DC Chapter Four
DC Chapter Four
DC Chapter Four
Chapter Four
What is a Protocol?
A protocol is a set of rules that govern how systems communicate. I.e. it govern the format and
meaning of frames, messages or packets that are exchanged between the server and client.
Communication Protocol
Communication protocols are formal descriptions of digital message formats and rules.
They are required to exchange messages in or between computing systems and are
required in telecommunications.
Communications protocols cover authentication, error detection and correction, and
signaling. They can also describe the syntax, semantics, and synchronization of analog
and digital communications. Communications protocols are implemented in hardware
and software. There are thousands of communications protocols that are used everywhere
in analog and digital communications. Computer networks cannot exist without them.
Communications devices have to agree on many physical aspects of the data to be
exchanged before successful transmission can take place. Rules defining transmissions
are called protocols.
There are many properties of a transmission that a protocol can define. Common ones
include: packet size, transmission speed, error correction types, handshaking and
synchronization techniques, address mapping, acknowledgement processes, flow control,
packet sequence controls, routing, and address formatting
Network protocols are formal standards and policies comprised of rules, procedures and formats
that define communication between two or more devices over a network. Network protocols
govern the end-to-end processes of timely, secure and managed data or network communication.
Network protocols incorporate all the processes, requirements and constraints of initiating and
accomplishing communication between computers, servers, routers and other network-enabled
devices. Network protocols must be confirmed and installed by the sender and receiver to ensure
network/data communication and apply to software and hardware nodes that communicate on a
network.
1
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Popular Protocols include: File Transfer Protocol (FTP), TCP/IP, User Datagram Protocol
(UDP), Hypertext Transfer Protocol (HTTP), Post Office Protocol (POP3), Internet Message
Access Protocol (IMAP), and Simple Mail Transfer Protocol (SMTP).
To ensure national and worldwide data communication ISO (ISO stands for International
Organization of Standardization.) developed this model. This is called a model for open system
interconnection (OSI) and is normally called as OSI model’s model architecture consists of
seven layers. It defines seven layers or levels in a complete communication system.
2
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
There are n numbers of users who use computer network and are located over the world. So to
ensure, national and worldwide data communication, systems must be developed which are
compatible to communicate with each other ISO has developed a standard. ISO stands for
International organization of Standardization. This is called a model for Open System
Interconnection (OSI) and is commonly known as OSI model.
The ISO-OSI model is seven layer architecture. It defines seven layers or levels in a complete
communication system.
Below we have the complete representation of the OSI model, showcasing all the layers and how
they communicate with each other.
3
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Big picture of communication over network is understandable through this OSI model.
We see how hardware and software work together.
We can understand new technologies as they are developed.
Troubleshooting is easier by separate networks.
Can be used to compare basic functional relationships on different networks.
The OSI reference model has 7 layers. The principles that were applied to arrive at the seven
layers can be briefly summarized as follows:
In the table below, we have specified the protocols used and the data unit exchanged by each
layer of the OSI Model.
Following are the various functions performed by the Physical layer of the OSI model.
Representation of Bits: Data in this layer consists of stream of bits. The bits must be
encoded into signals for transmission. It defines the type of encoding i.e. how 0's and 1's
are changed to signal.
Data Rate: This layer defines the rate of transmission which is the number of bits per
second.
5
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Synchronization: It deals with the synchronization of the transmitter and receiver. The
sender and receiver are synchronized at bit level.
Interface: The physical layer defines the transmission interface between devices and
transmission medium.
Line Configuration: This layer connects devices with the medium: Point to Point
configuration and Multipoint configuration.
Topologies: Devices must be connected using the following topologies: Mesh, Star, Ring
and Bus.
Transmission Modes: Physical Layer defines the direction of transmission between two
devices: Simplex, Half Duplex, and Full Duplex.
Deals with baseband and broadband transmission.
The Physical Layer is concerned with transmitting raw bits over a communication
channel.
The design issue has to do with making sure that when one side sends a 1 bit, it is
received by the other side as a 1 bit and not as a 0.
