Вы находитесь на странице: 1из 14

Network

Architecture

PROTOCOLS
Jan-19-2016
Protocols
• The term protocol refers to a well-known set of rules and

What is
formats to be used in order to perform a task. For
example, a task of communicating between processes.

??
• Parts of a protocol:
- A specification of a sequence of messages that must
be exchanged.
?
a
- A specification of the format of the data in the
messages.
• Existence of well-known (standard) protocols enables the
separate components of the distributed systems to be
developed independently in different languages and on
different platforms.
3 elements of a protocol:
• Syntax • Timing
- structure of - temporal
commands sequence of
and answers commands and
answers

• Semantics
- set of commands
and answers
How Protocols Work
?...
The entire technical operation by which data is transmitted
over the network has to be broken down into discrete, systematic
steps. At each step, certain actions take place that cannot take place
at any other step. Each step includes its own rules and procedures,
or protocol.

The protocol steps must be carried out in a consistent order


that is the same on every computer in the network. In the sending
computer, these steps must be executed from the top down. In the
receiving computer, these steps must be carried out from the bottom
up.
The Sending Computer

Protocols at the sending computer:

1. Break the data into smaller sections, called packets, that the
protocol can handle.
2. Add addressing information to the packets so that the
destination computer on the network can determine that the
data belongs to it.
3. Prepare the data for transmission through the NIC and out
onto the network cable.

How Protocols Work


The Receiving Computer

Protocols at the receiving computer carry out the same series of


steps in reverse order. They:

1. Take the data packets off the cable.


2. Bring the data packets into the computer through the NIC.
3. Strip the data packets of all the transmitting information that
was added by the sending computer.
4. Copy the data from the packets to a buffer for reassembly.
5. Pass the reassembled data to the application in a usable
form.
How Protocols Work
Both sending and receiving computers need to perform
each step in the same way so that the data will have the same
structure when it is received as it did when it was sent.

For example, two different protocols might each break


data into packets and add on various sequencing, timing, and
error checking information, but each will do it differently.
Therefore, a computer using one of these protocols will not be
able to communicate successfully with a computer that is using
the other protocol.

How Protocols Work


Protocol Stacks
A protocol stack is a
combination of Application Layer
protocols. Each layer
Initiates a request or accepts a
of the stack specifies
request
a different protocol for
handling a function or
subsystem of the Presentation Layer
communication Adds formatting, display, and
process. Each layer encryption information to the
has its own set of packet.
rules.
Session Layer Transport Layer
Adds traffic flow Adds error-handling
information to determine information
when the packet gets Data-link Layer
sent.
Adds error-checking
Network Layer
information and prepares
Sequencing and address data for going on to the
information is added to physical connection.
the packet.

Physical Layer
Packet sent as a bit stream.
Protocol Stacks
Transport Protocols
Transport protocols facilitate communication sessions between
Protocol Description
computers and ensure that data is able to move reliably
TCP The TCP/IP protocol for guaranteed delivery of sequenced data.
between computers. Popular transport protocols are shown in
theTable
SPX Part of Novell's IPX/SPX protocol suite for sequenced data.

NWLink The Microsoft implementation of the IPX/SPX protocol.

NetBEUI (NetBIOS Establishes communication sessions between computers (NetBIOS) and


extended user provides the underlying data transport services (NetBEUI).
interface)
ATP (AppleTalk Apple's communication session and data transport protocols.
Transaction Protocol)
and NBP (Name
Binding Protocol)
Network Protocols
Network protocols provide what are called "link services."
Protocol Description
These protocols handle addressing and routing information,
IP The TCP/IP protocol for packet forwarding routing.
error checking, and retransmission requests. Network
protocols
IPX also define rules
NetWare's forforcommunicating
protocol in arouting.
packet forwarding and particular
networking
NWLink environment
The Microsoftsuch as Ethernet
implementation or Token
of the IPX/SPX protocol.Ring.
Popular network protocols are shown in the Table
NetBEUI A transport protocol that provides data transport services for
NetBIOS sessions and applications.

DDP (Datagram An AppleTalk data transport protocol.


Delivery
Protocol)
Implementing and Removing
Protocols
Protocols are implemented and removed in much the same
way that drivers are added and removed. Essential protocols are
installed automatically at the same time the initial operating system is
installed on the computer. To install protocols such as NWLink after
the initial installation, the network operating system usually includes a
utility that leads the administrator through the process. For example, a
network operating system setup program might provide a series of
graphical windows that lead the administrator through the process of:

• Installing a new protocol.


• Changing the order in which the installed protocols have been
linked.
• Removing a protocol.
Lesson Summary:
The following points summarize the main elements of this lesson:

• Protocols in a networking environment define the rules and procedures for


transmitting data.
• To send data over a network successfully requires a series of separate steps
that must be carried out in a prescribed order.
• The sending and receiving computers use protocols to:
- Break data into packets.
- Add addressing information to the packets.
- Prepare the packets for transmission.
- Take the packets off the cable.
- Copy the data from the packets for reassembly.
- Pass the reassembled data to the computer.
• Several stacks are used as standard protocols; the most prominent standard
protocols are based on the OSI reference model layers.
• Protocols are implemented and removed in the same manner as drivers.
Thank You 
Submitted by:

LANZ LOWEN JAY O. BOGNOT


9 - Pisces