Você está na página 1de 20

P a g e |1

NETWORK PROTOCOLS PART I


PREPARED BY,
KAMESHWARAN SUBBURAJ / VYSHAKH VIJAYAN
INTRODUCTION

This paper offers an introduction to protocols and their function in a networking


environment. It explains the roles of protocols in a network communications and describes how
different protocols work at different OSI levels.
After this paper you will be able to:
Identify the functions of protocols and protocol stacks.
Describe the network protocols that use protocols and how they utilize them.
Map specific protocols to the appropriate OSI levels.
SOME BASIC DEFINITIO NS

What is networking?
A network is defined as a group of two or more computers linked together. There are many
types of networks including the following LANs, WANs, CANs, MANs, HANs.

What is OSI?
The OSI or Open System Interconnection model defines a networking frame work to
protocols in seven layers.

What is Protocol stack?


A protocol stack refers to a group of protocols that running concurrently that are employed
for the implementation of network protocol suite.

What is NIC?
Network Interface Card, it is also referred to as an Ethernet card and network adaptor. It is
an expansion card that enables a computer to connect a network.

COMMUNICATING SYSTEMS

The Information exchanged between devices through a network, or other media is


governed by rules and conventions that can be set out in technical specifications called
Communication protocol standards. The nature of communication, the actual data exchanged any
state dependent behaviors, is defined by its specification.

P a g e |2
In digital computing systems, the rules can be expressed by algorithms and data structures.
Expressing the algorithms in a portable programming language makes a protocol software
operating system independent.

FUNCTIONS OF PROTOCOLS

Protocols are rules and procedures for communicating. The term "protocol" is used in a
variety of contexts. For example, diplomats from one country adhere to rules of protocol designed
to help them interact smoothly with diplomats from other countries. Rules of protocol apply in the
same way in the computer environment. When several computers are networked, the rules and
technical procedures governing their communication and interaction are called protocols.
Keep three points in mind when you think about protocols in a network environment:
There are many protocols. While each protocol facilitates basic communications, each has
different purposes and accomplishes different tasks. Each protocol has its own advantages
and restrictions.
Some protocols work only at particular OSI layers. The layer at which a protocol works
describes its function. For example, a protocol that works at the physical layer ensures that
the data packet passes through the network interface card (NIC) and out onto the network
cable.
Protocols can also work together in a protocol stack, or suite. Just as a network
incorporates functions at every layer of the OSI reference model, different protocols also
work together at different levels in a single protocol stack. The levels in the protocol stack
"map," or correspond, to the layers of the OSI reference model.

HOW PROTOCOLS WORK?

The entire technical operation by which data is transmitted over the network has to be
broken down into discrete, systematic steps. At each step, certain actions take place that cannot
take place at any other step. Each step includes its own rules and procedures, or protocol.

The protocol steps must be carried out in a consistent order that is the same on every
computer in the network. In the sending computer, these steps must be executed from the top
down. In the receiving computer, these steps must be carried out from the bottom up.

The Sending Computer:


Protocols at the sending computer:
1)

Break the data into smaller sections, called packets that the protocol can handle.

P a g e |3
2) Add addressing information to the packets so that the destination computer on the network
can determine that the data belongs to it.
3) Prepare the data for transmission through the NIC and out onto the network cable.

The Receiving Computer:


Protocols at the receiving computer carry out the same series of steps in reverse order. They:
1) Take the data packets off the cable.
2) Bring the data packets into the computer through the NIC.
3) Strip the data packets of all the transmitting information that was added by the sending
computer.
4) Copy the data from the packets to a buffer for reassembly.
5) Pass the reassembled data to the application in a usable form.

Both sending and receiving computers need to perform each step in the same way so that the
data will have the same structure when it is received as it did when it was sent.
For example, two different protocols might each break data into packets and add on various
sequencing, timing, and error-checking information, but each will do it differently. Therefore, a
computer using one of these protocols will not be able to communicate successfully with a
computer that is using the other protocol.

OSI MODEL

OSI protocols are a family of standards for information exchange. These were developed
and designed by the International Organization of Standardization (ISO). In 1977 the ISO model was
introduced, which consisted of seven different layers. This model has been criticized because of its
technicality and limited features.

P a g e |4
Each layer of the ISO model has its own protocols and functions. The OSI protocol stack was
later adapted into the TCP/IP stack. In some networks, protocols are still popular using only the data
link and network layers of the OSI model.

