Chapter 4

A communication protocol is a system of rules that allows two or more entities of a communications systemarrow-up-right to transmit informationarrow-up-right via any kind of variation of a physical quantityarrow-up-right. The protocol defines the rules, syntaxarrow-up-right, semantics and synchronizationarrow-up-right of communicationarrow-up-right and possible error recovery methodsarrow-up-right. Protocols may be implemented by hardwarearrow-up-right, softwarearrow-up-right, or a combination of both.

A Request for Comments (RFC) is a publication from the Internet Societyarrow-up-right (ISOC) and its associated bodies, most prominently the Internet Engineering Task Forcearrow-up-right (IETF), the principal technical development and standards-setting bodies for the Internetarrow-up-right.

An RFC is authored by individuals or groups of engineers and computer scientistsarrow-up-right in the form of a memorandumarrow-up-right describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems. It is submitted either for peer reviewarrow-up-right or to convey new concepts, information, or occasionally engineering humor. The IETF adopts some of the proposals published as RFCs as Internet Standardsarrow-up-right. However, many RFCs are informational or experimental in nature and are not standards.

A default gateway is the nodearrow-up-right in a computer networkarrow-up-right using the internet protocol suitearrow-up-right that serves as the forwarding host (routerarrow-up-right) to other networks when no other route specification matches the destination IP addressarrow-up-right of a packet.

IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

The Internet Architecture Board (IAB) is "a committee of the Internet Engineering Task Forcearrow-up-right (IETF) and an advisory body of the Internet Societyarrow-up-right (ISOC). Its responsibilities include architectural oversight of IETF activities, Internet Standards Process oversight and appeal, and the appointment of the Request for Commentsarrow-up-right (RFC) Editor. The IAB is also responsible for the management of the IETF protocol parameter registries.

IAB subsidiary groups : IETF (short-term result in RFC ) and IRTF ( long-term)

Standards that we used to see :

  • RS23-C : EIA

  • OSI : defined by ISO ( International Organization for Standardization )

  • TCP/IP : IAB ( TCP/IP defined in RFC )

  • T1 : AT&T

file-image
15KB

Header is used to describe meta data, the header is divided into several fields that will describe the characteristics of the data. In the data link layer, apart from having a header, it also has a tailer which functions to checksum crc to see if there are any wrong bits.

Encapsulation: the process of adding a header in each layer drop

In Physical Layer all data become bits stream.

In data communications networks, packet segmentation is the process of dividing a data packetarrow-up-right into smaller units for transmission over the network. Packet segmentation happens at layer four of the OSI modelarrow-up-right; the transport layerarrow-up-right. Segmentation may be required when:

  • The data packet is larger than the maximum transmission unitarrow-up-right supported by the network

  • The network is unreliable and it is desirable to divide the information into smaller segments to maximize the probability that each one of them can be delivered correctly to the destination

In MSS ( Message Segment Size ) maximum size is 1460

Message in Application Layer

Segment in Transport Layer

Network Layer

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocolarrow-up-right (IP). It is one of the core protocols of standards-based internetworkingarrow-up-right methods in the Internetarrow-up-right and other packet-switchedarrow-up-right networks. IPv4 was the first version deployed for production on SATNETarrow-up-right in 1982 and on the ARPANETarrow-up-right in January 1983. It is still used to route most Internet traffic today, despite the ongoing deployment of a successor protocol, IPv6arrow-up-right.

IPv4 uses a 32-bitarrow-up-right address space which provides 4,294,967,296 (232) unique addresses, but large blocks are reserved for special networking methods.

Routing

layer 2 . one hop

layer 3 . end to end

Addressing IPv4 :

  1. Physical address ( MAC Address ) : like your ID Number

  2. Logical Address ( IP Address )

  3. Port Number : to identify which website as the destination

  4. Virtual Host

Routing Information Protocol (RIP) is a distance-vector routing protocol. Routers running the distance-vector protocol send all or a portion of their routing tables in routing-update messages to their neighbors.

You can use RIP to configure the hosts as part of a RIP network. This type of routing requires little maintenance and also automatically reconfigures routing tables when your network changes or network communication stops. RIPv2 was added to the IBM product so you can send and receive RIP packets to update routes throughout your network.

Open Shortest Path First (OSPF) is a routing protocolarrow-up-right for Internet Protocolarrow-up-right (IP) networks. It uses a link state routingarrow-up-right (LSR) algorithm and falls into the group of interior gateway protocolsarrow-up-right (IGPs), operating within a single autonomous systemarrow-up-right (AS). It is defined as OSPF Version 2 in RFC 2328 (1998) for IPv4arrow-up-right.The updates for IPv6arrow-up-right are specified as OSPF Version 3 in RFC 5340 (2008).OSPF supports the Classless Inter-Domain Routingarrow-up-right (CIDR) addressing model.

OSPF is a widely used IGP in large enterprise networksarrow-up-right. IS-ISarrow-up-right, another LSR-based protocol, is more common in large service providerarrow-up-right networks.

A routing protocol specifies how routersarrow-up-right communicate with each other to distribute information that enables them to select routes between nodesarrow-up-right on a computer networkarrow-up-right. Routers perform the traffic directing functions on the Internet; data packetsarrow-up-right are forwarded through the networks of the internet from router to router until they reach their destination computer. Routingarrow-up-right algorithms determine the specific choice of route. Each router has a prior knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the networkarrow-up-right. The ability of routing protocols to dynamically adjust to changing conditions such as disabled connections and components and route data around obstructions is what gives the Internet its fault tolerancearrow-up-right and high availabilityarrow-up-right.

Dynamic routing, also called adaptive routing, is a process where a router can forward data via a different route or given destination based on the current conditions of the communication circuits within a system. The term is most commonly associated with data networkingarrow-up-right to describe the capability of a network to 'route around' damage, such as loss of a node or a connection between nodes, so long as other path choices are available. Dynamic routing allows as many routes as possible to remain valid in response to the change. ( need to exchange routing information )

Static routing is a form of routingarrow-up-right that occurs when a router uses a manually-configured routing entry, rather than information from dynamic routing traffic. In many cases, static routes are manually configured by a network administratorarrow-up-right by adding in entries into a routing tablearrow-up-right, though this may not always be the case.[2]arrow-up-right Unlike dynamic routingarrow-up-right, static routes are fixed and do not change if the network is changed or reconfigured. Static routing and dynamic routingarrow-up-right are not mutually exclusive. Both dynamic routing and static routing are usually used on a router to maximize routing efficiency and to provide backups in the event that dynamic routing information fails to be exchanged. Static routing can also be used in stub networksarrow-up-right, or to provide a gateway of last resortarrow-up-right.

LAYER 4

transport layer

end to end Quality service

TCP ~ reliable

UDP ~ fast

LAYER 5

session layer is like a host that regulates the running of the ongoing process The session layer is used to remember where the last process that occurred before the interrupt occurred so after completing the interrupt the process does not have to be repeated from the beginning and will also continue from where the process was stopped because of the interrupt

LAYER 6

presentation layer

Encoding Decoding

Compression Decompression

Encryption Decryption

LAYER 7

application layer

it is an action which pages destination ( get , put , post , delete , etc )

http number , protocol

layer 1 repeater have to use the same network

layer 2 switch or bridge can used different network like for example ethernet wireless and wired.

Ethernet have 2 standards : Ethernet 2.0 and IEEE 802.3

Last updated