Você está na página 1de 26

NETWORKING PROTOCOLS

SUBMITTED BY
NEHARIKA SINGH(006) REENUM CHANDER(018) MEGHA KUMAR(021) JUVARIA KHAN(053) VASUNDHARA PAHUJA(055) KANIKA AHUJA(058)

INTRODUCTION

A protocol is a set of formal operating rules, procedures, or conventions that govern a given process. A network protocol describes the rules that govern the transmission of data over communication networks. They provide a method for orderly and efficient exchange of data between the sender and the receiver and for the proper interpretation of controls and data. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.

ROLES OF PROTOCOL
DATA SEQUENCIN G

DATA SECURITY

DATA FORMATTIN G

DATA ROUTING

ERROR CONTROL

FLOW CONTROL

ETHERNET

is a family of computer networking technologies for local area networks (LANs) Systems communicating over Ethernet divide a stream of data into individual packets called frames Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted. Ethernet establishes link level connections, which can be defined using both the destination and sources addresses.

On reception of a transmission, the receiver uses the destination address to determine whether the transmission is relevant to the station or should be ignored Network interfaces normally do not accept packets addressed to other Ethernet stations.

CONCEPT OF LAYERED PROTOCOLS

Computer networks are logically composed of a succession of layers or levels. Each layer has its own set of protocols. Reasons for using the concept of layered protocols: To make the implementation more manageable

To provide well-defined interfaces between the layers, so that the change in one layer does not affect an adjacent layer. To allow interaction between functionally paired layers in different locations

THE OSI MODEL

The Open System interconnection(OSI) model is a framework, established by the International Standards Organization(ISO), for defining standards for linking heterogeneous computers in a packet switched network.

The OSI model is a seven layer architecture in which a separate set of protocols is defined for each layer. Thus, each layer has an independent function.
The standardized OSI protocols made it possible for any two heterogeneous computer systems, located anywhere in the world, to easily communicate with each other.

Application layer (7)


Presentation Layer (6)

Provides services directly to user applications. Because of the potentially wide variety of applications. Performs data transformation to provide a common interface for user applications, including services like reformatting, data encryption, etc. Establishes, manages, and ends user connections and manages the interaction between end systems.
Insulates the upper three layers, 5 through 7, from having to deal with the complexities of layer 1 through 3 by providing functions necessary to guarantee a reliable network link.

Session Layer (5)


Transport Layer (4)

Network Layer (3)


Data-Link Layer (2)

Establishes, maintains, and terminates network connections. Arrange other functions

Ensures the reliability of the physical link established at layer (1). Controls transmission of the raw bit stream over the transmission medium.

Physical Layer (1)

TCP/IP MODEL

TCP/IP (Transmission Control Protocol/ Internet Protocol) Most widely used protocol Offers a suite of protocols Protocol of the Internet Supported by most network server and workstation operating systems This model is prevalent in the current networking community It consists of four layers.

LAYERS OF TCP/IP MODEL


Application Layer Transport Layer Internet Layer Network access Layer
Deals with application program using the network. Offer services for users to communicate over a network.

Responsible for providing end-to-end data integrity through a highly reliable communication services. Responsible for routing messages through internetworks using devices such as gateway and router.
Defines the transmission of a frame over a network. Exchanges the data between a computer and the physical network.

TCP/IP COMPARED TO THE OSI MODEL

Application layer roughly corresponds to Session, Application, and Presentation layers of OSI Model
Transport layer roughly corresponds to Transport layers of OSI Model Internet layer is equivalent to Network layer of OSI Model Network Interface layer roughly corresponds to Data Link and Physical layers of OSI Model

TYPES OF PROTOCOLS
TRANSMISSION CONTROL PROTOCOL(TCP)

TCP is a reliable connection-oriented protocol. TCP uses acknowledgments, sequencing, and flow control to ensure reliability Provides reliable data delivery services It uses end-to-end mechanisms to ensure reliable, ordered delivery of data over a logical

INTERNET PROTOCOL(IP)

Provides information about how and where data should be delivered Sub-protocol, that enables TCP/IP to implement internetworking

IP uses logical or virtual addressing to get a packet from a source to its destination. IP addresses are used by routers to make forwarding decisions IP is an unreliable, connectionless protocol, which means it does not guarantee delivery of data

Connectionless :-Allows protocol to service a request without requesting verified session and without guaranteeing delivery of data

USER DATAGRAM PROTOCOL (UDP)

It is a connectionless protocol It allows you to send datagrams, packets, between machines. UDP is simpler than TCP but is an unreliable protocol, because when it is used, message packets can be lost, duplicated, or arrive out of order. There is no guarantee that a packet will ever reach its destination, thus, it can be used by only those applications that do not need reliable communication

FILE TRANSFER PROTOCOL (FTP)

FTP is used widely on the Internet for transferring files to and from a remote host. FTP is commonly used for uploading pages to a Web site and for providing online file archives.

SIMPLE MAIL TRANSPORT PROTOCOL(SMTP)


It controls the transfer of email messages on the Internet. SMTP defines the interaction between Internet hosts that participate in forwarding email from a sender to its destination.

HYPER TEXT TRANSFER PROTOCOL(HTTP)

HTTP is the Hypertext Transfer Protocol that controls how Web servers and Web browsers communicate with each other. To retrieve a Web page, the browser sends a request to a Web server using HTTP. On receiving the request, the server interprets it and sends back data.

ROUTING INFORMATION PROTOCOL(RIP) It is used to gather routing information to update routing tables.

ADDRESS RESOLUTION PROTOCOL(ARP)

It enables resolution of IP address to Media Access Control address (MAC address).

MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment.

INTERNET CONTROL MESSAGE PROTOCOL(ICMP)

It is used for network error reporting particularly through routers.

TELECOMMUNICATION NETWORK (TELNET)

It enables a workstation to emulate a terminal and connect to mainframes, internet servers, and routers

DOMAIN NAME SYSTEM (DNS)

It maintains tables to link IP addresses with computer host names.

INTERNETWORKING DEVICES
Internetworking devices interconnects networks Manage data flow and network traffic

INTERNETWORKING DEVICES

Routers

Bridges

Gateways

Repeaters

OSI MODEL AND INTERNETWORKING DEVICES

ROUTERS

Routers are devices which connect two are more networks that use similar protocol Primarily used for large networks and provide the best data path for effective communication. Routers operate at a network layer of O.S.I model. Routers use logical and physical address to connect two or more logically separate network. They make this connection by organizing the large network into logical network segment

GATEWAYS

Gateways are devices which connect two are more networks that use different protocols. They are similar in function to routers but they are more powerful and intelligent devices. Gateway can operate at all seven layer of OSI model Since Gateway perform data conversion so they are slower in speed and very expensive devices.

REPEATERS

Repeaters are used within network to extend the length of communication. They are used to amplify the signals across the transmission media. Repeaters work at the physical layer of OSI model. Repeaters are normally two ports boxes that connect two segments. As a signal comes in one port , it is Regenerated and send out to the other port.

BRIDGES

Bridges are used to connect similar network segments. When a bridge receive a signal , it determines its destination and it sends the signals towards it Bridge works at the data link layer of O.S.I model. Reduce network traffic with minor segmentation Reduce collisions Connect different architecture

THANK YOU

Você também pode gostar