0% found this document useful (0 votes)
12 views

90352340

The document provides an overview of network protocols and standards, focusing on communication networks, their components, and types such as LAN and WAN. It discusses the OSI and TCP/IP models, the importance of protocols in data communication, and the role of various organizations in maintaining internet standards. Additionally, it highlights trends like network convergence and the significance of scalability and security in network planning.

Uploaded by

leomoca19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

90352340

The document provides an overview of network protocols and standards, focusing on communication networks, their components, and types such as LAN and WAN. It discusses the OSI and TCP/IP models, the importance of protocols in data communication, and the role of various organizations in maintaining internet standards. Additionally, it highlights trends like network convergence and the significance of scalability and security in network planning.

Uploaded by

leomoca19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 43

BTN 415: Data

Communications
Programming
Week 1: Network Protocols
and Standards
Outline

• Motivation

• Communication Network

• Components of a Network

• Types of Networks

• Protocol Suites and Industry Standards

• OSI Model

• Interaction between layers in the OSI model

• TCP/IP Reference Model


2
Motivation Web-enabled toaster +
weather forecaster

IP picture frame
Tweet-a-watt: http://www.ceiva.com/
monitor energy use

Internet phones
Slingbox: watch, 3
Internet control cable TV remotely
refrigerator
Impacts Of Networks In Our Daily
Lives
 Networks support the way we communicate.
 Networks support the way we learn.
 Networks support the way we work.
 Networks support the way we play.

4
What is a Communication Network?
The interconnected equipment
(hardware, software) and
medias/facilities that provide the
communication services

Equipment: Routers, Servers, …


Medias/Facilities: Copper wire,
optical fiber, conduits …
Services: VoIP, Video conferencing,
text messages …

A protocol is a set of rules that governs how two or more


communicating parties are to interact.
Components of a Network
There are three categories of network
components:
 Devices
 Media
 Services

6
Devices
Some examples of end devices are:
 Computers (workstations, laptops, file servers, web servers)
 Network printers
 VoIP phones
 TelePresence endpoint
 Security cameras
 Mobile handheld devices (such as smart phones, tablets, PDAs, and
wireless debit/credit card readers and barcode scanners)

Examples of intermediary network devices are:


 Network access devices (switches and wireless access points)

 Internetworking devices (routers)


7

 Security devices (firewalls)


Network Media

8
Network Representations

9
Traditional Service Networks

Network convergence refers to the provision of telephone, video and data


communication services within a single network. In other words, one company
provides services for all forms of communication. Network convergence
10
is primarily
driven by development of technology and demand.
Planning for the Future

11
Scalability

Tier 1: have peers and customers;


do not need to buy IP address.
Houses the largest domain servers
that track Internet addresses.

Tier 2: can have peers; purchase IP


addresses from Tier 1.

Tier 3: local ISP; pays Tier 2 for IP


addresses.

Adding new ISPs at the lower level


(Tier 1) do not affect the upper
levels (Tier 1 and Tier 2).

12
Network Security
Loss of business
transactions due to network
outage; Loss of funds; Loss
of intellectual properties;
Exposure of confidential
data.

Remedies: Restricting
access to equipment;
Authentication (enforcing
passwords); Encryption of
passwords and data; Using
Firewalls for analysing
traffic; Using Antivirus

13
Types of Networks

The two most common types of network


infrastructures are:
 LAN
 WAN

Other types of networks include:


 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)
14
Local Area Networks

• LANs interconnect end devices in a limited area


• A LAN is usually administered by a single
organization or individual.

15
Wide Area Networks

• WANs interconnect LANs over wide geographical areas such as between cities, states,
provinces, countries, or continents. 16

• WANs are usually administered by multiple service providers.


Internet
• Internet is a worldwide collection of
interconnected networks
• Most individuals need to
communicate with a resource on
another network
• There are organizations that have
been developed for the purpose of
helping to maintain structure and
standardization of Internet
protocols and processes.
• These organizations include the
Internet Engineering Task Force
(IETF), Internet Corporation for
Assigned Names and Numbers
(ICANN), and the Internet
Architecture Board (IAB)
17
New Trends

Some of the top trends include:


 Bring Your Own Device (BYOD)
 Online collaboration
 Video
 Cloud computing
 Public clouds
 Private clouds
 Hybrid clouds
 Custom clouds
18
Protocols
• Rules that Govern Communications
• A group of interrelated protocols
necessary to perform a communication
function is called a protocol suite.
• Protocol suites are implemented by hosts
and networking devices in software,
hardware, or both.

