Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by.

Similar presentations


Presentation on theme: "COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by."— Presentation transcript:

1

2 COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

3 CONTENTS 1. Introduction 2. communication models 3. Network protocol design principles 4. Five layer TCP/IP model 4. Protocol associated with different layer 5. Importance 6. conclusion 7. References

4 INTRODUCTION Communication It is any transmission, emission, or reception of signs, signals,writings, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic system. Communication model A communication model comprises of following subsystems: Source – Generates the data to be transmitted Transmitter – Converts the data into transmittable signals Transmission system – Carries the data. Receiver – Converts received signals into data. Destination – Takes incoming data.

5 PHYSICAL COMMUNICATION MODEL

6 Electronics Communication Model ELECTRONIC COMMUNICATION MODEL

7 COMMUNICATION PROTOCOL In the field of telecommunications, a communications protocol is the set of standard rules for data representation, signaling, the set of standard rules for data representation, signaling, authentication and error detection required to send information over authentication and error detection required to send information over a communications channel. a communications channel. An example of a simple communications protocol adapted to voice communication is the case of a radio dispatcher talking to mobile communication is the case of a radio dispatcher talking to mobile stations. stations.

8 NETWORK PROTOCOL DESIGN PRINCIPLES These principles include:- These principles include:-Effectiveness:- Needs to be specified in such a way, that engineers, designers, and in some cases software developers can implement and/or use it. Needs to be specified in such a way, that engineers, designers, and in some cases software developers can implement and/or use it.Reliability:- Assuring reliability of data transmission involves error detection and correction, or some means of requesting retransmission. Assuring reliability of data transmission involves error detection and correction, or some means of requesting retransmission.Resiliency:- Re addresses a form of network failure known as topological failure in which a communications link is cut, or degrades below usable quality. Re addresses a form of network failure known as topological failure in which a communications link is cut, or degrades below usable quality.

9 THE 5 LAYER TCP/IP MODEL 5. Application layer FTP IMAP4 XMPP POP3 SMTP SNMP SMTP SNMP 4. Transport layer.TCP UDP 3. Network Layer IP (IPv4 IPv6) IGMP ICMP ARP 2. Data link layer PPP 1. Physical layer

10 LAYERS IN THE INTERNET PROTOCOL SUITE STACK

11 PROTOCOLS ASSOCIATED WITH DIFFERENT LAYERS DATA LINK LAYER PROTOCOLS- PPP(POINT-TO-POINT PROTOCOL)- For PPP(POINT-TO-POINT PROTOCOL)- For point to point access. point to point access. 1> LCP(LINK CONTROL PROTOCOL)- 1> LCP(LINK CONTROL PROTOCOL)- Responsible for establishing, maintaining, Responsible for establishing, maintaining, configuring, and terminating links. configuring, and terminating links.

12 2>AUTHENTICATION PROTOCOL PAP(PASSWORD AUTHENTICATION PROTOCOL)- Validating the identity of a user who needs to Validating the identity of a user who needs to access a set of resources. access a set of resources. CHAP(CHALLENGE HANDSHAKE AUTHENTICATION PROTOCOL)- : Greater security than PAP. :Password kept secret and :Password kept secret and never sent on-line. never sent on-line.

13 3>NCP(NETWORK CONTROL PROTOCOLS)- 3>NCP(NETWORK CONTROL PROTOCOLS)- Set of control protocols to allow the encapsulation of data coming from network layer protocols. Set of control protocols to allow the encapsulation of data coming from network layer protocols. IPCP(INTERNETWORK PROTOCOL CONTROL PROTOCOL)- IPCP(INTERNETWORK PROTOCOL CONTROL PROTOCOL)- Set of packets that establish and terminate a network layer connection for IP packets. Set of packets that establish and terminate a network layer connection for IP packets.

14 NETWORK LAYER PROTOCOLS IP(INTERNETWORK PROTOCOL) It is the host-to-host network layer delivery protocol for the internet. Unreliable and connectionless datagram protocol. It provides no error control or flow control. It uses only an error detection mechanism and discards the packet if it is corrupted. ICMP (INTERNET CONTROL MESSAGE PROTOCOL) :- ICMP (INTERNET CONTROL MESSAGE PROTOCOL) :- Designed for compensating 2 deficiencies of IP 1. Lack of error control mechanism. 1. Lack of error control mechanism. 2. Lack of assistance mechanism. 2. Lack of assistance mechanism. The value of protocol field in IP datagram is 1 to indicate that IP data an ICMP message. ICMP always reports error message to the original source.

15 IPv4 :- It provides host to host communication between the systems and the internet. It has some deficiencies that make it unsuitable now-a-days, including the following:- It has 2 level address structure(netid and hostid) and 5 classes(A,B,C,D,E).The use of address space is inefficient. It has 2 level address structure(netid and hostid) and 5 classes(A,B,C,D,E).The use of address space is inefficient. Minimum delay strategy and reservation of resources not provided by IPv4. Minimum delay strategy and reservation of resources not provided by IPv4. No security mechanism was provided. No security mechanism was provided.

16 TRANSPORT LAYER PROTOCOLS Transmission Control Protocol (TCP) It is reliable but complex. It is reliable but complex. It is connection oriented. It is connection oriented. There is no negative acknowledgement. There is no negative acknowledgement. The unit of data transfer is segment. The unit of data transfer is segment. The error detection is handled by checksum acknowledgement and time out. The error detection is handled by checksum acknowledgement and time out. User Datagram Protocol (UDP) –It is unreliable and connectionless protocol. –It has no flow control mechanism –The UDP packet is called a user datagram.

17 APPLICATION LAYER PROTOCOLS FTP : Transfers files to and from a computer running a File Transfer Protocol (FTP) server service such as Internet Information Services. Simple Mail Transfer Protocol (SMTP): A member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents Hypertext Transfer Protocol (HTTP): The protocol used to transfer information on the World Wide Web. An HTTP address (one kind of Uniform Resource Locator [URL]) takes the form:

18 SNMP: SNMP provides a method of managing network hosts such as workstation or server computers, routers, bridges, and hubs from a centrally-located computer running network management software. SNMP provides a method of managing network hosts such as workstation or server computers, routers, bridges, and hubs from a centrally-located computer running network management software.

19 IMPORTANCE The widespread use and expansion of communications protocols is both a prerequisite to the Internet, and a major contributor to its power and success. TCP/IP is included in all commercial UNIX systems, Mac OS X, and all free-software. Unique implementations include Lightweight TCP/IP; an open source stack designed for embedded

20 CONCLUSION protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. without protocol proper communication and data reliability is impossible without protocol proper communication and data reliability is impossible

21 REFERENCES Wikipedia, the free encyclopedia Behrouz A.Forouzan; Data Communication and Networking.3rd Edition.TMH production Andrew S. Tanenbaum.Computer Networks

22 THANK FOR YOUR ATTENTION


Download ppt "COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by."

Similar presentations


Ads by Google