1. Physical Layer:
The physical layer defines the electrical and physical specifications of the data connection. It
defines the relationship between a device and a physical transmission medium (e.g., a copper or
fiber optical cable, radio frequency). This includes the layout of pins, voltages, line impedance, cable
specifications, signal timing and similar characteristics for connected devices and frequency (5 GHz
or 2.4 GHz etc.) for wireless devices.

It is responsible for transmission and reception of unstructured raw data in a physical


medium. It may define transmission mode as simplex, half duplex, and full duplex. It defines the
network topology as bus, mesh, or ring being some of the most common.

The physical layer is the layer of low-level networking equipment, such as some hubs, cabling, and
repeaters. The physical layer is never concerned with protocols or other such higher-layer items.
Examples of hardware in this layer are network adapters, repeaters, network hubs, modems, and
fiber media converters.

P a g e |5
Modems:
A modem (modulator-demodulator) is a network hardware device that modulates one or
more carrier wave signals to encode digital information for transmission and demodulates signals to
decode the transmitted information.

The goal is to produce a signal that can be transmitted easily and decoded to reproduce the
original digital data. Modems can be used with any means of transmitting analog signals, from light
emitting diodes to radio. A common type of modem is one that turns the digital data of a computer
into modulated electrical signal for transmission over telephone lines and demodulated by another
modem at the receiver side to recover the digital data.

Repeaters:
In telecommunications, a repeater is an electronic device that receives a signal and
retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the
signal can cover longer distances.

Network Adaptors:
A network interface controller (NIC, also known as a network interface card, network
adapter, LAN adapter or physical network interface, and by similar terms) is a computer hardware
component that connects a computer to a computer network.
Early network interface controllers were commonly implemented on expansion cards that
plugged into a computer bus. The low cost and ubiquity of the Ethernet standard means that most
newer computers have a network interface built into the motherboard.

P a g e |6
2. Data link Layer:
The data link layer provides node-to-node data transfera link between two directly
connected nodes. It detects and possibly corrects errors that may occur in the physical layer.

This layer receives data from the physical layer and compiles it into a transform form called
framing or frame. Few examples for this layer PPP, FDDI, IEEE802

IEEE802:
When local area networks (LANs) first began to emerge as potential business tools in the
late 1970s, the IEEE realized that there was a need to define certain LAN standards. To accomplish
this task, the IEEE launched what became known as Project 802, named for the year and month it
began (1980, February).
The 802 specifications set standards for:
Network interface cards (NICs).
Wide area network (WAN) components.
Components used to create twisted-pair and coaxial cable networks.

Specification

Description

802.1

Sets Internetworking standards related to network management.

802.2

Defines the general standard for the data-link layer. The IEEE divides this layer into
two sublayers: the LLC and MAC layers (discussed in the previous lesson). The MAC
layer varies with different network types and is defined by standard IEEE 802.3.

802.3

Defines the MAC layer for bus networks that use Carrier-Sense Multiple Access with
Collision Detection (CSMA/CD). This is the Ethernet Standard.

802.4

Defines the MAC layer for bus networks that use a token-passing mechanism
(Token Bus LAN).

802.5

Defines the MAC layer for token ring networks (Token Ring LAN).

802.6

Sets standards for metropolitan area networks (MANs), which are data networks
designed for towns or cities. In terms of geographic breadth, MANs are larger than
LANs, but smaller than WANs. MANs are usually characterized by very-high-speed
connections using fiber-optic cables or another digital media.

802.7

Used by the Broadband Technical Advisory Group.

802.8

Used by the Fiber-Optic Technical Advisory Group.

802.9

Defines integrated voice/data networks.

802.10

Defines network security.

802.11

Defines wireless network standards.

P a g e |7
802.12

Defines Demand Priority Access LAN, 100BaseVG-AnyLAN.

802.13

Unused.

802.14

Defines cable modem standards.

802.15

Defines wireless personal area networks (WPAN).

802.16

Defines broadband wireless standards.

IEEE 802 divides the data link layer into two sub layers:
Media Access Control (MAC) layer - responsible for controlling how devices in a network
gain access to medium and permission to transmit it.
Logical Link Control (LLC) layer - responsible for identifying Network layer protocols and
then encapsulating them and controls error checking and frame synchronization.

