communicationprotocol kumar vipul shrivastawa and abhinash. regd.no:050 and 279 branch: etc a...

21
COMMUNICATION COMMUNICATION PROTOCOL PROTOCOL Kumar Vipul Kumar Vipul Shrivastawa Shrivastawa and and Abhinash. Abhinash. Regd.No:050 and 279 Regd.No:050 and 279 Branch: ETC Branch: ETC A technical Seminar presented by

Upload: helena-copeland

Post on 12-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

COMMUNICATIOCOMMUNICATIONN

PROTOCOLPROTOCOL

Kumar Vipul ShrivastawaKumar Vipul Shrivastawa and Abhinash. and Abhinash.Regd.No:050 and 279Regd.No:050 and 279Branch: ETCBranch: ETC

A technical Seminar presented

by

Page 2: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

CONTENTSCONTENTS

1. Introduction1. Introduction

2. communication models2. communication models

3. Network protocol design principles 3. Network protocol design principles

4. Five layer TCP/IP model4. Five layer TCP/IP model

4. Protocol associated with different layer4. Protocol associated with different layer

5. Importance5. Importance

6. conclusion6. conclusion

7. 7. ReferencesReferences

Page 3: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

INTRODUCTIONINTRODUCTION

Communication

It is any transmission, emission, or reception of signs, signals ,writings, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic system.

Communication model A communication model comprises of following subsystems: • Source – Generates the data to be transmitted • Transmitter – Converts the data into transmittable signals • Transmission system – Carries the data. • Receiver – Converts received signals into data. • Destination – Takes incoming data.

Page 4: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

PHYSICAL COMMUNICATION PHYSICAL COMMUNICATION MODELMODEL

Page 5: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

Electronics Communication Model

ELECTRONIC COMMUNICATION MODEL

Page 6: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

COMMUNICATION PROTOCOL

In the field of telecommunications, a In the field of telecommunications, a communications protocolcommunications protocol is is

the set of standard rules for data representation, signaling, the set of standard rules for data representation, signaling,

authentication and error detection required to send information over authentication and error detection required to send information over

a communications channel.a communications channel.

An example of a simple communications protocol adapted to voice An example of a simple communications protocol adapted to voice

communication is the case of a radio dispatcher talking to mobile communication is the case of a radio dispatcher talking to mobile

stations.stations.

Page 7: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

NETWORK PROTOCOL DESIGN NETWORK PROTOCOL DESIGN PRINCIPLESPRINCIPLES

These principles include:-These principles include:-Effectiveness:-Effectiveness:-

Needs to be specified in such a way, that engineers, designers, and in Needs to be specified in such a way, that engineers, designers, and in some cases software developers can implement and/or use it. some cases software developers can implement and/or use it.

Reliability:-Reliability:- Assuring reliability of data transmission involves error detection and Assuring reliability of data transmission involves error detection and

correction, or some means of requesting retransmissioncorrection, or some means of requesting retransmission..Resiliency:-Resiliency:-

Re addresses a form of network failure known as topological Re addresses a form of network failure known as topological failure in which a communications link is cut, or degrades below failure in which a communications link is cut, or degrades below

usable quality.usable quality.

Page 8: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

THE 5 LAYER TCP/IP MODELTHE 5 LAYER TCP/IP MODEL

5. Application layer5. Application layer • FTP • IMAP4 • XMPP • POP3 • FTP • IMAP4 • XMPP • POP3 • • SMTP • SNMPSMTP • SNMP

4. Transport layer .4. Transport layer .TCP • UDPTCP • UDP

3. Network Layer 3. Network Layer • IP (IPv4 • IPv6) • IGMP • ICMP • ARP • IP (IPv4 • IPv6) • IGMP • ICMP • ARP

2. Data link layer 2. Data link layer • PPP • PPP

1. Physical layer 1. Physical layer

Page 10: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

PROTOCOLS ASSOCIATED PROTOCOLS ASSOCIATED WITH DIFFERENT LAYERSWITH DIFFERENT LAYERS

DATA LINK LAYER PROTOCOLS-DATA LINK LAYER PROTOCOLS-

PPP(POINT-TO-POINT PROTOCOL)- PPP(POINT-TO-POINT PROTOCOL)- ForFor

point to point access.point to point access.

1> 1> LCP(LINK CONTROL PROTOCOL)-LCP(LINK CONTROL PROTOCOL)- Responsible for establishing, maintaining,Responsible for establishing, maintaining, configuring, and terminating links.configuring, and terminating links.

Page 11: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

2>AUTHENTICATION PROTOCOL2>AUTHENTICATION PROTOCOL

PAP(PASSWORD AUTHENTICATION PROTOCOL)-PAP(PASSWORD AUTHENTICATION PROTOCOL)-

Validating the identity of a user who needs toValidating the identity of a user who needs to

access a set of resources.access a set of resources.

CHAP(CHALLENGE HANDSHAKE AUTHENTICATION CHAP(CHALLENGE HANDSHAKE AUTHENTICATION

PROTOCOL)- :PROTOCOL)- :Greater security than PAP.Greater security than PAP.

:Password kept secret and:Password kept secret and

never sent on-line.never sent on-line.

Page 12: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

3>NCP(NETWORK CONTROL PROTOCOLS)-3>NCP(NETWORK CONTROL PROTOCOLS)-

Set ofSet of control protocols to allow the control protocols to allow the encapsulation of data coming from network encapsulation of data coming from network layer protocols.layer protocols.

