Chapter III (2 Files Merged)
Chapter III (2 Files Merged)
Network Types
                1
3.1 Network Types
Local Area Network(LAN)
 Networks infrastructures can vary greatly in terms of:
   • The size of the area covered
   • The number of users connected
   • The number and types of services available
 An individual network usually spans a single geographical area,
  providing services and applications to people within a common
  organizational structure, such as a single business, campus or region.
 This type of network is called a Local Area Network (LAN).
 A LAN is usually administered by a single organization.
 The administrative control that governs the security and access control
  policies are enforced on the network level.
                                                                        2
Metropolitan Area Network
 A metropolitan area network (MAN) is a computer network that
  usually spans a city or a large campus.
 A MAN usually interconnects a number of local area networks (LANs)
  using a high-capacity backbone technology, such as fiber-optical links,
  and provides up-link services to wide area networks(or WAN) and the
  Internet.
 A MAN is optimized for a larger geographical area than a LAN,
  ranging from several blocks of buildings to entire cities.
 MANs can also depend on communications channels of moderate-to-
  high data rates.
 A MAN might be owned and operated by a single organization, but it
  usually will be used by many individuals and organizations.
 MANs might also be owned and operated as public utilities.
 They will often provide means for internetworking of local networks
                                                                        3
Wide Area Network
 When a company or organization has locations that are separated by
  large geographical distances, it may be necessary to use a
  telecommunications service provider (TSP) to interconnect the LANs at
  the different locations.
 Telecommunications service providers operate large regional networks
  that can span long distances.
 Traditionally, TSPs transported voice and data communications on
  separate networks.
 Increasingly, these providers are offering converged information
  network services to their subscribers.
 Individual organizations usually lease connections through a
  telecommunications service provider network.
 These networks that connect LANs in geographically separated
  locations are referred to as Wide Area Networks (WANs).
                                                                     4
WAN(cont…)
 Although the organization maintains all of the policies and
  administration of the LANs at both ends of the connection, the policies
  within the communications service provider network are controlled by
  the TSP.
 WANs use specifically designed network devices to make the
  interconnections between LANs.
 Because of the importance of these devices to the network, configuring,
  installing and maintaining these devices are skills that are integral to the
  function of an organization's network.
 LANs and WANs are very useful to individual organizations. They
  connect the users within the organization.
 They allow many forms of communication including exchange e-mails,
  corporate training, and other resource sharing.
                                                                            5
Internet: A network of Networks
 Although there are benefits to using a LAN or WAN, most of us need to
  communicate with a resource on another network, outside of our local
  organization.
 Examples of this type of communication include:
   •   Sending an e-mail to a friend in another country
   •   Accessing news or products on a website
   •   Getting a file from a neighbor's computer
   •   Instant messaging with a relative in another city
   •   Following a favorite sporting team's performance on a cell phone
Internetwork
 A global mesh of interconnected networks (internetworks) meets these
   human communication needs.
 Some of these interconnected networks are owned by large public and
   private organizations, such as government agencies or industrial
   enterprises, and are reserved for their exclusive use.
                                                                          6
Internet(cont…)
 The most well-known and widely used publicly-accessible internetwork
   is the Internet.
 The Internet is created by the interconnection of networks belonging to
   Internet Service Providers (ISPs).
 These ISP networks connect to each other to provide access for millions
   of users all over the world.
 Ensuring effective communication across this diverse infrastructure
   requires the application of consistent and commonly recognized
   technologies and protocols as well as the cooperation of many network
   administration agencies.
Intranet
 The term intranet is often used to refer to a private connection of LANs
   and WANs that belongs to an organization, and is designed to be
   accessible only by the organization's members, employees, or others
   with authorization.
                                                                        7
 Note: The following terms
  may be interchangeable:
  internetwork, data network,
  and network.
 A connection of two or
  more data networks forms
  an internetwork - a network
  of networks.
 It is also common to refer to
  an internetwork as a data
  network - or simply as a
  network - when considering
  communications at a high
  level. The usage of terms
  depends on the context at
  the time and terms may
  often be interchanged.
                                  8
                 Network Application Architecture
• Application architecture is designed by the application developer and dictates
   how the application is structured over the various end systems.
• When choosing the developer can choose among the two predominant
   architectural paradigms used in modern network application.
                                                                               9
                Client-server architecture
                                server:
                                    – always-on host
                                    – permanent IP address
                                    – server farms for scaling
                                clients:
                                    – communicate with server
                                    – may be intermittently
                                       connected
client/server
                                    – may have dynamic IP
                                       addresses
                                    – do not communicate
                                       directly with each other
                                                              10
Often in client server
application, a single host server
is incapable of keeping up with
all the request from its clients.
 For example Facebook or
Google will quickly be
overwhelmed if it has only one
server handling all of its
requests.
 For this reason, a large
cluster of hosts- some times
referred as data centers are
often used to create a powerful
virtual server.