The design issues here largely deal with mechanical, electrical and timing interfaces, and
the physical transmission medium, which lies below the physical layer.
Framing: Frames are the streams of bits received from the network layer into
manageable data units. This division of stream of bits is done by Data Link Layer.
Physical Addressing: The Data Link layer adds a header to the frame in order to define
physical address of the sender or receiver of the frame, if the frames are to be distributed
to different systems on the network.
Flow Control: A flow control mechanism to avoid a fast transmitter from running a slow
receiver by buffering the extra bit is provided by flow control. This prevents traffic jam at
the receiver side.
6
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Error Control: Error control is achieved by adding a trailer at the end of the frame.
Duplication of frames are also prevented by using this mechanism. Data Link Layers
adds mechanism to prevent duplication of frames.
Access Control: Protocols of this layer determine which of the devices has control over
the link at any given time, when two or more devices are connected to the same link.
o The issue that arises in the data link layer (and most of the higher layers as well) is how
to keep a fast transmitter from drowning a slow receiver in data. Some traffic regulation
mechanism is often needed to let the transmitter know how much buffer space the
receiver has at the moment. Frequently, the flow regulation and the error handling are
integrated.
o Broadcast networks have an additional issue in the data link layer: How to control access
to the shared channel. A special sublayer of the data link layer, the Medium Access
Control (MAC) sublayer, deals with this problem.
It translates logical network address into physical address. Concerned with circuit,
message or packet switching.
Routers and gateways operate in the network layer. Mechanism is provided by Network
Layer for routing the packets to final destination.
Connection services are provided including network layer flow control, network layer
error control and packet sequence control.
Network Layer routes the signal through different channels from one node to other.
It acts as a network controller. It manages the Subnet traffic.
7
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
The network Layer controls the operation of the subnet. The main aim of this layer is to
deliver packets from source to destination across multiple links (networks). If two
computers (system) are connected on the same link, then there is no need for a network
layer. It routes the signal through different channels to the other end and acts as a
network controller.
It also divides the outgoing messages into packets and to assemble incoming packets into
messages for higher levels.
In broadcast networks, the routing problem is simple, so the network layer is often thin or
even non-existent.
o A key design issue is determining how packets are routed from source to destination.
Routes can be based on static tables that are wired into the network and rarely changed.
They can also be highly dynamic, being determined anew for each packet, to reflect the
current network load.
o If too many packets are present in the subnet at the same time, they will get into one
another's way, forming bottlenecks. The control of such congestion also belongs to the
network layer.
o Moreover, the quality of service provided (delay, transmit time, jitter, etc) is also a
network layer issue.
o When a packet has to travel from one network to another to get to its destination,
many problems can arise such as:
o The addressing used by the second network may be different from the first one.
o The second one may not accept the packet at all because it is too large.
o The protocols may differ, and so on.
o It is up to the network layer to overcome all these problems to allow heterogeneous
networks to be interconnected.
8
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Transport Layer decides if data transmission should be on parallel path or single path.
Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
The basic function of the Transport layer is to accept data from the layer above, split it up
into smaller units, pass these data units to the Network layer, and ensure that all the
pieces arrive correctly at the other end.
The most popular type of transport connection is an error-free point-to-point channel
that delivers messages or bytes in the order in which they were sent.
The Transport layer is a true end-to-end layer, all the way from the source to the
destination.
1. Service Point Addressing: Transport Layer header includes service point address which
is port address. This layer gets the message to the correct process on the computer unlike
Network Layer, which gets each packet to the correct computer.
2. Segmentation and Reassembling: A message is divided into segments; each segment
contains sequence number, which enables this layer in reassembling the message.
Message is reassembled correctly upon arrival at the destination and replaces packets
which were lost in transmission.
3. Connection Control: It includes 2 types:
o Connectionless Transport Layer: Each segment is considered as an independent
packet and delivered to the transport layer at the destination machine.
o Connection Oriented Transport Layer: Before delivering packets, connection
is made with transport layer at the destination machine.
