Unit 2 Network Protocols and Standards PDF
Document Details
Tags
Summary
This document provides an overview of network protocols, the OSI model, and 802 project standards. It includes information about different types of network protocols and their functionalities, with details about the TCP, UDP, FTP, HTTP protocols. The presentation also discusses concepts and functions within the OSI model and the role of 802.x standards.
Full Transcript
Unit 2 NETWORK PROTOCOLS AND STANDARDS MEET OUR GROUP Clarence Kaye Alex Michael Carlos Eliza Joyce Amyr Antipona Pascual Lim Francisco TABLE OF CONTENTS 01. Network Protocols 02. The OSI Model 03. 802 Project Standards ...
Unit 2 NETWORK PROTOCOLS AND STANDARDS MEET OUR GROUP Clarence Kaye Alex Michael Carlos Eliza Joyce Amyr Antipona Pascual Lim Francisco TABLE OF CONTENTS 01. Network Protocols 02. The OSI Model 03. 802 Project Standards NETWORK PROTOCOLS Intro NETWORK PROTOCOLS set of rules outlining how connected devices communicate across a network to exchange information easily and safely. TYPES OF NETWORK PROTOCOLS Network Network Security Network Communication Protocol Management Protocol Protocol These protocols determine the rules Safe data transmission via Provide rapid network and formats to transfer data across network connections is ensured by performance and troubleshooting networks these protocols. NETWORK COMMUNICATION PROTOCOL HTTP Connection commonly referred to as the protocol of the internet that allows communication between a server and browser. NETWORK COMMUNICATION PROTOCOL Transmission Control Protocol (TCP) A reliable, connection-oriented protocol that helps in the sequential transmission of data packets to ensure data reaches the destination on time without duplication. 3 WAY HANDSHAKE Transmission Control Protocol (TCP) SYN (Synchronize) The client sends a SYN (synchronize) packet to the server. This packet is used to initiate a connection and contains an initial sequence number (ISN), which is a randomly generated value to track the bytes sent by the client. 3 WAY HANDSHAKE Transmission Control Protocol (TCP) SYN-ACK (Synchronize-Acknowledge) The client sends a SYN (synchronize) packet to the server. This packet is used to initiate a connection and contains an initial sequence number (ISN), which is a randomly generated value to track the bytes sent by the client. 3 WAY HANDSHAKE Transmission Control Protocol (TCP) ACK (Acknowledge) Finally, the client sends an ACK packet back to the - ACK packet. This packet also confirms that both parties are ready to begin the communication. NETWORK COMMUNICATION PROTOCOL Internet Protocol (IP) Facilitates routing the data packets across networks. IP contains addressing and control information to deliver packets across a network. It works along with TCP. While it ensures NETWORK COMMUNICATION PROTOCOL User Datagram Protocol (UDP) ensure a connection between the application and server such as broadcasts or multicast connections. NETWORK COMMUNICATION PROTOCOL File Transfer Protocol (FTP) Allows file sharing between servers by establishing two TCP connections, one for data transfer and the other for control. The data transfer connection transfers the actual files, while the control connection transfers control information such as passwords to ensure data retrieval in case of data loss. NETWORK SECURITY PROTOCOL Secure File Transfer Protocol (SFTP) Helps securely transfer files across a network by using public-key encryption and authenticating the client and server. NETWORK SECURITY PROTOCOL Hyper-Text Transfer Protocol Secure (HTTPS) Overcomes the limitation of HTTP by ensuring the security of data transmitted between the browser and server through data encryption. HTTPS is a secure version of HTTP. NETWORK SECURITY PROTOCOL Secure Socket Layer (SSL) Primarily helps secure internet connections and safeguard sensitive data using encryption. SSL protocol enables both server-client communication and server- server communication. NETWORK MANAGEMENT PROTOCOL Simple Network Management Protocol (SNMP) Helps administrators manage network devices by monitoring endpoint information to proactively track network performance and pinpoint network glitches for quick troubleshooting. NETWORK MANAGEMENT PROTOCOL Internet Control Message Protocol (ICMP) Helps diagnose network connectivity issues. Network devices employ ICMP for sending error messages, highlighting congestion and timeouts, and transmitting other operational information to assist in network troubleshooting. THE OSI MODEL THE OSI MODEL Open Systems Interconnection (OSI) Describes how networks operate. Standardize communication between networks. Theoretical, not actually used. We use the TCP/IP model. Created by ISO in 1984. WHY LEARN IT? WHY LEARN IT? We