                                                                     11
                Pure P2P architecture
• no always-on server
• arbitrary end systems directly
  communicate
• peers are intermittently connected
  and change IP addresses            peer-peer
• They are not owned by internet
  service providers
• They are simple desktop, laptop
  controlled by users
• Highly scalable but difficult to
  manage
• Peer to peer application examples
   – Emule , bit torrent, internet
      telephony
                                                 12
              Hybrid of client-server and P2P
Skype
    – voice-over-IP P2P application
    – centralized server: finding address of remote party:
    – client-client connection: direct (not through server)
Instant messaging
    – chatting between two users is P2P
    – centralized service: client presence detection/location
        • user registers its IP address with central server when it
          comes online
        • user contacts central server to find IP addresses of
          buddies
                                                                      13
Network Topology and Design
Bus Topology
• A bus topology connects all stations in a linear fashion
• It is inexpensive
• It is difficult to troubleshoot
   • It requires termination
  Star Topology
• The star network configuration is
  the most popular physical topology
• In a star configuration, all
  computers or stations are wired
  directly to a central location:
    • Concentrator (a.k.a. hub)
    • Multistation Access Unit
      (MAU)
• A data signal from any station goes
  directly to this central device,
  which transmits the signal
  according to the established
  network access method for the         Figure-2: Star topology
  type of network
• Star topology advantages:
    • A break in one cable does not affect all other stations as it does in bus
      technologies
    • Problems are easier to locate because symptoms often point to one station
    • The second-easiest topology to design and install
    • Does not require manual termination
        • Instead the media is terminated in the station at the transceiver on the
           NIC and in the hub or MAU
• Star topology disadvantages:
    • Hubs, which are required for a star topology, are more expensive than bus
      connectors
    • A failure at the hub can affect the entire configuration and all connected
      stations
    • Uses more cable than bus topologies
• Bus and star topologies can be combined to form a star/bus or bus/star
  physical topology
• Hubs that have connectors for coaxial cable as well as for twisted-pair
  wiring are used to form these types of networks
• When different physical topologies are applied to a network, the result
  is often called a mixed media network
Ring Topology
• Physical rings
• Most often seen in Fiber
  Distributed Data Interface
  (FDDI) networks
   • FDDI is a WAN
      technology
   • Stations on a ring are
      wired to one another in a
      circle around the entire
      network
                       1
Layered Models
The Benefit of Using Layered Models
•   To visualize the interaction between various protocols, it is common to use a
    layered model.
•   A layered model depicts the operation of the protocols occurring within each layer,
    as well as the interaction with the layers above and below it.
•   There are benefits to using a layered model to describe network protocols and
    operations.
•   Using a layered model:
     – Easier to teach communication process.
     – Speeds development, changes in one layer does not affect how the other
       levels works.
     – Standardization across manufactures.
     – Allows different hardware and software to work together.
     – Reduces complexity
                                                                                     2
Protocol and Reference model
• There are two basic types of networking models: protocol models and reference
  models.
• A protocol model provides a model that closely matches the structure of a
  particular protocol suite.
• The hierarchical set of related protocols in a suite typically represents all the
  functionality required to interface the human network with the data network.
• The TCP/IP model is a protocol model because it describes the functions that
  occur at each layer of protocols within the TCP/IP suite.
• A reference model provides a common reference for maintaining consistency
  within all types of network protocols and services.
• A reference model is not intended to be an implementation specification or to
  provide a sufficient level of detail to define precisely the services of the network
  architecture.
• The primary purpose of a reference model is to aid in clearer understanding of
  the functions and process involved.                                          3
•   The Open Systems
    Interconnection (OSI) model is
    the most widely known
    internetwork reference model.
•   It is used for data network design,
    operation specifications, and
    troubleshooting.
•   Although the TCP/IP and OSI
    models are the primary models
    used when discussing network
    functionality, designers of network
    protocols, services, or devices can
    create their own models to
    represent their products.
•   Ultimately, designers are required
    to communicate to the industry by
    relating their product or service to
    either the OSI model or the
    TCP/IP model, or to both.
                                           4
TCP/IP Model
• The first layered protocol model
  for internetwork communications
  was created in the early 1970s
  and is referred to as the Internet
  model.
•    It defines four categories of
    functions that must occur for
    communications to be successful.
• The architecture of the TCP/IP
  protocol suite follows the
  structure of this model.
• Because of this, the Internet
  model is commonly referred to as
  the TCP/IP model.
                                       5
• Most protocol models describe a vendor-specific protocol stack.
  However, since the TCP/IP model is an open standard, one company
  does not control the definition of the model.
• The definitions of the standard and the TCP/IP protocols are discussed
  in a public forum and defined in a publicly-available set of documents.
• These documents are called Requests for Comments (RFCs). They
  contain both the formal specification of data communications protocols
  and resources that describe the use of the protocols.
• The RFCs also contain technical and organizational documents about
  the Internet, including the technical specifications and policy
  documents produced by the Internet Engineering Task Force (IETF).
                                                                        6
                 TCP/IP model development
• The late-60s The Defense Advance Research Projects Agency (DARPA)
  originally developed Transmission Control Protocol/Internet Protocol
  (TCP/IP) to interconnect various defense department computer networks.
• The Internet, an International Wide Area Network, uses TCP/IP to connect
  networks across the world.
4 layers of the TCP/IP model
 Layer 4: Application
 Layer 3: Transport
 Layer 2: Internet
 Layer 1: Network access
 It is important to note that some of the layers in the TCP/IP model have
 the same name as layers in the OSI model. Do not confuse the layers of
 the two models.
                                                                         7
             The network access layer
• Concerned with all of the issues that an IP packet
  requires to actually make the physical link. All the
  details in the OSI physical and data link layers.
  – Electrical, mechanical, procedural and functional
    specifications.
  – Data rate, Distances, Physical connector.
  – Frames, physical addressing.
  – Synchronization, flow control, error control.
                                                        8
                 The internet layer
• Send source packets from any network on the
  internetwork and have them arrive at the
  destination independent of the path and networks
  they took to get there.
  – Packets, Logical addressing.
  – Internet Protocol (IP).
  – Route , routing table, routing protocol.
                                                9
           The transport layer
• The transport layer deals with the quality-of-
  service issues of reliability, flow control, and
  error correction.
