You are on page 1of 6

Need for protocol- responsibilities of the work among the employees so

When I say the term protocol, it means set of rules or that whenever some issues happen we know where the
set of standards in the computer industry. responsibility lies.
The protocol concept was introduced to standardize
networks in a way that allowed multi-vendor systems, Same thing applies to computer networks. While
prior to this you would only be able to have one vendor transmitting data across the network there is a room for
network as the devices could not communicate with too many complex problems such as,
other vendor devices.  Hardware failure.
Optional************************************** A computer or router may fail either because
********************************************* the hardware fails or because the operating
****** system crashes.
A network transmission link may fail or
Not long ago there was a strong battle between popular
accidentally become disconnected.
industries IBM and digital corp. to become leading  Network Congestion.
computer manufacturer. But there was a problem, Although all hardware and software operates
these manufacturers manufactured devices which were correctly, networks have finite capacity that can
not compatible with each other. So if you have bought a be exceeded.
computer of IBM you have to buy a monitor printer and  Packet Delay/ Packet Loss.
everything only from IBM. Similarly, if have a processor  Data Corruption.
from digital corp. it only supported the accessories from Electrical or magnetic interference or hardware
the same company. There were many companies who failures can cause transmission errors that
bought both products from both the companies one corrupt the contents of transmitted data;
used in accounts department and other in transport interference can be especially severe on
departments but the problem was they could not wireless networks.
communicate with each other or share data.  Data Duplication/Inverted Arrivals.
********************************************* Networks that offer multiple routes may deliver
********************************************* packets out of sequence or may deliver
****** duplicates of packets.
That’s when the International Organization for
Standardization known as ISO decided there was a need So many complex aspects exist. It is impossible to write
for standard. That’s how concept of protocols came into a single protocol specification that will handle them all.
picture. Hence we use multiple protocols, each of which
manages a part of the problem.
Why multiple protocols?
So, ok we needed protocols for defining set of rules but Protocols are implemented using protocol software.
why not a single protocol can handle everything? Why Protocol softwares are designed in such a way that it
use multiple protocol? detects and diagnoses the issues. Protocol software
Let’s take a realistic example, consider an office where follows layered approach to handle multiple protocols.
employees are categorized into different groups within
the organization. We will be having accounts ISO developed OSI which is an acronym for Open
department, maintenance department, CEO, managers, System Interconnect which is more commonly known as
developers etc. When your salary is not credited we will OSI reference model. At the same time, a competing
know that is a bank related issue which will be dealt by standard TCP/IP introduced by defense dept. of US
accounts manager. Now if the office is not clean then came into picture. The TCP/IP model is more like a
we know that is the responsibility with the maintenance stripped down version of an OSI model and because it’s
dept. Having such different designations is to divide more relevant, it went on to become industry standard.
 File transfer is done with the help of FTP
The model suggests dividing the network protocol into protocol, web surfing is done with the help of
layers, each of which solve part of the network HTTP or HTTPS protocol, for emails SMTP
communication problem. We need to know what works protocol is used and for virtual terminals telnet
at what stage. So tomorrow if something doesn’t work, is used.
instead of troubleshooting the entire thing we know  So application layer provides services for
where exactly to look into. That is why we have a network applications with the help of protocols
layered approach. to perform user activities
Presentation layer:
X.25 Presentation layer performs three basic functions
X.25 is a protocol suite developed by ITU. X.25 was translation, compression and encryption/decryption.
adopted by public data networks. Considering X.25 will  Presentation layer receives data from
help explain ISO layering. application layer this data is in the form of
In the X.25 view, a network operates much like a
characters and numbers, presentation layer
telephone system. A network consists of packet
switches that contain the intelligence needed to route convert these characters and numbers to
packets. Computers do not attach directly to machine understandable binary. This function is
communication wires of the network. Instead, each called translation.
computer attaches to one of the packet switches using  Before data is transmitted presentation layer
a serial communication line. In one sense, the does data compression and it can be lossy or
connection between a host and an X.25 packet switch is lossless data. Data compression is very helpful
a miniature network consisting of one serial link. The
in real-time video and audio streaming to
host must follow a complicated procedure to transfer
packets across the network. Layers of the protocol maintain the integrity of data before
standard depicts how a packet travels across the transmission.