PPP:
In computer networking, Point-to-Point Protocol (PPP) is a data link (layer 2) protocol used
to establish a direct connection between two nodes. It can provide connection authentication,
transmission encryption (using ECP, RFC 1968), and compression.
PPP is used over many types of physical networks including serial cable, phone line, trunk
line, cellular telephone, specialized radio links, and fiber optic links such as SONET. PPP is also used
over Internet access connections. Internet service providers (ISPs) have used PPP for customer dialup access to the Internet, since IP packets cannot be transmitted over a modem line on their own,
without some data link protocol.
Two derivatives of PPP, Point-to-Point Protocol over Ethernet (PPPoE) and Point-to-Point
Protocol over ATM (PPPoA), are used most commonly by Internet Service Providers (ISPs) to
establish a Digital Subscriber Line (DSL) Internet service connection with customers.

P a g e |8
FDDI:
A high-speed network technology, conforming to
the Open Systems Interconnection (OSI) reference model
for networking and the American National Standards
Institute (ANSI) standard X3T9, which runs at 100 Mbps
over fiber-optic cabling; often used for network backbones
in a local area network (LAN) or metropolitan area
network (MAN).

Fiber Distributed Data Interface (FDDI) is usually


implemented as a dual token-passing ring within a ring
topology (for campus networks) or star topology (within a
building). The dual ring consists of a primary and
secondary ring. The primary ring carries data. The counterrotating secondary ring can carry data in the opposite
direction, but is more commonly reserved as a backup in
case the primary ring goes down. This provides FDDI with
the degree of fault tolerance necessary for network
backbones. In the event of a failure on the primary ring,
FDDI automatically reconfigures itself to use the
secondary ring as shown in the illustration. Faults can be
located and repaired using a fault isolation technique
called beaconing. However, the secondary ring can also be
configured for carrying data, extending the maximum
potential bandwidth to 200 Mbps.

3. Network Layer:
The network layer provides the functional and procedural means of transferring variable
length data sequences (called datagrams) from one node to another connected to the same
network. It translates logical network address into physical machine address. A network is a
medium to which many nodes can be connected, on which every node has an address and which
permits nodes connected to it to transfer messages to other nodes connected to it by merely
providing the content of a message and the address of the destination node and letting the network
find the way to deliver the message to the destination node, possibly routing it through
intermediate nodes.
This is the most important layer of the OSI model, which performs real time processing and
transfers data from nodes to nodes. Routers and switches are the devices used for this layer. The
network layer assists the following protocols: Internet Protocol (IPv4), Internet Protocol (IPv6), IPX,
AppleTalk, ICMP, IPSec and IGMP.

P a g e |9
IPV4:
IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP) used to
to identify devices on a network through an addressing system. The Internet Protocol is designed
for use in interconnected systems of packet-switched computer communication networks.

IPv4 is the most widely deployed Internet protocol used to connect devices to the Internet.
IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses (just over 4 billion
addresses). With the growth of the Internet it is expected that the number of unused IPv4
addresses will eventually run out because every device -- including computers, smartphones and
game consoles -- that connects to the Internet requires an address.

IPV6:
IPv6 (Internet Protocol Version 6) is also called IPng (Internet Protocol next generation) and
it is the newest version of the Internet Protocol (IP) reviewed in the IETF standards committees to
replace the current version of IPv4 (Internet Protocol Version 4).

IPv6 is the successor to Internet Protocol Version 4 (IPv4). It was designed as an


evolutionary upgrade to the Internet Protocol and will, in fact, coexist with the older IPv4 for some
time. IPv6 is designed to allow the Internet to grow steadily, both in terms of the number of hosts
connected and the total amount of data traffic transmitted.

IPv6 is often referred to as the "next generation" Internet standard and has been under
development now since the mid-1990s. IPv6 was born out of concern that the demand for IP
addresses would exceed the available supply.

P a g e | 10
While increasing the pool of addresses is one of the most often-talked about benefit of IPv6, there
are other important technological changes in IPv6 that will improve the IP protocol:

- No more NAT (Network Address Translation)


- Auto-configuration
- No more private address collisions
- Better multicast routing
- Simpler header format
- Simplified, more efficient routing
- True quality of service (QoS), also called "flow labeling"
- Built-in authentication and privacy support
- Flexible options and extensions
- Easier administration (say good-bye to DHCP).

IPX:
Internetwork Packet Exchange (IPX) is the network layer protocol in the IPX/SPX protocol
suite. IPX is derived from Xerox Network Systems' IDP. It may act as a transport layer protocol as
well.
The IPX/SPX protocol suite was very popular through the late 1980s into the mid-1990s
because it was used by the Novell NetWare network operating system.