  – Segments, data stream, datagram.
  – Connection oriented and connectionless.
  – Transmission control protocol (TCP).
  – User datagram protocol (UDP).
  – End-to-end flow control.
  – Error detection and recovery.
                                                     10
            TCP/IP Reference Model (cont)
• Transport layer (layer 3)
    – Allows end-to-end communication
    – Connection establishment, error control, flow control
    – Two main protocols at this level
        • Transmission control protocol (TCP),
            – Connection oriented
                » Connection established before sending data
                » Reliable
        • user datagram protocol (UDP)
            – Connectionless
                » Sending data without establishing connection
                » Fast but unreliable
                                                                 11
               The application layer
• Handles high-level protocols, issues of
  representation, encoding, and dialog control.
• The TCP/IP combines all application-related
  issues into one layer, and assures this data is
  properly packaged for the next layer.
  – FTP, HTTP, SMNP, DNS ...
  – Format of data, data structure, encode …
  – Dialog control, session management …
                                                    12
TCP/IP protocol stack
                        13
               TCP/IP Reference Model
     Layer                              Protocols
                      HTTP     TELNET      FTP       SMTP          SNMP
  Application
                                 TCP                  UDP
   Transport
                                 IP                   ICMP
    Internet
                                                                      14
           Network standards and OSI model
• Rapid growth of computer networks caused compatibility
  problems
• ISO(International standard organization) recognized the problem
  and released the OSI model in 1984
• OSI stands for Open Systems Interconnection and consists of 7
  Layers
• The use of layers is designed to reduce complexity and make
  standardization easier
• It ensures greater compatibility and interoperability between
  various types of network technologies.
• The OSI reference model divides the problem of moving
  information between computers over a network medium into
  SEVEN smaller and more manageable problems .
• This separation into smaller more manageable functions is known
  as layering.
                                                               15
• The OSI Reference Model is composed of seven layers, each
  specifying particular network functions.
• The process of breaking up the functions or tasks of networking into
  layers reduces complexity.
• Each layer provides a service to the layer above it in the protocol
  specification.
• Each layer communicates with the same layer’s software or
  hardware on other computers.
• The lower 4 layers (transport, network, data link and physical —
  Layers 4, 3, 2, and 1) are concerned with the flow of data from end
  to end through the network.
• The upper three layers of the OSI model (application, presentation
  and session—Layers 7, 6 and 5) are orientated more toward services
  to the applications.
• Data is Encapsulated with the necessary protocol information as it
  moves down the layers before network transit.
                                                                  16
                OSI Reference model
                                      17
Tasks involved in sending letter
                                   18
                        Physical layer
• The physical layer is responsible for movements of individual bits
  from one hop (node) to the next.
• The physical layer is also concerned with the following:
• Physical characteristics of interfaces and medium.
   • The physical layer defines the characteristics of the interface
     between the devices and the transmission medium.
   • It also defines the type of transmission medium.
• Representation of bits.
   • The physical layer data consists of a stream of bits (sequence
     of Os or 1s) with no interpretation.
   • To be transmitted, bits must be encoded into signals--electrical
     or optical.
   • The physical layer defines the type of encoding (how Os and I
     s are changed to signals).                                   19
• Data rate.
   • The transmission rate-the number of bits sent each second is
     also defined by the physical layer. In other words, the
     physical layer defines the duration of a bit, which is how long
     it lasts.
• Synchronization of bits.
   • The sender and receiver not only must use the same bit rate
     but also must be synchronized at the bit level. In other words,
     the sender and the receiver clocks must be synchronized.
• Line configuration.
   • The physical layer is concerned with the connection of
     devices to the media.
   • In a point-to-point configuration, two devices are connected
     through a dedicated link.
   • In a multipoint configuration, a link is shared among several
     devices.                                                    20
• Physical topology.
   • The physical topology defines how devices are connected to
     make a network. Devices can be connected by using
   • a mesh topology (every device is connected to every other
     device),
   • a star topology (devices are connected through a central
     device),
   • a ring topology (each device is connected to the next, forming a
     ring),
   • a bus topology (every device is on a common link),
   • or a hybrid topology (this is a combination of two or more
     topologies).
                                                                 21
• Transmission mode.
   • The physical layer also defines the direction of transmission
     between two devices: simplex, half-duplex, or full-duplex.
   • In simplex mode, only one device can send; the other can only
     receive.
   • The simplex mode is a one-way communication.
   • In the half-duplex mode, two devices can send and receive, but
     not at the same time.
   • In a full-duplex (or simply duplex) mode, two devices can send
     and receive at the same time.
Physical layer devices
• NIC
• Repeaters
• Hubs
                                                               22
                          Data Link Layer
• The data link layer is responsible for moving frames from one hop
   (node) to the next.
• It makes the physical layer appear error-free to the upper layer (network
   layer).
Other responsibilities of the data link layer include the following:
Framing.
• The data link layer divides the stream of bits received from the network
   layer into manageable data units called frames.
 Physical addressing.
• If frames are to be distributed to different systems on the network, the
   data link layer adds a header to the frame to define the sender and/or
   receiver of the frame.
• If the frame is intended for a system outside the sender's network, the
   receiver address is the address of the device that connects the network to
   the next one.
                                                                         23
• Flow control.
   • If the rate at which the data are absorbed by the receiver is less
     than the rate at which data are produced in the sender, the data
     link layer imposes a flow control mechanism to avoid
     overwhelming the receiver.
• Error control.
   • The data link layer adds reliability to the physical layer by
     adding mechanisms to detect and retransmit damaged or lost
     frames.