network to reach the destination.  Data is encrypted to enhance the security of
sensitive data at sender side and at receiver
ISO 7-Layer model side data is decrypted. SSL protocol or Secure
Sockets Layer protocol is used in presentation
OSI model is designed to understand how the data is layer for encryption and decryption.
transferred from one computer device to another Session Layer:
computer device in the network.  Session layer helps in setting up and
Protocol suites- A set of related protocols that are establishing, managing and terminating
designed for compatibility. connections between devices.
Let's start with the topmost layer.  Just before a session or a connection is
Application layer: established with the server, server performs a
 Application layer is used by network function called authentication.
applications.  After authenticating the user, authorization is
 Network application means computer checked. Authorization is the process to
applications that use internet like Google determine if you have permission to access a
Chrome Firefox Skype etc. file.
 The web browser is a network application  Session layer keeps a track of which data packet
running in your PC. It does not reside in the belongs to which file either text file or image
application layer but it uses application layer file and tracks where the received data packet
protocols HTTP or HTTPS to do web surfing not go. So session layer helps in session
only web browser but all Network applications management authentication and authorization
including outlook, Skype etc. all are dependent Layer below session layer is transport layer.
on application layer protocols to function.
Transport layer:  Protocols of transport layer are-
 Transport layer controls the reliability of o Transmission control protocol or TCP
communication through segmentation, flow o User Datagram Protocol or UDP
control and error control  Transport layer performs 2 types of services
 Segmentation o Connection Oriented Transmission
o Data received from session layer is o Connectionless Transmission
divided into small data units called Connection oriented transmission is done via TCP while
segments Connection less transmission is done via UDP. UDP is
o Each segment contains a source and faster than TCP because it does not provide any
destination port number and a feedback whether data was really delivered whereas
sequence number TCP provides a feedback therefore lost data can be re-
o Port number helps to direct each transmitted. UDP is used where it does not matter
segment to the correct application and whether we have received all data for example online
sequence number helps to reassemble streaming, movies, songs, games etc. on the other hand
segments in the correct order to form TCP is used we're full data delivery is must for example
correct message at the receiver world wide web email FTP etc.
 Flow control Transport layer passes data segments through the
o Transport layer controls the amount of network layer.
data being transmitted Network layer:
Consider our mobile is connected to a  Network layer works for the transmission of
server. Suppose, server can transmit the received data segments from one
data maximum at 100 Mbps and our computer to another located in different
mobile can process data maximum at networks.
10 Mbps, say we are downloading a file  Data units in the network layer are called data
from the server but server starts packets.
sending data at 50 Mbps which is  It is the layer where routers reside.
greater than the rate our mobile can  The functions of network layer are logical
process so mobile phone with the help addressing, routing and path determination
of transport layer can tell the server to  Logical Addressing- IP addressing done in
slow down data transmission rate up to network layer is called logical addressing.
10 Mbps so that no data gets lost. Every computer in a network at a unique IP
Similarly, if server is sending data at 5 address. Network layer assigns sender and
Mbps mobile phone tells the server to receiver’s IP address to each segment to form
increase data transmission rate to 10 an IP packet. IP addresses are assigned to
Mbps to maintain system performance. ensure that each data packet can reach the
 Error control correct destination
o Transport layer also helps in error  Routing- A method of moving data packet from
control if some data does not arrive the source to destination and it is based on the
destination transport layer uses logical address format of ipv4 or ipv6.
automatic repeat request schemes to  Path determination- A computer can be
retransmit the lost or corrupted data connected to internet server for a computer in
o A group of bits called checksum is a number of ways. Choosing the best possible
added to each segment by the path for data delivery from source to
transport layer to find out the received destination is called path determination.
corrupted segment Data link layer:
 Receives data packet from network layer. moves through higher layers. Finally data is
 Data packets contain IP addresses of sender moved to application layer. Application layer
and receiver. protocols makes the sender's message visible in
 There are two kinds of addressing logical the application in the receivers computer
addressing and physical addressing screen.
 Logical addressing is done at network layer
where sender and receivers IP addresses are
assigned to each segment to form a data
packet
 Physical addressing is done at data link layer
where MAC addresses of sender and receiver
are assigned to each data packet to form a
frame
 MAC address is a 12 digit alphanumeric
number embedded in network interface card of
your computer by your computer manufacturer
 Data unit in data link layer is called frame TCP/IP model

