FOC - C02

 

C02: Network Protocol

 An established set of guidelines that govern how data is transferred between various devices connected to the same network is known as a network protocol

At the top of the OSI model is the application layer. Users interact with each other through this layer. The user receives services from it. Any kind of application or communication process requires the performance of a variety of functions by the application layer.

Application Layer Protocol

1. HTTP

  • HTTPS, which stands for Hypertext Transfer Protocol Secure, is the more secure form of HTTP, which is what HTTP stands for.
  • Data from the World Wide Web is accessed via this protocol. 
  • Pages in a text document are linked together using the well-organized documentation system known as hypertext.
  • The client-server concept is the foundation for HTTP.
  • It establishes connections using TCP.
  • Due to the statelessness of the HTTP protocol, the server does not keep track of the client's prior requests.
  • For connection establishment, HTTP uses port 80.

2. FTP

  • File Transfer Protocol is referred to as FTP. 
  • The protocol is what allows us to transfer files. 
  • Any two machines using it can facilitate this. FTP, however, is both a program and a protocol.
  • FTP encourages file sharing between distant computers through dependable and effective data transfer. For FTP, the data port is 20 and the control port is 21. 

3. DNS

  • Domain Name System is what it stands for. 
  • Therefore, a DNS server must convert each time a domain name is used into the corresponding IP address. 
  • The translation of www.abc.com, for instance, could be 198.105.232.4. 
  • 53 is the port number for DNS. 

4. SMTP

  • It stands for Simple Mail Transfer Protocol.
  • A component of the TCP/IP protocol, it. 
  • SMTP transfers your email on and across networks by use of a procedure known as "store and forward." 
  • To get your communication to the appropriate computer and email inbox, it closely collaborates with a component known as the Mail Transfer Agent (MTA). The SMTP port number is 25, and it. 

5. POP

  • POP stands for Post Office Protocol, and POP3 (Post Office Protocol version 3) is the most recent version. 
  • User agents utilize this straightforward protocol to retrieve messages from mail servers. 
  • POP protocol operates on port 110.
  • It establishes connections using TCP.
  • POP operates in two modes: Keep Mode and Delete Mode.
  • Once the messages have been downloaded to the local system, the Delete mode deletes them from the mail server. 
  • Keep mode allows users to read their emails from the mail server at a later time while without deleting the message from the mail server.

6. Telnet

  • Telnet stands for the TELetype NETwork.
  • In terminal emulation, it is helpful. 
  • It enables Telnet clients to access the Telnet server's resources. 
  • On the internet, it is utilized for file management. Devices like switches are first set up using it. 
  • The telnet command is a command that connects to a remote system or device using the Telnet protocol. Telnet uses port number 23. 

Transport Layer

  • In the TCP/IP model, the transport layer is the second layer; in the OSI model, it is the fourth layer. 
  • In order to deliver messages to a host, it is an end-to-end layer. It is referred to as an end-to-end layer since it offers a point-to-point connection between the source host and destination host rather than a hop-to-hop connection to deliver the services effectively. In the Transport Layer, a segment is the basic unit of data encapsulation. 
  • From the perspective of the sender, the transport layer receives data (messages) from the application layer, splits the data, adds the source and destination ports to the header of each segment, and sends the message to the network layer.
  • The transport layer receives data from the network layer, segments it, reads its header, determines the port number, and then passes the message to the correct port in the application layer.

 

1.UDP

  • A Transport Layer protocol is called User Datagram Protocol (UDP). 
  • The Internet Protocol family, also known as the UDP/IP suite, includes UDP. It is an unreliable, connectionless protocol, unlike TCP. Therefore, there is no requirement for a link to be established before data transfer. Low-latency and loss-tolerant connections can be established over the network with the aid of UDP. Process to process communication is made possible through UDP. 
  • Process to process communication is made possible through UDP.

 

 

 

Network Layer Protocol

 

ARP

  • The media access control (MAC) address of a device is one example of a physical address to which an IP address can be mapped using this protocol. 
  • This enables networked devices to communicate with one another.

RARP

  • A physical computer in a local area network (LAN) can utilize the Reverse Address Resolution Protocol (RARP) to ask for its IP address. 
  • This is accomplished by transmitting the device's physical address to a dedicated RARP server on the same local area network (LAN) that is watching for RARP requests.

ICMP

  • Between devices on a network, this protocol is used to send error messages and other types of information. 
  • It is frequently used to provide diagnostic data or troubleshoot network problems.

IGMP

  • It stands for Internet Group Message Protocol
  • Two types of communication:
    • Unicasting - One-to-one communication
    • Multicasting- One-to-many communication
  • It is used by the hosts and router to support multicasting and moreover to identify the hosts in a LAN.