Advantages:
1) It was a small memory footprint of the IPX driver, which was MS-DOS, Windows 95
because limited size of the conventional memory.
2) An easy configuration of the client computers.

P a g e | 11

Dis-advantages:
1) It doesnt support the large networks.

Appletalk:
AppleTalk is a set of local area network communication protocols originally created for
Apple computers. An AppleTalk network can support up to 32 devices and data can be exchanged at
a speed of 230.4 kilobits per second (Kbps). Devices can be as much as 1,000 feet apart. AppleTalk's
Datagram Delivery Protocol corresponds closely to the Network layer of the Open Systems
Interconnection (OSI) communication model.

ICMP:
ICMP (Internet Control Message Protocol) is an error-reporting protocol network devices
like routers use to generate error messages to the source IP address when network problems
prevent delivery of IP packets. ICMP creates and sends messages to the source IP address indicating
that a gateway to the Internet that a router, service or host cannot be reached for packet delivery.
Any IP network device has the capability to send, receive or process ICMP messages.

ICMP is not a transport protocol that sends data between systems.

While ICMP is not used regularly in end-user applications, it is used by network


administrators to troubleshoot Internet connections in diagnostic utilities including ping and
traceroute.
One of the main protocols of the Internet Protocol suite, ICMP is used by routers,
intermediary devices or hosts to communicate error information or updates to other routers,
intermediary devices or hosts. The widely used IPv4 (Internet Protocol version 4) and the newer IPv6
use similar versions of the ICMP protocol (ICMPv4 and ICMPv6, respectively).
ICMP has been used to execute denial-of-service attacks (also called the ping of death) by
sending an IP packet larger than the number of bytes allowed by the IP protocol.

P a g e | 12

IPSec:
IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the
network or packet processing layer of network communication.

Earlier security approaches have inserted security at the Application layer of the
communications model. IPsec is said to be especially useful for implementing virtual private
networks and for remote user access through dial-up connection to private networks. A big
advantage of IPsec is that security arrangements can be handled without requiring changes to
individual user computers. Cisco has been a leader in proposing IPsec as a standard (or combination
of standards and technologies) and has included support for it in its network routers.
IPsec provides two choices of security service: Authentication Header (AH), which
essentially allows authentication of the sender of data, and Encapsulating Security Payload (ESP),
which supports both authentications of the sender and encryption of data as well. The specific
information associated with each of these services is inserted into the packet in a header that
follows the IP packet header. Separate key protocols can be selected, such as the ISAKMP/Oakley
protocol.

IGMP:
The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a
way for an Internet computer to report its multicast group membership to adjacent routers.
Multicasting allows one computer on the Internet to send content to multiple other computers that
have identified themselves as interested in receiving the originating computer's content.
Multicasting can be used for such applications as updating the address books of mobile computer
users in the field, sending out company newsletters to a distribution list, and "broadcasting" highbandwidth programs of streaming media to an audience that has "tuned in" by setting up a
multicast group membership.

P a g e | 13

4. Transport Layer:
The transport layer provides the functional and procedural means of transferring variablelength data sequences from a source to a destination host via one or more networks, while
maintaining the quality of service functions.
An example of a transport-layer protocol in the standard Internet stack is Transmission
Control Protocol (TCP), usually built on top of the Internet Protocol (IP).
The transport layer controls the reliability of a given link through flow control,
segmentation/desegmentation, and error control. Some protocols are state- and connectionoriented. This means that the transport layer can keep track of the segments and retransmit those
that fail. The transport layer also provides the acknowledgement of the successful data
transmission and sends the next data if no errors occurred. The transport layer creates packets out
of the message received from the application layer. Packetizing is a process of dividing the long
message into smaller messages.
An easy way to visualize the transport layer is to compare it with a post office, which deals
with the dispatch and classification of mail and parcels sent. Do remember, however, that a post
office manages the outer envelope of mail. Higher layers may have the equivalent of double
envelopes, such as cryptographic paper services that can be read by the addressee only.