4. Flow Control: In this layer, flow control is performed end to end.
5. Error Control: Error Control is performed end to end in this layer to ensure that the
complete message arrives at the receiving transport layer without any error. Error
Correction is done through retransmission.
9
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Accepting data from Session layer, split it into segments and send to the network layer.
Ensure correct delivery of data with efficiency.
Isolate upper layers from the technological changes.
Error control and flow control.
Session Layer manages and synchronizes the conversation between two different
applications.
Transfer of data from source to destination session layer streams of data are marked and
are resynchronized properly, so that the ends of the messages are not cut prematurely and
data loss is avoided.
It allows users on different machines to establish active communication sessions between
them.
Its main aim is to establish, maintain and synchronize the interaction between
communicating systems.
1. Dialog Control: This layer allows two systems to start communication with each other in
half-duplex or full-duplex.
2. Token Management: This layer prevents two parties from attempting the same critical
operation at the same time.
3. Synchronization: allows a process to add checkpoints which are considered as
synchronization points into stream of data.
Example: If a system is sending a file of 800 pages, adding checkpoints after every 50 pages
is recommended. This ensures that 50 page unit is successfully received and acknowledged.
This is beneficial at the time of crash as if a crash happens at page number 110; there is no
need to retransmit 1 to100 pages.
10
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Presentation Layer takes care that the data is sent in such a way that the receiver will
understand the information (data) and will be able to use the data.
While receiving the data, presentation layer transforms the data to be ready for the
application layer.
Languages (syntax) can be different of the two communicating systems. Under this
condition presentation layer plays a role of translator.
It performs Data compression, Data encryption, Data conversion etc.
The primary goal of this layer is to take care of the syntax and semantics of the
information exchanged between two communicating systems.
In order to make it possible for computers with different data representations to
communicate, the data structures to be exchanged can be defined in an abstract way. The
presentation layer manages these abstract data structures and allows higher-level data
structures (eg: banking records), to be defined and exchanged.
11
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
To manage and maintain the Syntax and Semantics of the information transmitted.
Encoding data in a standard agreed upon way. Eg: String, double, date, etc.
Perform Standard Encoding on wire.
1. Mail Services: This layer provides the basis for E-mail forwarding and storage.
2. Network Virtual Terminal: It allows a user to log on to a remote host. The application
creates software emulation of a terminal at the remote host. User's computer talks to the
software terminal which in turn talks to the host and vice versa. Then the remote host
believes it is communicating with one of its own terminals and allows user to log on.
3. Directory Services: This layer provides access for global information about various
services.
12
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
There are commonly reoccurring problems that occur in the design and implementation of
Application Layer protocols and can be addressed by patterns from several different pattern
languages:
OSI model distinguishes well between the services, interfaces and protocols.
Protocols of OSI model are very well hidden.
Protocols can be replaced by new protocols as technology changes.
Supports connection-oriented services as well as connectionless service.
13
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
communication over a network. These protocols describe the movement of data between the
source and destination or the internet. They also offer simple naming and addressing schemes.
The features that stood out during the research, which led to making the TCP/IP reference model
were:
Support for a flexible architecture. Adding more machines to a network was easy.
The network was robust, and connections remained intact until the source and destination
machines were functioning.
The overall idea was to allow one application on one computer to talk to (send data packets)
another application running on different computer.
The TCP/IP Internet layer is equivalent to the Network layer in the OSI model.
o Delivering IP packets
o Performing routing
o Avoiding congestion
The Transport layer is the next layer up in both models. In the OSI model it was
originally was referred to as the Host-to-Host layer.
It decides if data transmission should be on parallel path or single path.
Functions such as multiplexing, segmenting or splitting on the data is done by transport
layer.
Data is transmitted in form of datagrams using the Transmission Control Protocol (TCP).
TCP is responsible for breaking up data at the client side and then reassembling it on the
server side.
The applications can read and write to the transport layer.
Transport layer adds header information to the data.
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
Transport layer also arrange the packets to be sent, in sequence.
