
 It contains four layers namely;
 Application Layer, Transport Layer, Internet Layer, and
Network Access Layer
Network Layer

 It is the lowest layer that is concerned with the physical


transmission of data.
 TCP/IP does not specifically define any protocol here but
supports all the standard protocols e.g. IP, HTTP etc
Internet Layer

 Itdefines the protocols for logical transmission of data


over the network.
 The main protocol in this layer is Internet Protocol (IP)
and it is supported by other protocols such as ICMP and
ARP.
Transport Layer

 It is responsible for error-free end-to-end delivery of data.


 The protocols defined here are Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP).
Application Layer

 This is the topmost layer and defines the interface of host


programs with the transport layer services.
 This
layer includes all high-level protocols like Telnet,
DNS, HTTP, FTP, SMTP, etc.
Thank You

You might also like