TCP:
TCP (Transmission Control Protocol) is a standard that defines how to establish and
maintain a network conversation via which application programs can exchange data. TCP works
with the Internet Protocol (IP), which defines how computers send packets of data to each other.
Together, TCP and IP are the basic rules defining the Internet.
It can also be used as a communications protocol in a private network (either an intranet or
an extranet). When you are set up with direct access to the Internet, your computer is provided with
a copy of the TCP/IP program just as every other computer that you may send messages to or get
information from also has a copy of TCP/IP.
TCP is a connection-oriented protocol, which means a connection is established and
maintained until the application programs at each end have finished exchanging messages. It

P a g e | 14
determines how to break application data into packets that networks can deliver, sends packets to
and accepts packets from the network layer, manages flow control, andbecause it is meant to
provide error-free data transmissionhandles retransmission of dropped or garbled packets as well
as acknowledgement of all packets that arrive. In the Open Systems Interconnection (OSI)
communication model, TCP covers parts of Layer 4, the Transport Layer, and parts of Layer 5, the
Session Layer.

UDP:
UDP (User Datagram Protocol) is an alternative communications protocol to Transmission
Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating connections
between applications on the Internet. Both UDP and TCP run on top of the Internet Protocol (IP)
and are sometimes referred to as UDP/IP or TCP/IP. Both protocols send short packets of data,
called datagrams.
UDP provides two services not provided by the IP layer. It provides port numbers to help
distinguish different user requests and, optionally, a checksum capability to verify that the data
arrived intact.
TCP has emerged as the dominant protocol used for the bulk of Internet connectivity owing
to services for breaking large data sets into individual packets, checking for and resending lost
packets and reassembling packets into the correct sequence. But these additional services come at
a cost in terms of additional data overhead, and delays called latency.

In contrast, UDP just sends the packets, which means that it has much lower bandwidth
overhead and latency. But packets can be lost or received out of order as a result, owing to the
different paths individual packets traverse between sender and receiver.

5. Session Layer:
The session layer creates a session between the source and the destination nodes and
terminates sessions on completion of the communication process.

P a g e | 15
The session layer controls the dialogues (connections) between computers. It establishes,
manages and terminates the connections between the local and remote application. It provides for
full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment,
termination, and restart procedures.
The OSI model made this layer responsible for graceful close of sessions, which is a property
of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not
usually used in the Internet Protocol Suite. The session layer is commonly implemented explicitly in
application environments that use remote procedure calls.

NFS:
The Network File System (NFS) is a client/server application that lets a computer user view
and optionally store and update files on a remote computer as though they were on the user's own
computer. The NFS protocol is one of several distributed file system standards for networkattached storage (NAS).

NFS allows the user or system administrator to mount (designate as accessible) all or a
portion of a file system on a server. The portion of the file system that is mounted can be accessed
by clients with whatever privileges are assigned to each file (read-only or read-write). NFS uses
Remote Procedure Calls (RPC) to route requests between clients and servers.

NetBIOS:
NetBIOS (Network Basic Input/Output System) is a program that allows applications on
different computers to communicate within a local area network (LAN). It was created by IBM for its
early PC Network, was adopted by Microsoft, and has since become a de facto industry standard.
NetBIOS is used in Ethernet and Token Ring networks and, included as part of NetBIOS
Extended User Interface (NetBEUI), in recent Microsoft Windows operating systems. It does not in
itself support a routing mechanism so applications communicating on a wide area network (WAN)
must use another "transport mechanism" (such as Transmission Control Protocol) rather than or in
addition to NetBIOS.

P a g e | 16

NetBIOS provides two communication modes: session or datagram. Session mode lets two
computers establish a connection for a "conversation," allows larger messages to be handled, and
provides error detection and recovery. Datagram mode is "connectionless" (each message is sent
independently), messages must be smaller, and the application is responsible for error detection
and recovery. Datagram mode also supports the broadcast of a message to every computer on the
LAN.

6. Presentation Layer:
This layer provides independence from differences in data repaper (e.g., encryption) by
translating from application to network format, and vice versa. The functions of encryption and
decryption are defined on this layer. It converts data formats into a format readable by the
application layer. This layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the syntax layer.

XDR:

External Data Repaper (XDR) is a standard data serialization format, for uses such as
computer network protocols. It allows data to be transferred between different kinds of computer
systems. Converting from the local repaper to XDR is called encoding. Converting from XDR to the
local repaper is called decoding.

TLS/SSL:
The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is the most widely
deployed security protocol used today. It is essentially a protocol that provides a secure channel
between two machines operating over the Internet or an internal network. In todays Internet
focused world, the SSL protocol is typically used when a web browser needs to securely connect to
a web server over the inherently insecure Internet.

Technically, SSL is a transparent protocol which requires little interaction from the end user
when establishing a secure session. In the case of a browser for instance, users are alerted to the
presence of SSL when the browser displays a padlock, or, in the case of Extended Validation SSL,
when the address bar displays both a padlock and a green bar. This is the key to the success of SSL
it is an incredibly simple experience for end users.