IPCP(INTERNETWORK PROTOCOL CONTROL PROTOCOL)-IPCP(INTERNETWORK PROTOCOL CONTROL PROTOCOL)-

Set of packets that establish and terminate a Set of packets that establish and terminate a network layer connection for IP packetsnetwork layer connection for IP packets..

Page 13: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

NETWORK LAYER PROTOCOLSNETWORK LAYER PROTOCOLS

IP(INTERNETWORK PROTOCOL)IP(INTERNETWORK PROTOCOL)It is the host-to-host network layer delivery protocol for the internet.It is the host-to-host network layer delivery protocol for the internet.

Unreliable and connectionless datagram protocol. Unreliable and connectionless datagram protocol.

It provides no error control or flow control.It provides no error control or flow control.

It uses only an error detection mechanism and discards the packet if it is It uses only an error detection mechanism and discards the packet if it is corrupted .corrupted .

ICMP (INTERNET CONTROL MESSAGE PROTOCOL) :-ICMP (INTERNET CONTROL MESSAGE PROTOCOL) :-

Designed for compensating 2 deficiencies of IPDesigned for compensating 2 deficiencies of IP

1. Lack of error control mechanism.1. Lack of error control mechanism.

2. Lack of assistance mechanism. 2. Lack of assistance mechanism.

The value of protocol field in IP datagram is 1 to indicate that IP data an The value of protocol field in IP datagram is 1 to indicate that IP data an ICMP message.ICMP message.

ICMP always reports error message to the original sourceICMP always reports error message to the original source..

Page 14: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

IPv4 :-IPv4 :-

It provides host to host communication between It provides host to host communication between the systems and the internet.the systems and the internet.

It has some deficiencies that make it unsuitable It has some deficiencies that make it unsuitable now-a-days, including the following:-now-a-days, including the following:-

• It has 2 level address structure(netid and hostid) It has 2 level address structure(netid and hostid) and 5 classes(A,B,C,D,E).The use of address and 5 classes(A,B,C,D,E).The use of address space is inefficient. space is inefficient.

• Minimum delay strategy and reservation of Minimum delay strategy and reservation of resources not provided by IPv4.resources not provided by IPv4.

• No security mechanism was provided.No security mechanism was provided.

Page 15: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

TRANSPORT LAYER TRANSPORT LAYER PROTOCOLSPROTOCOLS

Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) • It is reliable but complex.It is reliable but complex.• It is connection oriented.It is connection oriented.• There is no negative acknowledgement.There is no negative acknowledgement.• The unit of data transfer is segment.The unit of data transfer is segment.• The error detection is handled by checksum acknowledgement and The error detection is handled by checksum acknowledgement and

time out.time out.

User Datagram Protocol (UDP) User Datagram Protocol (UDP) – It is unreliable and connectionless protocol.It is unreliable and connectionless protocol.– It has no flow control mechanismIt has no flow control mechanism– The UDP packet is called a user datagramThe UDP packet is called a user datagram..

Page 16: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

APPLICATION LAYER APPLICATION LAYER PROTOCOLSPROTOCOLS

FTP :FTP :Transfers files to and from a computer running a File Transfers files to and from a computer running a File Transfer Protocol (FTP) server service such as Internet Transfer Protocol (FTP) server service such as Internet Information ServicesInformation Services . .

Simple Mail Transfer Protocol (SMTP):Simple Mail Transfer Protocol (SMTP):A member of the TCP/IP suite of protocols that governs A member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message the exchange of electronic mail between message transfer agentstransfer agents

Hypertext Transfer Protocol (HTTP):Hypertext Transfer Protocol (HTTP):The protocol used to transfer information on the World The protocol used to transfer information on the World Wide Web. An HTTP address (one kind of Uniform Wide Web. An HTTP address (one kind of Uniform Resource Locator [URL]) takes the form:Resource Locator [URL]) takes the form:

Page 17: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

SNMP: SNMP:

SNMP provides a method of managing SNMP provides a method of managing network hosts such as workstation or server network hosts such as workstation or server computers, routers, bridges, and hubs from a computers, routers, bridges, and hubs from a centrally-located computer running network centrally-located computer running network management software. management software.

Page 18: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

IMPORTANCEIMPORTANCE

The widespread use and expansion of The widespread use and expansion of communications protocols is both a prerequisite communications protocols is both a prerequisite to the Internet, and a major contributor to its to the Internet, and a major contributor to its power and success.power and success. TCP/IP is included in all commercial UNIX TCP/IP is included in all commercial UNIX systems, Mac OS X, and all free-software.systems, Mac OS X, and all free-software.

Unique implementations include Lightweight Unique implementations include Lightweight TCP/IP; an open source stack designed for TCP/IP; an open source stack designed for embedded embedded

Page 19: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

CONCLUSIONCONCLUSION

protocolprotocol is a convention or standard is a convention or standard that controls or enables the connection, that controls or enables the connection, communication, and data transfer between communication, and data transfer between two computing endpoints.two computing endpoints.

without protocol proper communication without protocol proper communication and data reliability is impossible and data reliability is impossible

Page 20: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

REFERENCESREFERENCES

Wikipedia, Wikipedia, the free encyclopediathe free encyclopedia

Behrouz A.Forouzan;Behrouz A.Forouzan; Data Data Communication and NetworkingCommunication and Networking.3rd .3rd Edition.TMH productionEdition.TMH production

Andrew S. TanenbaumAndrew S. Tanenbaum.Computer .Computer Networks Networks

Page 21: COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by

THANK FOR YOUR

ATTENTION