   • It also uses a mechanism to recognize duplicate frames. Error
     control is normally achieved through a trailer added to the end
     of the frame.
• Access control.
   • When two or more devices are connected to the same link, data
     link layer protocols are necessary to determine which device
     has control over the link at any given time.                   24
                     data link layer . . .
Data link layer is actually made up of two sub
 layers:-
The media access control(MAC)
  • Framing
  • Error control
  • Flow control
The logical link control (LLC)
  • Transmission/reception of frames
                                                 25
                       MAC address
• The MAC address is a unique value associated with a network.
  Adapter.
• MAC addresses are also known as hardware addresses or
  physical addresses.
• They uniquely identify an adapter on a LAN.
• MAC addresses are 12-digit hexadecimal numbers (48 bits in
  length).
• MAC addresses are usually written in one of the following two
  formats:
                      MM:MM:MM:SS:SS:SS
                      MM-MM-MM-SS-SS-SS
• Example of Mac address : 00:A0:C9:14:C8:29
                                                                  26
     Data link layer devices
Three devices manipulate data at the data link
 layer.
  • Bridges
  • Switches
  • NIC
                                                 27
                      Network Layer
• The network layer is responsible for the delivery of individual
  packets from the source host to the destination host.
 Other responsibilities of the network layer include the following:
Logical addressing.
• The physical addressing implemented by the data link layer handles
  the addressing problem locally.
• If a packet passes the network boundary, we need another addressing
  system to help distinguish the source and destination systems.
• The network layer adds a header to the packet coming from the upper
  layer that, among other things, includes the logical addresses of the
  sender and receiver.
                                                                       28
Routing.
•   When independent networks or links are connected to create
    internetworks (network of networks) or a large network, the
    connecting devices (called routers or switches) route or switch the
    packets to their final destination.
• One of the functions of the network layer is to provide this
    mechanism.
Network layer devices
Three devices operate at network layer
     • Routers
     • Brouters
     • Layer 3 switches
                                                                    29
                        Transport Layer
• The transport layer is responsible for the delivery of a message from
   one process to another.
Other responsibilities of the transport layer include the following:
 Service-point addressing
• Computers often run several programs at the same time.
• For this reason, source-to-destination delivery means delivery not
   only from one computer to the next but also from a specific process
   (running program) on one computer to a specific process (running
   program) on the other.
• The transport layer header must therefore include a type of address
   called a service-point address (or port address).
• The network layer gets each packet to the correct computer; the
   transport layer gets the entire message to the correct process on that
   computer.
                                                                     30
Segmentation and reassembly.
• A message is divided into transmittable segments, with each segment
  containing a sequence number.
• These numbers enable the transport layer to reassemble the message
  correctly upon arriving at the destination and to identify and replace
  packets that were lost in transmission.
Connection control.
• The transport layer can be either connectionless or connection
  oriented.
• A connectionless transport layer treats each segment as an
  independent packet and delivers it to the transport layer at the
  destination machine.
• A connection oriented transport layer makes a connection with the
  transport layer at the destination machine first before delivering the
  packets. After all the data are transferred, the connection is
  terminated.
                                                                    31
Flow control
• Like the data link layer, the transport layer is responsible for flow
  control.
• However, flow control at this layer is performed end to end rather
  than across a single link.
Error control
• Like the data link layer, the transport layer is responsible for error
  control.
• However, error control at this layer is performed process-to-
  process rather than across a single link.
• The sending transport layer makes sure that the entire message
  arrives at the receiving transport layer without error (damage, loss,
  or duplication).
• Error correction is usually achieved through retransmission.
                                                                    32
                            Session Layer
• The session layer is responsible for dialog control and
    synchronization.
Specific responsibilities of the session layer include the following:
Dialog control
•   The session layer allows two systems to enter into a dialog.
• It allows the communication between two processes to take place in
    either half duplex (one way at a time) or full-duplex (two ways at a
    time) mode.
Synchronization
•   The session layer allows a process to add checkpoints, or
    synchronization points, to a stream of data.
                                                                        33
                       Presentation Layer
• The presentation layer is responsible for translation, compression, and
  encryption.
Specific responsibilities of the presentation layer include the following:
Translation
• The processes (running programs) in two systems are usually exchanging
  information in the form of character strings, numbers, and so on.
• The information must be changed to bit streams before being transmitted.
• Because different computers use different encoding systems, the
  presentation layer is responsible for interoperability between these
  different encoding methods.
• The presentation layer at the sender changes the information from its
  sender-dependent format into a common format.
• The presentation layer at the receiving machine changes the common
  format into its receiver-dependent format.
                                                                      34
Encryption
• To carry sensitive information, a system must be able to ensure
    privacy.
•   Encryption means that the sender transforms the original
    information to another form and sends the resulting message out
    over the network.
•   Decryption reverses the original process to transform the message
    back to its original form.
Compression
• Data compression reduces the number of bits contained in the
    information.
• Data     compression      becomes   particularly   important   in   the
    transmission of multimedia such as text, audio, and video.        35
Application Layer
 The application layer is responsible for providing services to the user.
 Specific services provided by the application layer include the
  following:
Network virtual terminal
•   A network virtual terminal is a software version of a physical terminal,
    and it allows a user to log on to a remote host.
• To do so, the application creates a software emulation of a terminal at the
  remote host.
• The user's computer talks to the software terminal which, in turn, talks to
  the host, and vice versa.
• The remote host believes it is communicating with one of its own
  terminals and allows the user to log on
                                                                        36
File transfer, access, and management
•    This application allows a user to access files in a remote host (to make
    changes or read data), to retrieve files from a remote computer for use in the
    local computer, and to manage or control files in a remote computer locally.