Extended Validation (EV) SSL Certificates (such as GlobalSign ExtendedSSL) display visible
trust indicators:

P a g e | 17

Standard SSL Certificates (such as GlobalSign DomainSSL and OrganizationSSL) display:

7. Application Layer:
This layer works at the user end to interact with user applications. QoS (quality of service),
file transfer and email are the major popular services of the application layer.
The application layer is the OSI layer closest to the end user, which means both the OSI
application layer and the user interact directly with the software application. This layer interacts
with software applications that implement a communicating component.
Application-layer functions typically include identifying communication partners,
determining resource availability, and synchronizing communication.
Communication partners are identified, quality of service is identified, user authentication
and privacy are considered, and any constraints on data syntax are identified. Everything at this
layer is application-specific.

HTTP:
HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images,
sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their
Web browser, the user is indirectly making use of HTTP. HTTP is an application protocol that runs on top
of the TCP/IP suite of protocols (the foundation protocols for the Internet).

P a g e | 18

HTTP concepts include (as the Hypertext part of the name implies) the idea that files can
contain references to other files whose selection will elicit additional transfer requests.
Your Web browser is an HTTP client, sending requests to server machines. When the browser
user enters file requests by either "opening" a Web file (typing in a Uniform Resource Locator or URL) or
clicking on a hypertext link, the browser builds an HTTP request and sends it to the Internet Protocol
address (IP address) indicated by the URL. The HTTP daemon in the destination server machine receives
the request and sends back the requested file or files associated with the request. (A Web page often
consists of more than one file.)
The latest version of HTTP is HTTP 1.1.

SMTP:
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email)
transmission. However, since it is limited in its ability to queue messages at the receiving end, it is usually
used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox
and download them periodically from the server.

P a g e | 19
DHCP:
DHCP (Dynamic Host Configuration Protocol) is a communications protocol that network
administrators use to centrally manage and automate the network configuration of devices attaching to
an Internet Protocol (IP) network.

DHCP allows devices needing an IP address to request one when they are starting up, for
example, rather than an address preassigned and manually configured on each device. With DHCP, if a
device is moved from place to place, it will be assigned a new address in each location. Without DHCP,
network administrators must not only manually configure each device with a valid IP address, but also
reconfigure the device with a new IP address if it moves to a new location on the network. DHCP exists
for both IPv4 and IPv6 (Internet Protocol version 6).
CONCLUSION

The following points summarize the main elements of this lesson:

Protocols in a networking environment define the rules and procedures for transmitting data.

To send data over a network successfully requires a series of separate steps that must be carried
out in a prescribed order.

The sending and receiving computers use protocols to:


o

Break data into packets.

Add addressing information to the packets.

Prepare the packets for transmission.

Take the packets off the cable.

Copy the data from the packets for reassembly.

Pass the reassembled data to the computer.

Several stacks are used as standard protocols; the most prominent standard protocols are based
on the OSI reference model layers.

Protocols are implemented and removed in the same manner as drivers.

P a g e | 20

REFERENCES

http://pluto.ksi.edu/~cyh/cis370/ebook/ch06b.htm

https://en.wikipedia.org/wiki/OSI_model

https://www.techopedia.com/definition/24961/osi-protocols

http://www.webopedia.com/quick_ref/OSI_Layers.asp

http://www.marketsandmarkets.com/Market-Reports/electric-power-substation-automationintegration-market-208537744.html?gclid=CJuWx9nFjM8CFUehaAodnaYBbA

https://en.wikipedia.org/wiki/List_of_automation_protocols=

https://en.wikipedia.org/wiki/IEC_61850

http://www.bvucoepune.edu.in/pdf's/Research%20and%20Publication/Research%20Publicatio
ns_2010-11/National_Conference_201011/IEC%2061850%20Substation%20automation%20protocol%20and%20implementation%20is
sues.pdf

https://scadahacker.com/library/Documents/ICS_Protocols/ProSoft%20%20Power%20Industry%20Comm%20Protocol%20Features%20and%20Benefits.pdf

http://www.eng.uwo.ca/people/tsidhu/Documents/project%20report%20Uzair.pdf
TCP/UDP

https://www.youtube.com/watch?time_continue=538&v=Vdc8TCESIg8
TLS/SSL

https://www.youtube.com/watch?v=rROgWTfA5qE

Você também pode gostar