IP

  • It is a set of rules for routing and addressing packets of data
  • The information in IP is attached to each packet which helps router to send packets to the right place.
  • Once the packets arrive at their destination, they are handles differently depending on which transport protocols is used in combination with IP.
  • Types of IP Address:
    • Static IP address  is the one which is manually created as opposed to having been assigned and cannot be change.
    • Dynamic IP address is the one which is assigned by Dynamic Host Configuration Protocol (DHCP) server and it can be changed.
  • Classes of IP address: IP address defines five classes ; A, B, C, D and E each having range of valid IP addresses. The first three IP address can be used as host address and the last two are used for multicast (D) and for experimental purpose (E).

Class A IP address has the first octet starting from 0.

Class B starts from 0+128 = 128. 

Class C starts from 0+128+64=192. 

Class D starts from 0+128+64+32=224. 

Class E starts from 0+128+64+32+16=240.

 

 

Class A ends at 127, which can be inferred from the starting end of Class B. 

Similarly Class B ends at 191.

Class C ends at 223.

Class D at 239. 

Class E at 255.

 

Network Access Layer

  • The TCP/IP protocol hierarchy's Network Access tier is the bottom tier. 
  • The protocols in this layer give the system the tools to send data to the other gadgets on a network to which it is directly connected. It specifies how to send an IP datagram over the network. 
  • In contrast to higher-level protocols, Network Access Layer protocols need to be aware of the specifics of the underlying network (its addressing, packet structure, etc.) to format the data being transferred in a way that complies with network requirements. 
  • All of the operations performed by the Data Link and Physical layers at the bottom of the OSI reference model can be included in the TCP/IP Network Access Layer.

Ethernet

  • The standard method for establishing connections between devices in a wired LAN or WAN is Ethernet. 
  • It allows for the use of a protocol, which is a set of guidelines or common network language, to allow devices to communicate with one another.

Ethernet Types

1. Fast Ethernet: Supported by twisted pair which is quite a high-speed internet and can transmit or receive data about 100Mbs.

2. Gigabit Ethernet:   Data is transferred over this type of network at a rate of roughly 1000 Mbps or 1Gbps. Fast Ethernet is being replaced with Gigabit speed, which is an improvement. The data transfer speed in this kind of network is influenced by each of the four pairs in the twisted pair cable. 

3. 10-Gigabit Ethernet: With a data transfer rate of 10 Gigabit/second, this form of high-speed network is even more modern and efficient. This network area can be expanded up to about 10,000 meters by employing a fiber optic cable.

4. Switch Ethernet: This network type needs a switch or hub. Additionally, a standard network cable is used in this instance rather than a twisted pair wire.

 

Subnetting

  • Subnetting is a method of dividing a single physical network into logical sub-networks (subnets).
  • Local devices are connected to other networks through the equipment known as a gateway or default gateway. This means that a local device must submit its packets to the gateway before they may be forwarded to their intended recipient outside of the local network when it wishes to communicate information to a device with an IP address on another network. 

Subnet Mask

  • By setting the host bits to all 0s and the network bits to all 1, a 32-bit integer known as a subnet mask is produced. The subnet mask divides the IP address into the network address and host address in this manner.
  • A broadcast address is always associated with the "255" address, while a network address is always associated with the "0" address. Both are set aside for these specific uses, hence neither can be allocated to hosts.
  • Most networks employ the Internet Protocol as the underlying structure to enable device communication, which is made up of the IP address, subnet mask, and gateway or router.

Classful Routing  

  •  
  • Subnet masks are not imported by Classful Routing. Subnet mask is also provided in this case following the route modification. 
  • A method of allocating IP addresses called classful addressing divides addresses into five main categories.
  • The above image demonstrates how the subnet mask in classful routing is constant across all devices and does not change. 

Classless Routing

  • In order to slow down the rapid expiration of IP addresses, classless addressing will eventually take the place of classful addressing.
  • Subnet mask is imported by classless routing, which makes use of triggered updates. VLSM (Variable Length Subnet Mask) and CIDR (Classless Inter-Domain Routing) are supported in classless routing. 
  • Hello messages are used for status checking in classless routing. In classless routing, subnet masks may not always be the same for all devices; we can see this in the example image.

Variable Length Subnet Mask (VLSM)

  •  
  • In VLSM, the subnet design employs several masks within a single network, i.e., multiple masks are utilized for various subnets within a single class A, class B, or network. 
  • Due of the varying size of subnets, it is utilized to make them more usable. Additionally, it is described as the procedure of subnetting a subnet

 


Comments

Popular posts from this blog

FOC - DO3

FOC - A03

FOC - E01