Mail services.
• This application provides the basis for e-mail forwarding and storage.
Directory services.
•    This application provides distributed database sources and access for global
    information about various objects and services.
Upper layer devices
• There are only a few upper layer devices
• They fall into a class of devices called gateways
• A gateway translates one type of network data into another.
• Gateways can be either hardware or software
                                                                             37
Rules that govern communication
• All communication, whether face-to-face or over a network, is governed
  by predetermined rules called protocols.
• These protocols are specific to the characteristics of the conversation.
• In our day-to-day personal communication, the rules we use to
  communicate over one medium, like a telephone call, are not necessarily
  the same as the protocols for using another medium, such as sending a
  letter.
• Think of how many different rules or protocols govern all the different
  methods of communication that exist in the world today.
• Successful communication between hosts on a network requires the
  interaction of many different protocols.
• A group of inter-related protocols that are necessary to perform a
  communication function is called a protocol suite.
• These protocols are implemented in software and hardware that is
  loaded on each host and network device.
                                                                      38
• One of the best ways to visualize how all of the protocols interact on a
   particular host is to view it as a stack.
• A protocol stack shows how the individual protocols within the suite are
   implemented on the host.
• The protocols are viewed as a layered hierarchy, with each higher level
   service depending on the functionality defined by the protocols shown in
   the lower levels.
• The lower layers of the stack are concerned with moving data over the
   network and providing services to the upper layers, which are focused on
   the content of the message being sent and the user interface.
• Using layers to describe face-to-face communication
For example, consider two people communicating face-to-face.
• As the figure shows, we can use three layers to describe this activity.
• At the bottom layer, the physical layer, we have two people, each with a
   voice that can utter words aloud.
• At the second layer, the rules layer, we have an agreement to speak in a
   common language.
                                                                         39
• At the top layer, the content
   layer, we have the words
   actually spoken-the content of
   the communication.
• Were we to witness this
   conversation, we would not
   actually see "layers" floating in
   space.
• It is important to understand
   that the use of layers is a
   model and, as such, it provides
   a way to conveniently break a
   complex task into parts and
   describe how they work.
                                       40
Network Protocols
• At the human level, some communication rules are formal and
  others are simply understood, or implicit, based on custom and
  practice.
• For devices to successfully communicate, a network protocol suite
  must describe precise requirements and interactions.
• Networking protocol suites describe processes such as:
   • The format or structure of the message
   • The method by which networking devices share information about
     pathways with other networks
   • How and when error and system messages are passed between
     devices
   • The setup and termination of data transfer sessions
                                                                      41
• Individual protocols in a protocol suite may be vendor-specific and
   proprietary.
• Proprietary, in this context, means that one company or vendor controls
   the definition of the protocol and how it functions.
• Some proprietary protocols can be used by different organizations with
   permission from the owner.
• Others can only be implemented on equipment manufactured by the
   proprietary vendor.
• Other protocols are freely available for public use.
                                                                        42
Protocol Suits And industry Standards
•   Often, many of the protocols that comprise a protocol suite reference other widely
    utilized protocols or industry standards.
•   A standard is a process or protocol that has been endorsed by the networking
    industry and ratified by a standards organization, such as the Institute of Electrical
    and Electronics Engineers (IEEE) or the Internet Engineering Task Force (IETF).
•   The use of standards in developing and implementing protocols ensures that
    products from different manufacturers can work together for efficient
    communications.
•   If a protocol is not rigidly observed by a particular manufacturer, their equipment or
    software may not be able to successfully communicate with products made by other
    manufacturers.
•   In data communications, for example, if one end of a conversation is using a
    protocol to govern one-way communication and the other end is assuming a
    protocol describing two-way communication, in all probability, no information will
    be exchanged.
                                                                                        43
The Interaction of protocols
•    An example of the use of a
     protocol suite in network
     communications is the interaction
     between a web server and a web
     browser.
•    This interaction uses a number of
     protocols and standards in the
     process of exchanging
     information between them.
The different protocols work together to ensure that the messages are received and
understood by both parties.
    Examples of these protocols are:
Application Protocol:
Hypertext Transfer Protocol (HTTP) is a common protocol that governs the way
that a web server and a web client interact.
                                                                              44
• HTTP defines the content and formatting of the requests and responses
    exchanged between the client and server.
• Both the client and the web server software implement HTTP as part of the
    application.
• The HTTP protocol relies on other protocols to govern how the messages are
    transported between client and server
Transport Protocol:
• Transmission Control Protocol (TCP) is the transport protocol that manages the
    individual conversations between web servers and web clients.
•   TCP divides the HTTP messages into smaller pieces, called segments, to be
    sent to the destination client.
• It is also responsible for controlling the size and rate at which messages are
    exchanged between the server and the client.
                                                                                   45
Internetwork Protocol:
• The most common internetwork protocol is Internet Protocol (IP). IP is
    responsible for taking the formatted segments from TCP, encapsulating them
    into packets, assigning the appropriate addresses, and selecting the best path to
    the destination host.
Network Access Protocols:
• Network access protocols describe two primary functions, data link
    management and the physical transmission of data on the media.
•   Data-link management protocols take the packets from IP and format them to
    be transmitted over the media.
• The standards and protocols for the physical media govern how the signals are
    sent over the media and how they are interpreted by the receiving clients.
• Transceivers on the network interface cards implement the appropriate
    standards for the media that is being used.
                                                                                  46
Technology Independent protocols
•   Networking protocols describe
    the functions that occur during
    network communications.