study the OSI model because it is often referenced when troubleshooting issues in network communications. I CAN’T CONNECT TO THE INTERNET OH, THAT'S I CAN’T PROLLY A LAYER 1 CONNECT PROBLEM. TO THE INTERNET OH, THAT'S I CAN’T PROLLY A LAYER 1 CONNECT PROBLEM. TO THE INTERNET WHAT THE $%#* IS A LAYER 1? I CAN’T CONNECT TO THE INTERNET I CAN’T OH, THAT'S CONNECT PROLLY A LAYER 1 TO THE PROBLEM. INTERNET OH, THAT'S I CAN’T PROLLY A LAYER 1 CONNECT PROBLEM. TO THE INTERNET AH, GOT IT! I'LL CHECK THE PHYSICAL CONNECTIONS. SOLVED IT, THANKS MATE. SOLVED IT, NO PROBLEM, THANKS MATE. MATE. THE OSI MODEL THE 7 LAYERS OF OSI MODEL 7 Application 6 Presentation 5 Session THE 7 LAYERS 4 Transport OF OSI MODEL 3 Network 2 Data link 1 Physical This is the layer that determines what protocol to use to transmit the data. 7 Application also called Desktop Layer. Examples are: HTTP, SMTP, FTP, etc. Functions of Application: Network Virtual Terminal(NVT) File Transfer Access and Management (FTAM) Mail Services Directory Services Network Virtual Terminal(NVT) It allows a user to log on to a remote host. File Transfer Access and Management (FTAM) 7 Application allows a user to access files in a remote host, retrieve files in a remote host, and manage or control files from a remote computer. Mail Services Provide email service. Directory Services This application provides distributed database sources and access for global information about various objects and services. DOMAIN NAME SYSTEM (DNS) the backbone of the Internet which acts as a directory service that helps translate human- readable domain names (like www.example.com) 7 Application into IP addresses (such as 192.168.1.1) The internet’s phonebook. Dynamic Host Configuration Protocol (DHCP) A network management protocol. It provides automatic IP address allocation and 7 Application other network configuration settings to devices within a network. This layer formats the data in a way expected by the application. also called the Translation layer. 6 Presentation It also handles encryption and decryption if needed. Functions of Application: Translation Encryption/ Decryption Compression Translation For example, ASCII to EBCDIC 6 Presentation Encryption/ Decryption Data encryption translates the data into another form or code. A key value is used for encrypting as well as decrypting data. Compression Reduces the number of bits that need to be transmitted on the network. This layer manages the session between nodes. It handles setup, authentication, 5 Session termination, and reconnection. Functions of Application: Session Establishment, Maintenance, and Termination Synchronization Dialog Controller Session Establishment, Maintenance, and Termination For example, ASCII to EBCDIC 5 Session Synchronization This layer allows a process to add checkpoints that are considered synchronization points in the data. Dialog Controller The session layer allows two systems to start communication with each other in half-duplex or full-duplex. This layer is responsible for the end-to-end delivery of the 4 Transport complete message. Functions of Transport Layer: Service Point Addressing Segmentation and Reassembly Connection Control Flow Control Error Control Service Point Addressing To deliver the message to the correct process, the transport layer header includes a type of 4 Transport address called service point address or port address. Segmentation and Reassembly This layer accepts the message from the (session) layer, and breaks the message into smaller units. The transport layer at the destination port reassembles the message. Connection Control: Connection-oriented service connection is established before sending the 4 Transport data. The receiving device sends an acknowledgment back to the source after a packet or group of packets is received. This type of transmission is reliable and secure. Connectionless service the receiver does not acknowledge receipt of a packet. This approach allows for much faster communication between devices Flow Control In this layer, flow control is performed end to end. This layer ensures that data must be received in the same sequence in which it was 4 Transport sent. Error Control Error Control is performed end to end in this layer to ensure that the complete message arrives at the receiving transport layer without any error. Error Correction is done through retransmission. Responsible for delivery of data 3 Network from the original source to the destination network. Functions of Network Layer: Logical Addressing Routing Logical Addressing To identify each device inter-network uniquely, the network layer defines an addressing scheme. Such an address distinguishes each device uniquely and universally (means IP addressing). 