15
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
The Application layer in the OSI model is equivalent to the top three layers of the OSI
model, the Session, Presentation and Application layers.
The TCP/IP specifications described a lot of applications that were at the top of the protocol
stack. Some of them were TELNET, FTP, SMTP, DNS etc.
It operated independently.
It is scalable.
Client/server architecture.
Supports a number of routing protocols.
Can be used to establish a connection between two computers.
Demerits of TCP/IP
16
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
The TCP/IP suite is a set of protocols used on computer networks today (most notably on the
Internet). It provides an end-to-end connectivity by specifying how data should be packetized,
addressed, transmitted, routed and received on a TCP/IP network. This functionality is organized
into four abstraction layers and each protocol in the suite resides in a particular layer.
The TCP/IP suite is named after its most important protocols, the Transmission Control Protocol
(TCP) and the Internet Protocol (IP). Some of the protocols included in the TCP/IP suite are:
The following table shows which protocols reside on which layer of the TCP/IP model:
Layer Protocol
Application Layer HTTP,NFS,DNS,Telnet,FTP,SNMP,SMTP,POP3
Transport Layer TCP,UDP
Internet Layer IP (IPv4,IPv6),ARP,ICMP
Network Access Layer Ethernet, IEEE 802.3,Token Ring, FDDI
Following are some similarities between OSI Reference Model and TCP/IP Reference Model.
18
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Standards
The rise of open standards not owned by any one company has been a great boon to customers of
computer and networking products, as well as the manufacturers that sell to them. In order to
facilitate the development of open standards, however, organizations are needed that will
coordinate the creation and publishing of these documents. Generally, these are non-profit
organizations that specifically take a neutral stance regarding technologies and work for the
betterment of the industry as a whole.
Key Concept: There are a number of well-known international organizations that play an
important role in the development of open networking standards. Some of the most
important of these are ISO, ANSI, ITIC, IEEE, EIA/TIA, ITU-T and ETSI. These are oversight
organizations, responsible for overall management of the standards development process, rather
than for the particulars of creating individual standards.
19
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
o Probably the biggest standards organization in the world, the ISO is really a federation of
standards organizations from dozens of nations. In the networking world, the ISO is best
known for its OSI Reference Model.
o It is the main organization responsible for coordinating and publishing computer and
information technology standards in the United States.
o A committee established by the ITIC to develop and maintain standards related to the
information technology world. NCITS was formerly known by the name Accredited
Standards Committee X3, Information Technology, or more commonly, just X3. It
maintains several sub-committees that develop and maintain standards for various
technical subjects.
o It aims to advance theory, creativity, and product quality in the fields of electrical
engineering, electronics radio and in all related branches of Engineering.
o It oversees the development and adoption of international standards for computing and
communications.
o The IEEE (pronounced “eye-triple-eye”) is a well-known professional organization for
those in the electrical or electronics fields, including computers and networking. IEEE's
main claim to fame in the networking industry is the IEEE 802 Project, which
encompasses many popular networking technologies including Ethernet.
20
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
o Its activities include public awareness education and lobbying efforts in addition to
standards development.
o The TIA is the communications sector of the EIA, and is responsible for developing
communications standards. Since communications, wiring and transmission are all
related, and since the TIA and EIA organizations are also related, standards produced by
the EIA or TIA are often labeled with the combined prefixes “EIA/TIA” or “TIA/EIA”.
o An organization with members from dozens of countries both within and outside Europe
that is dedicated to developing telecommunications standards for the European market
(and elsewhere). ETSI is known for, among other things, regulating the use of radio
bandwidth in Europe and developing standards such as Hyper LAN.
Forums
It work with universities and users to test, evaluate, and standardize new technologies.
The forums are able to speed acceptance and use of those technologies in the
telecommunications community.
It presents their conclusions to standard bodies.
Regulatory Agencies:
Its purpose is to protect the public interest by regulating radio, television and wire cable
communications.
It has authority over interstate and international commerce as it relates to communication.
21
DC&CN Chapter 4 Lecture Note Prepared by Abraham A.