•    In the face-to-face conversation
    example, a protocol for
    communicating might state that in
    order to signal that the
    conversation is complete, the
    sender must remain silent for two
    full seconds.
•   However, this protocol does not
    specify how the sender is to
    remain silent for the two seconds.
•   Protocols generally do not
    describe how to accomplish a
    particular function.
                                         47
• By describing only what functions are required of a particular
   communication rule but not how they are to be carried out, the
   implementation of a particular protocol can be technology-independent.
• Looking at the web server example, HTTP
    •   Does not specify what programming language is used to create the browser,
    • Doesn’t specify which web server software should be used to serve the web
        pages,
    • What operating system the software runs on, or
    • The hardware requirements necessary to display the browser.
    • It also does not describe how the server should detect errors,
    • Although it does describe what the server should do if an error occurs.
• This means that a computer - and other devices, like mobile phones or
   PDAs - can access a web page stored on any type of web server that uses
   any form of operating system from anywhere on the Internet.
                                                                                    48
Application Layer protocols
• The application layer in TCP/IP is equivalent to the combined session,
  presentation, and application layers in the OSI model.
•   Many protocols are defined at this layer such as HTTP, SMTP, POP3 ,
   FTP, DNS, Telnet ,DHCP
• Application layer protocols provide the rules for communication between
   applications
Protocols
    • Define process on either end of the communication
    • Define the type of message
    • Define the syntax of message
    • Define the meaning of any informational fields
    • Define how messages are sent and expected response
    • Define interaction with the next lower layer
                                                                       49
               Application Layer protocols
 Application Layer TCP/IP protocols: specify the format and
  control information necessary for many of the common Internet
  communication
 HTTP: is used to transfer files that make up the Web pages of the
  World Wide Web
                                                                  51
               An HTTP conversation
 Client                               Server
• I would like to open
  a connection                      • OK
• Display response
• Close connection
                                    • OK
HTTP is the set of rules governing the format and content of the
conversation between a Web client and server
                                                                   52
                                  HTTP
 HTTP protocol and how it supports delivery of web pages
 Request(URL)-->web browser establish conn.-->web service (using
  HTTP)
 Web browser (Request, accept, interpret, format & present data (plain text,
  HTML, plug-in))
• http://www.bdu.edu.et
• http://www.google.com
                                                         54
                                     SMTP
• SMTP clients and servers
  have two main components
  55
Post Office Protocol Version 3 (POP3)
• A protocol used to retrieve e-mail from a mail server.
• most e-mail applications (sometimes called an e-mail client)
  use the POP protocol, although some can use the newer
  IMAP (Internet Message Access Protocol).
• There are two versions of POP. The first, called POP2,
  became a standard in the mid-80's and requires SMTP to send
  messages.
• The newer version, POP3, can be used with or without
  SMTP.
                                                           56
POP and SMTP protocols, and how they support e-mail services
                                                           57
 POP and SMTP protocols, and how they support e-mail services
 Like HTTP they define client/server processes
                                                                          58
Telnet
 Telnet protocol and its uses in examining and managing networks
 Provides a standard method of emulating text-based terminal devices
  over the data network
 A connection using Telnet is called a Virtual Terminal (VTY) session,
  or connection
 Telnet uses software to create a virtual device that provides the same
  features of a terminal session with access to the server (CLI).
 To support Telnet client connections, the server runs a service called the
  Telnet daemon
 On a Microsoft Windows PC, Telnet can be run from the command
  prompt.
 Other common terminal applications that run as Telnet clients are
     HyperTerminal, Minicom, and TeraTerm.
                                                                        59
60
File Transfer Protocol (FTP)
• The protocol for exchanging files over the Internet.
• FTP works in the same way as HTTP for transferring Web pages
  from a server to a user's browser and SMTP for transferring
  electronic mail across the Internet in that, like these technologies,
  FTP uses the Internet's TCP/IP protocols to enable data transfer.
• FTP is most commonly used to download a file from a server using
  the Internet or to upload a file to a server (e.g., uploading a Web
  page file to a server).
• Two connections between the client and the server:
    First connection to the server on TCP port 21
        control traffic, consisting of client commands and server
         replies
    Second connection to the server over TCP port 20
        actual file transfer and is created every time there is a file
         transferred.
 The file transfer can happen in either direction
    client can download (pull)
    the client can upload (push)                                       61
62
DHCP protocol
 DHCP protocol and its uses in enabling devices to obtain ip address & other
  info from a DHCP server
 allows a host to obtain an IP address dynamically when it connects to the
  network
 How
      The DHCP server is contacted and an address requested
      The DHCP server chooses an address from a configured range of
       addresses called a pool and
      assigns ("leases") it to the host for a set period.
 On larger networks, or where the user population changes frequently, DHCP
  is preferred
 DHCP distributed addresses are not permanently assigned to hosts but are
  only leased for a period of time
 DHCP makes it possible for you to access the Internet using wireless hotspots
  at airports or coffee shops
 As you enter the area, your laptop DHCP client contacts the local DHCP
  server via a wireless connection. The DHCP server assigns an IP address to
  your laptop.
 DHCP can pose a security risk because any device connected to the network
  can receive an address
                                                                           63
DHCP
       64
 DHCP protocol
 How it works
 client broadcasts a DHCP DISCOVER packet to identify any available
  DHCP servers on the network
 A DHCP server replies with a DHCP OFFER, which is a lease offer
  message with an assigned
    IP address,
    subnet mask,
    DNS server, and
    default gateway information as well as the duration of the lease
 Once the client receives the offer, it will respond with a DHCP
  Request, indicating that it will accept the offered protocol information.