3 Network Routin g The network layer protocols determine which route is suitable from source to destination. Note: Segment in the Network layer is referred to as Packet. Network layer is implemented by networking devices such as routers and switches. It is responsible for moving the data (frames) from one node to another node. 2 Data link Functions Framing It provides a way for a sender to transmit a set of bits that are meaningful to the receiver. This can be accomplished by attaching special bit patterns to 2 Data link the beginning and end of the frame. Physical Addressing After creating frames, the Data link layer adds physical addresses ( MAC addresses ) of the sender and/or receiver in the header of each frame. Error Control The data link layer provides the mechanism of error control in which it detects and retransmits damaged or lost frames. Functions Flow Control The data rate must be constant on both sides else the data may get corrupted. Coordinates the amount of data that can be sent 2 Data link before receiving an acknowledgment. Access Control When a single communication channel is shared by multiple devices, the MAC sub-layer of the data link layer helps to determine which device has control over the channel at a given time. It is responsible for the actual physical connection between the devices. The physical layer contains information in the form of bits. 1 Physical Functions of Network Layer: Physical characteristics of the media Bit Synchronization Data rate control Physical topologies Transmission modes Physical characteristics of the media Wired Media 1 Physical the layer knows that it has to convert the entire frames or the entire sets of zeros and ones into signals. Ethernet cable: convert them into electrical signals. Optic cable: convert them into light signals. Wireless Media the layer knows that it is going to convert that zeros and ones into radio waves. Bit Synchronization The physical layer provides the synchronization of the bits by providing a clock. This clock controls both sender and receiver thus providing synchronization at the bit level. 1 Physical Bit Rate Control The Physical layer also defines the transmission rate i.e. the number of bits sent per second. Physical Topologies Physical layer specifies how the different devices/nodes are arranged in a network i.e. bus, star, or mesh topology. Transmission Mode Physical layer also defines how the data flows between the two connected devices. The various transmission modes possible are: 1 Physical Simplex data will flow only in one direction Half-duplex data will flow in both directions but not at the same time Full-duplex two devices can send and receive data at the same time THE OSI MODEL DATA ENCAPSULATION & DECAPSULATION 802 PROJECT STANDARDS 802 Project Standards WHAT IS PROJECT 802? 802.0 PROJECT 802 Project 802 is an ongoing project of the Institute of Electrical and Electronics Engineers (IEEE) for defining local area network (LAN) and metropolitan area network (MAN) standards and technologies. The set of standards started in 1979 with a proposed standard called Local Network for Computer Interconnection, which was approved a year later. 802 Project Standards IMPORTANCE OF PROJECT 802 802.0 IMPORTANCE OF PROJECT 802 It serves as the foundation for how networks communicate, providing a universal language that ensures interoperability among various technologies. Essentially, the IEEE 802 standards help make sure internet services and technologies follow a set of recommended practices so that network devices can all work together smoothly. 802 Project Standards 802.1: INTERNETWORKING STANDARDS 802.1 802.1: INTERNETWORKING STANDARDS 802.1 deals with internetworking standards that provide the architecture and methodologies for the successful operation of networks. It primarily focuses on bridging different LANs and WANs, allowing them to work in a seamless manner. 802 Project Standards 802.2: LOGICAL LINK CONTROL (LLC) 802.2 802.2: LOGICAL LINK CONTROL (LLC) 802.2 is a part of the Data-Link Layer in the OSI model. It essentially acts as an interface between the Network Layer and the MAC (Media Access Control) sub-layer, facilitating the flow of data across different media types. 802 Project Standards 802.3: ETHERNET 802.3 802.3: ETHERNET 802.3 is the most commonly known. It defines the Ethernet standard, which uses a bus or star topology and supports data transfer rates of up to 100 Gbps in its latest versions. 802 Project Standards 802.4: TOKEN BUS LAN 802.4 802.4: TOKEN BUS LAN The 802.4 standard defines how Token Bus LANs operate. Unlike Ethernet, which uses uses tokens to manage access to the network. 