ISO model, was just a theoretical idea before protocols


were implemented, the Internet 5-layer reference
model was formalized after protocols were designed
and tested.
TCP/IP protocols are organized into five conceptual
layers — four layers define packet processing and a fifth
layer defines conventional network hardware.
TCP/IP is relevant and practical, another reason this
framework has been so successful is that it's willing to
 Data link layer has the ability to check if there use existing protocols like Ethernet if they already exist.
were errors induced during transmission, so it
Application layer:
could use cyclic redundancy check or parity
 OSI session, presentation and application are all
check or other checks. rolled into a single application layer.
Physical Layer:  This layer defines the communications between
 Till now data from application layer has applications on two hosts, this doesn't define
segmented by transport layer plays into how the applications work of course, instead, it
packets by network layer and framed by data describes on how the applications use the
network.
link layer which is a sequence of binary zeros
 Let’s just focus on http for an example, if the
and ones, physical layer convert these binary
browser wants to get a webpage from the
sequence into signal and transmits over local server, it will send an HTTP request. Just like
media, it can be an electrical signal in case of OSI, the request passes down through the
copper cable or LAN cable, light signal in case layers on one side and back up through the
of optical fiber and radio signal in case of air. So layers on the other side. Logically one layer
signal generated by a physical layer depends on talks to the corresponding layer.
 At the other side, the server will go through the
the type of media used to connect two devices.
same process to respond with the requested
 At the receiver, physical layer receives signals, webpage.
convert it to bits and pass it to data link layer as
a frame. Frame is further de-capsulated as data Transport layer:
When the information coming from the upper layers called as a Packet! So one of the critical functions of the
comes to the transport layers, transport layer breaks Internet Layer is of IP Address or also known as Logical
them into manageable segments. Each segment, the Addressing. It also finds the best path just like it did in
transport layer adds its own header to create ISO model. It sends the IP packet directly to the
encapsulation. destination if the destination IP address is on the local
Two critical decisions the transport layer takes is: network or sends it to a router to be forwarded across
- Whether to use Reliable Communication or Unreliable the internet if the destination is remote.
Communication Network Interface Layer:
When applications need a reliable communication, they When the packet comes from the Internet layer MAC
use TCP. If it wants an unreliable communication, it uses addresses are added to it to for a FRAME.
UDP. MAC is nothing but an acronym for Media Access
When I say 'Reliable', it doesn’t mean it is better than Control, and MAC address is a hardware address. This is
'Unreliable' in that, the only difference is that the a layer where Error Checking happens.
reliable communication has to get an acknowledgement Physical layer:
for every packet that is sent! In unreliable, there is no Physical layer is where the actually data transfer
acknowledgement that is received for every segment happen. This is the layer that deals with wires, cables
transmission. So unreliable is actually faster because of and hardware ports/connectors and all similar things
the less overhead. So if it is real-time applications, they that happen at this layer.
will use UDP, because it is faster and it is real-time. So As a computer engineer or as a network engineer, when
most of the time, if you have tried watching an online somebody tells you that the internet doesn’t work, as
transmission or a live feed, there are times when we an engineer you will start working or troubleshooting
see those green pixels on the screen. This is nothing but from Physical Layer. First you will check the cables to
the information for that pixel has not been received and see if it works. If the cables are fine, next you will check
the receiving device has no way of telling the sending for Layer 2 problem. Then you will go to Layer 3, Layer 4
device that it did not receive that pixel. and so on. So you will trouble shoot by layers and that is
- Create Port Numbers why we have to learn about the models.
Similarly another function that is taken care of by the
transport layer is to create port numbers. Conceptual protocol layering vs. realistic view of
Port number is a number that is attached with the IP protocol software with multiple network interfaces
Address, to identify which application this information and multiple protocols:
is coming from. The transport layer, creates a random
port source port number and attaches the port number
for the destination. So if your traffic is going to a
webserver, the webserver has a standard port number
of 80! So if you are going to an IP Address of
10.10.10.10 for instance as an example, it takes
10.10.10.10 and adds a port number for 80. So it
creates a socket. Socket is nothing but an IP address and
port number. It creates a socket and send down to the
network layer. It also adds a source port number. Why
does it require source port number? The reason it
creates a source port number is because if there are 2 There could be a common protocol at layer 3 similar to
applications running on your computer and it is going to that of conceptual model.
the same IP address, when the reply comes back the However, there can be multiple applications at layer 5,
transport layer needs to know which data goes to which more than one application can use transport protocol.
application. And it will identify that by actually having Internet protocols have multiple transport protocols at
our source port number. Layer 4, multiple physical networks at Layer 1, and
multiple network interface modules at Layer 2.
Internet layer:
When the Internet layer gets a segment from the Although multiple independent protocols can exist
transport layer, it adds an Internet layer header. When above IP and multiple networks can exist below IP, all
an Internet layer header is added, that information is outgoing or incoming traffic must pass through IP.
That’s why Internet Protocol in the TCP/IP suite is often
referred as hour glass or narrow waist.
We can use the layering model to explain the difference
between end systems (users’ computers) and
intermediate systems (routers).

In the figure, a sending application on computer A uses


a transport protocol to send data to a receiving
application on computer B. The message passes down
the protocol stack on computer A, and is transmitted
across network 1 to Router 1. When it reaches the first
router, the packet passes up to the internet layer (Layer
3), which forwards the packet over network 2 to Router
2. On Router 2, the message passes up to Layer 3, and is
forwarded over network 3 to the destination. When it
reaches the final destination machine, the message
passes up to the transport layer, which delivers the
message to the receiving application.

Locus of intelligence:

— In the original telephone network, all the


intelligence was located in phone switches. The
host device only consisted the passive
electronics such as a microphone, earpiece & a
mechanism used to dial.
— The TCP/IP protocols require attached
computers to run transport protocols and
applications as well as Layer 3 and Layer 2
protocols. There is a much involvement of the
end device in forwarding the packets.
— Unlike traditional analog telephone system,
TCP/IP internet can be viewed s a relatively
simple packet delivery system to which
intelligent hosts attach.

You might also like