                                                                         65
• Finally, the server responds with a DHCP ACK, acknowledging
  the clients acceptance of offered protocol information.
 If the offer is no longer valid - perhaps due to a time-out or
  another client allocating the lease - then the selected server will
  respond with a DHCP NAK message (Negative
  Acknowledgement)
 If a DHCP NAK message is returned, then the selection process
  must begin again with a new DHCP DISCOVER message being
  transmitted.
                                                                        66
 DHCP protocol
    How it works
    Once the client has the lease, it must be renewed prior to the lease
     expiration through another DHCP REQUEST message.
                                                                      67
DNS
• Short for Domain Name System (or Service or Server), an
    Internet service that translates domain names into IP addresses.
•   Because domain names are alphabetic, they're easier to remember.
• The Internet however, is really based on IP addresses.
• Every time you use a domain name, therefore, a DNS service must
    translate the name into the corresponding IP address.
• For example, the domain name www.example.com might translate
    to 198.105.232.4.
• The DNS system is, in fact, its own network. If one DNS server
    doesn't know how to translate a particular domain name, it asks
    another one, and so on, until the correct IP address is returned.
                                                                        68
  Features of the DNS protocol and it supports DNS services
• Convert the numeric address into a simple, recognizable name.
                                                                  69
DNS protocol and How it supports DNS services
 Easier to remember www.cisco.com than 198.132.219.25
 If the number is changed the domain name will remain www.cisco.com,
  it’s transparent
 DNS uses a distributed set of servers to resolve the names associated
  with these numbered addresses.
      When configuring a network device
           We provide the DNS server address
           Usually the ISP provides the address
 OS have nslookup
      allows the user to manually query the name servers to resolve a
        given host name
      used to troubleshoot name resolution issues and to verify the current
        status of the name servers
•            nslookup bdu.edu.et
                                                                          70
71
    Transport layer protocols
• The two most common Transport layer protocols of TCP/IP protocol suite
  are
       Transmission Control Protocol (TCP)
       User Datagram Protocol (UDP)
•     Both protocols manage the communication of multiple applications. The
     differences between the two are the specific functions that each protocol
     implements.
Transmission Control Protocol (TCP)
      Creates a reliable connection between two computers
      a connection-oriented protocol
      TCP guarantees delivery of data and also guarantees that packets will be
       delivered in the same order in which they were sent
      Operates in the transport layer of OSI model
                                                                             72
UDP(User Datagram Protocol)
• belongs to the Transport layer of the OSI model
• Unlike TCP, however, UDP is a connectionless transport service.
• In other words, UDP offers no assurance that packets will be received in
   the correct sequence.
• It can be useful in situations in which a great volume of data must be
   transferred quickly, such as live audio or video transmissions over the
   Internet
• The pieces of communication are called datagrams
 Applications that use UDP include:
     Domain Name System (DNS)
     Video Streaming
     Voice over IP (VoIP)
 Applications that use TCP are:
     Web Browsers
     E-mail
     File Transfers
                                                                      73
TCP and UDP Header Lines
                           74
 Fields belonging to a TCP segment
• Source port—Indicates the port number at the source node. One
  example is port 80, which is typically used to accept Web page
  requests from the HTTP protocol.
• Destination port—Indicates the port number at the destination node.
  The Destination port field is 16 bits long.
• Sequence number —Identifies the data segment’s position in the
  stream of data segments already sent. The Sequence number field is
  32 bits long.
• Acknowledgment number (ACK)—Confirms receipt of the data via
  a return message to the sender. The Acknowledgment number field is
  32 bits long.
• TCP header length —Indicates the length of the TCP header. This
  field is four bits long.
                                                                   75
• Checksum —Allows the receiving node to determine whether the
  TCP segment became corrupted during transmission. The
  Checksum field is 16 bits long.
• Options —Specifies special options, such as the maximum
  segment size a network can handle. The size of this field can vary
  between 0 and 32 bits
• Data —Contains data originally sent by the source node.
• Reserved —A 6-bit field reserved for later use
• Window —Indicates how many bytes the sender can issue to a
  receiver while acknowledgment for this segment is outstanding
• Urgent pointer —Indicates a location in the data field where
  urgent data resides. This field is 16 bits long.
                                                                 76
 Port Addressing (>netstat)
     Role of Port Numbers in the TCP and UDP protocols
         keep track of the various apps that are communicating
         differentiate segments and datagram for each apps
 How Port Numbers are assigned
     Depending on whether the message is a request or a response
     While server processes have static port numbers assigned to them, clients
      dynamically choose a port number for each conversation
 Port Addressing
     Server Side /Statically assigned/
     Client Side /Dynamically assigned/
 When a client application sends a request to a server application, the
  destination port contained in the header is the port number that is assigned to
  the service daemon running on the remote host
 E.g: HTTP request to a server uses
     Destination port 80 / 8080
     Source randomly generated 49152
                                                                             77
 The Internet Assigned Numbers Authority (IANA) assigns port numbers
 IANA is responsible for assigning various addressing standards
                                                                        78
 Port Addressing: Types
     Well Known Ports (0 to 1023)
         reserved for services and apps
     Registered Ports (1024 to 49151)
         assigned to user processes or apps
     Dynamic or Private/Ephemeral Ports (49152 to 65535)
         assigned dynamically to client apps when initiating a connection
 Some applications may use both TCP and UDP.
 For example, the low overhead of UDP enables DNS to serve many client
  requests very quickly.