802 Project Standards 802.5: TOKEN RING LAN 802.5 802.5: TOKEN RING LAN 802.5 outlines the Token Ring standard, which, like the Token Bus, uses a token- passing protocol for transferring the data. However, in the Token Ring, the topology is set up in a physical ring. 802 Project Standards 802.6: METROPOLITAN AREA NETWORK (MAN) 802.6 METROPOLITAN AREA NETWORK (MAN) The 802.6 standard focuses on the Metropolitan Area Networks, networks that are larger than LANs but smaller than WANs Generally covering a city or large campus. 802.6 METROPOLITAN AREA NETWORK (MAN) Multiple local area networks (LANs) that are connected on a campus or industrial complex using a high-speed backbone. Multiple networks that are connected within the same city to form a citywide network for a specific government or industry. Any network bigger than a LAN but smaller than a wide area network (WAN) 802.6 ARCHITECTURE OF MANS Complex framework to ensure ⚬ Robust ⚬ Scalable ⚬ Efficient communication Consists of interconnected LANs Utilizing fiber optic cables for high-speed data transmission 802.6 STRUCTURAL COMPONENTS OF MANS Backbone Technologies Dark Fiber Usage Interconnection Points 802.6 MAN VS WAN VS LAN Bridging the gap Spans a large Limited to a small between LANs geographical geographical and WANs area, often area, such as a interms of interconnecting single building or geograhic multiple MANs or campus coverage and LANs across capacity cities, countries, or even continents 802 Project Standards 802.7: BROADBAND TECHNOLOGIES 802.7 BROADBAND TECHNOLOGIES The IEEE 802.7 standard pertains to the application of broadband technologies. This standard was formulated to cover the best practices, physical layer specifications, and architectures for broadband. 802 Project Standards 802.8: FIBER-OPTIC TECHNOLOGIES 802.8 FIBER-OPTIC TECHNOLOGIES 802.8 deals with the standards and guidelines for fiber-optic technologies. It specifies the physical layer properties, including the type of fiber, signal, and connector used. Fiber-optic technologies are crucial for long-distance and high-capacity networks. 802.8 FIBER-OPTIC TECHNOLOGIES Type of fiber ⚬ Single-mode Fiber (SMF): Used for long- distance communication ■ one mode of light ⚬ Multi-mode Fiber (MMF): Used for shorter distances. ■ multiple modes of light 802.8 FIBER-OPTIC TECHNOLOGIES Signal Properties ⚬ Wavelength: operates at specific wavelengths ■ 850 nm ■ 1310 nm ■ 1550 nm ⚬ minimize attenuation ⚬ maximize data transfer rates 802 Project Standards 802.9: INTEGRATED VOICE/DATA NETWORKS 802.9 INTEGRATED VOICE/DATA NETWORKS The 802.9 standard focuses on integrating voice and data networks, offering the capacity for both within the same networking architecture. ⚬ seamless communication ⚬ easier management of network resources. 802.9 SUPPORT FOR DIGITAL TELEPHONY (VOICE OVER LAN) Voice over LAN (VoLAN) technology is one of the core features of the 802.9 standards. ⚬ traditional voice communications to Local Area Network (LAN) ⚬ VoIP (Voice over Internet Protocols) 802 Project Standards 802.10: NETWORK SECURITY STANDARDS 802.10 NETWORK SECURITY STANDARDS It outlines the specifications and guidelines to secure network architecture, including methods for secure key management, data encryption and user authentication. ⚬ security architecture base on ISO OSI Model ⚬ cryptographic keys used to protect communication ⚬ encryption algorithms 802 Project Standards 802.11: WIRELESS NETWORKING 802.11 WIRELESS NETWORKING 802.11 governs wireless LAN technology, commonly known as Wi-fi There are a few wireless standards that were developed in the IEEE 802.11 category ⚬ 802.11a ■ 54 Mbps at frequencies ranging from 5.725 Ghz to 5.850 Ghz. ■ wireless components are not compatible with 802.11b devices 802.11 WIRELESS NETWORKING 802.11b ⚬ 11 Mbps at frequency ranges of 2.400 Ghz to 2.4835 GHz. ⚬ wireless components are compatible with 802.11g devices 802.11g ⚬ 54 Mbps at the same frequency as 802.11b ⚬ allows devices from the two standards to coexist 802.11 WIRELESS NETWORKING 802.11n ⚬ new wireless project that runs at 5 Ghz or 2.4 GHz and is backward compatible with 802.11a/b/g standards. ⚬ 802.11a has data transfer rates of over 100 Mbps 802 Project Standards 802.12: DEMAND PRIORITY ACCESS 802.12 DEMAND PRIORITY ACCESS 802.12 focuses on demand-priority access technologies, used mainly for industrial and enterprise-level applications. This standard aims to prioritize data packets based on the urgency of the information they contain, ensuring that high-priority data gets processed faster. 802 Project Standards 802.14: CABLE TELEVISION ACCESS 802.13 CABLE TELEVISION ACCESS Though now largely deprecated, 802.14 aimed to standardize data delivery over cable television systems. It was developed to facilitate broadband data services over cable networks, providing an alternative to traditional telephone line-based services THANK YOU!