19
Network Protocols

 The networking protocols define the format and rules followed


to achieve the communication of data packets in a packed-
switched network.
 The networking protocols describe the following:
 How the message is formatted or structured
 The process by which networking devices share information about
pathways with other networks
 How and when error and system messages are passed between devices
 The setup and termination of data transfer sessions
20
Interaction of Protocols

 Application Protocol – Hypertext Transfer Protocol (HTTP)

(HTTP is an application-layer protocol that governs the interaction between a web server and a
client)

 Transport Protocol – Transmission Control Protocol (TCP)

(TCP is a transport-layer protocol controlling the conversation details between a web server and
client through segmentation controlling the size and rate of the message segments.)

 Internet Protocol – Internet Protocol (IP)

(Encapsulation of the segments into packets including assigned IP addresses for routing utilizing
the best available network path)

 Network Access Protocols – data link and physical layers

(Physical layer access protocols, communication media and signal formats)


21
Protocol Suites and Industry
Standards

22

Proprietary protocols: AppleTalk, Novell Netware


Creation of Internet – TCP/IP
Development
 The first packet switching network and predecessor to today’s Internet was the
Advanced Research Projects Agency Network (ARPANET), which came to life in
1969 by connecting mainframe computers at four locations.

 ARPANET was funded by the U.S. Department of Defense (DoD) for use by
universities and research laboratories. Bolt, Beranek and Newman (BBN) was the
contractor that did much of the initial development of the ARPANET, including
creating the first router known as an Interface Message Processor (IMP).

 In 1973, Robert Kahn and Vinton Cerf began work on TCP to develop the next
generation of the ARPANET. TCP was designed to replace ARPANET’s current
Network Control Program (NCP).

 In 1978, TCP was divided into two protocols: TCP and IP. Later, other protocols
were added to the TCP/IP suite of protocols including Telnet, FTP, DNS, and many
others.
23
Benefits of Using a Layered Model
• A layered model depicts the
operation of the protocols occurring
within each layer, as well as the
interaction of protocols with the
layers above and below each layer
• Assists in protocol design, because
protocols that operate at a specific
layer have defined information that
they act upon and a defined interface
to the layers above and below.
• Fosters competition because
products from different vendors can
work together.
• Prevents technology or capability
changes in one layer from affecting
other layers above and below.
• Provides a common language to
describe networking functions and
capabilities. 24
OSI (Open System Interconnection) Reference
Model
• The ISO (International Organization for
Standards) established the OSI (Open
System Interconnection) model, first
introduced in the late 1970s.
• OSI model provides an extensive list of
functions and services that can occur at
each layer.
• It also describes the interaction of each
layer with the layers directly above and
below it.
• The OSI model has seven related layers.
Each layer defines part of the process of
moving the information through the
network. 25
Functions of the OSI layers

26
The Interaction Between Layers in
the OSI Model

27
An Exchange Using the OSI Model

28
TCP/IP Reference Model

29
Comparing the OSI and TCP/IP
Models

30
TCP/IP Protocol Suite and
Communication Process

31
Communicating the Messages -
Segmentation
 Segmenting message benefits
• Different conversations can be interleaved (multiplexing)
• Increased reliability of network communications (use of alternative paths for
the delivery of the packets)
 (Sending of one long message without segmentation would make significant
delays and if the message delivery fails at any anytime the hole message will
be lost after a long delay)
 Segmenting message disadvantage
• Increased level of complexity
• Increase overhead
32
Protocol Data Units (PDUs)
At each layer a PDU takes a specific name reflecting its
function:
 Data
 Segment
 Packet
 Frame
 Bits

33
Encapsulation
 Data encapsulation is the process that adds additional protocol header information to the data before
transmission
 When sending messages on a network, the protocol stack on a host operates from top to bottom.

34
De-Encapsulation
• De-encapsulation is the process used by a receiving device to remove one or
more of the protocol headers.
• The data is de-encapsulated as it moves up the stack toward the end-user
application .

35
Network Address and Data Link
Addresses

36
Addressing

 Four levels of addresses are used in an internet


employing the TCP/IP protocols: physical, logical,
port, and specific addresses.

37
Relationship of layers and addresses
in TCP/IP

38
Open Standards
 The Internet Society (ISOC)
 The Internet Architecture Board (IAB)
 The Internet Engineering Task Force (IETF)
 Institute of Electrical and Electronics Engineers (IEEE)
 The International Organization for Standards (ISO)

39
ISOC, IAB, IETF and IRTF

40
Other Standards Organization

 The Electronic Industries Alliance (EIA)


 The Telecommunications Industry Association (TIA)
 The International Telecommunications Union –
Telecommunications Standardization Sector (ITU-T)
 The Internet Corporation for Assigned Names and Numbers
(ICANN)
 The Internet Assigned Numbers Authority (IANA)
41
Summary

 Communication Networks
 Network Components
 Types of Networks
 Reference Model
 OSI
 TCP/IP
 Messages, PDU, Encapsulation and De-Capsulation
 Standards
42
References

Chapter 1 & 5: Cisco Networking Academy Program. (2022). Networking essentials: Companion
guide (1st ed.). Cisco Press.

43

You might also like