 Sometimes, however, sending the requested information may require the
  reliability of TCP. In this case, the well known port number of 53 is used
  by both protocols with this
                                                                         79
80
 Server process in TCP
     Role of port numbers in establishing TCP sessions and directing
      segments to destination & source
                                                                        81
• UDP characteristics & types of communication for which it is
  best suited
                                                                 82
• Datagram Reassembly
                        83
 Network layer protocols
Internet Protocol (IP)
     Provides addressing scheme.
     IP specifies the format of packets, also called datagrams, and
      the addressing scheme.
     Most networks combine IP with a higher-level protocol called
      Transmission Control Protocol (TCP), which establishes a
      virtual connection between a destination and a source.
     The current version of IP is IPv4.
     A new version, called IPv6 is under development.
 Network Layer Protocols:
     Internet Protocol version 4 (IPv4)
        The most widely-used version of IP
        is used to carry user data over the Internet
    Internet Protocol version 6 (IPv6) & others
        developed and being implemented in some areas.
        IPv6 will operate alongside IPv4 and may replace it in the future
                                                                             84
 Basic Characteristics and Role of IPv4 protocol
    Connectionless - No connection is established before sending
     data packets
    Best Effort (unreliable) - No overhead is used to guarantee
     packet delivery
    Media Independent - Operates independently of the medium
     carrying the data
                                                               85
 Basic Characteristics and Role of IPv4 protocol
    Connectionless Service & its implication
         Does not require initial exchange of information b\n end host
         Low overhead of IP
                                                                          86
 Basic Characteristics and Role of IPv4 protocol
    Best Effort Service & its implication
       IP protocol does not burden the IP service with providing
         reliability
       Unreliable means simply that IP does not have the capability to
         manage, and recover from, undelivered or corrupt packets.
                                                                     87
 Basic Characteristics and Role of IPv4 protocol
    Media Independent & its implication
        Transport of IP packets is not limited to any particular medium.
        Except the maximum size of PDU(Protocol Data Unit) that
         each medium can transport
            Referred to as MTU (Maximum Transmission Unit)
                                                                     88
                                  IP Service
• IP supports the following services:
        • one-to-one                    (unicast)
        • one-to-all                    (broadcast)
        • one-to-several                (multicast)
    unicast
                         broadcast                       multicast
• IP multicast also supports a many-to-many service.
• IP multicast requires support of other protocols (IGMP, multicast routing)
                                        89
 IPv4 Packet Header & its role
     A Typical IPv4 Packet
                                  90
 IPv4 Packet Header & its role
     Fields in the header & their function
         fields contain binary values that the IPv4 services reference as
           they forward packets across the network.
 The 6 key fields of IPv4 packet header
     IP Source Address- 32-bit value represent L3 source address
     IP Destination Address- 32-bit value represent L3 Destination
     Time-to-Live (TTL)- 8-bit value that indicates the remaining "life"
      of the packet (E.g. ICMP packet TTL: 128)
     Type-of-Service (ToS)-contains an 8-bit binary value that is used to
      determine the priority of each packet.
     Protocol- 8-bit binary value indicates the data payload type that the
      packet is carrying. Enables the L3 to pass the data to the appropriate
      upper-layer protocol (E.g. 01 ICMP, 06 TCP & 17 UDP)
     Fragment Offset- identifies the order in which to place the packet
      fragment in the reconstruction
                                                                         91
Other IPv4 Header Fields
• Version - Contains the IP version number (4)
• Header Length (IHL) - Specifies the size of the packet header.
• Packet Length - This field gives the entire packet size, including
  header and data, in bytes.
• Identification - This field is primarily used for uniquely
  identifying fragments of an original IP packet
• Header Checksum - The checksum field is used for error
  checking the packet header.
• Options - There is provision for additional fields in the IPv4
  header to provide other services but these are rarely used.
                                                                   92
  Network layer Protocols. . .
Address Resolution Protocol(ARP)
 Address Resolution Protocol is used to translate 32 bits IP addresses to 48
  bits Ethernet addresses.
 
  A host’s physical address is determined by broadcasting its IP address to all
  machines.
 ƒ
  The machine with matching IP address, in broadcast message, sends its
  hardware address to the machine originating broadcast.
                                                                          93
 Network layer Protocols…
Reverse Address Resolution Protocol(RARP)
• Reverse Address Resolution Protocol is used to get the 32 bits Source
  IP address, knowing the 48 bits Hardware address.
• It is reverse of ARP, hence named Reverse Address Resolution Protocol.
• A diskless workstation broadcasts RARP Request to find its IP Address
  at the time of boot up.
• diskless workstation—workstations that do not contain hard disks, but
  rely on a small amount of read-only memory to connect to a network.
                                                                        94
RARP operation
                 95
 Network layer protocol….
Internet Control Message Protocol (ICMP)
   •   ICMP (Internet Control Message Protocol) is a Network layer
       protocol that reports on the success or failure of data delivery.
   •   It can indicate when part of a network is congested, when data
       fails to reach its destination, and when data has been
       discarded because the allotted time for its delivery (its TTL)
       expired.
   •   ICMP announces these transmission failures to the sender,
       but ICMP cannot correct any of the errors it detects; those
       functions are left to higher-layer protocols, such as TCP.
   •   However, ICMP’s announcements provide critical information
       for troubleshooting network problems.
                                                                      96
Network layer Protocols…
IGMP (Internet Group Management Protocol)
• Operates at the Network layer and manages multicasting.
•   Multicasting is a transmission method that allows one node to
    send data to a defined group of nodes .
• Multicasting      can    be    used    for   teleconferencing       or
    videoconferencing over the Internet, for example.
• Routers use IGMP to determine which nodes belong to a certain
    multicast group and to transmit data to all nodes in that group
97